Action not permitted
Modal body text goes here.
Modal Title
Modal Body
CVE-2025-40164 (GCVE-0-2025-40164)
Vulnerability from cvelistv5 – Published: 2025-11-12 10:26 – Updated: 2026-01-30 15:35| Vendor | Product | Version | ||
|---|---|---|---|---|
| Linux | Linux |
Affected:
43daa96b166c3cf5ff30dfac0c5efa2620e4beab , < 17fbad93879e87a334062882b45fa727ba1b3dd7
(git)
Affected: 43daa96b166c3cf5ff30dfac0c5efa2620e4beab , < d1944bab8e0c1511f0cbf364aa06547735bb0ddb (git) Affected: 43daa96b166c3cf5ff30dfac0c5efa2620e4beab , < 0134c7bff14bd50314a4f92b182850ddfc38e255 (git) Affected: 43daa96b166c3cf5ff30dfac0c5efa2620e4beab , < 327cd4b68b4398b6c24f10eb2b2533ffbfc10185 (git) |
||
{
"containers": {
"cna": {
"affected": [
{
"defaultStatus": "unaffected",
"product": "Linux",
"programFiles": [
"drivers/net/usb/usbnet.c"
],
"repo": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git",
"vendor": "Linux",
"versions": [
{
"lessThan": "17fbad93879e87a334062882b45fa727ba1b3dd7",
"status": "affected",
"version": "43daa96b166c3cf5ff30dfac0c5efa2620e4beab",
"versionType": "git"
},
{
"lessThan": "d1944bab8e0c1511f0cbf364aa06547735bb0ddb",
"status": "affected",
"version": "43daa96b166c3cf5ff30dfac0c5efa2620e4beab",
"versionType": "git"
},
{
"lessThan": "0134c7bff14bd50314a4f92b182850ddfc38e255",
"status": "affected",
"version": "43daa96b166c3cf5ff30dfac0c5efa2620e4beab",
"versionType": "git"
},
{
"lessThan": "327cd4b68b4398b6c24f10eb2b2533ffbfc10185",
"status": "affected",
"version": "43daa96b166c3cf5ff30dfac0c5efa2620e4beab",
"versionType": "git"
}
]
},
{
"defaultStatus": "affected",
"product": "Linux",
"programFiles": [
"drivers/net/usb/usbnet.c"
],
"repo": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git",
"vendor": "Linux",
"versions": [
{
"status": "affected",
"version": "4.7"
},
{
"lessThan": "4.7",
"status": "unaffected",
"version": "0",
"versionType": "semver"
},
{
"lessThanOrEqual": "6.6.*",
"status": "unaffected",
"version": "6.6.122",
"versionType": "semver"
},
{
"lessThanOrEqual": "6.12.*",
"status": "unaffected",
"version": "6.12.64",
"versionType": "semver"
},
{
"lessThanOrEqual": "6.17.*",
"status": "unaffected",
"version": "6.17.5",
"versionType": "semver"
},
{
"lessThanOrEqual": "*",
"status": "unaffected",
"version": "6.18",
"versionType": "original_commit_for_fix"
}
]
}
],
"cpeApplicability": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionEndExcluding": "6.6.122",
"versionStartIncluding": "4.7",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionEndExcluding": "6.12.64",
"versionStartIncluding": "4.7",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionEndExcluding": "6.17.5",
"versionStartIncluding": "4.7",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionEndExcluding": "6.18",
"versionStartIncluding": "4.7",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
],
"descriptions": [
{
"lang": "en",
"value": "In the Linux kernel, the following vulnerability has been resolved:\n\nusbnet: Fix using smp_processor_id() in preemptible code warnings\n\nSyzbot reported the following warning:\n\nBUG: using smp_processor_id() in preemptible [00000000] code: dhcpcd/2879\ncaller is usbnet_skb_return+0x74/0x490 drivers/net/usb/usbnet.c:331\nCPU: 1 UID: 0 PID: 2879 Comm: dhcpcd Not tainted 6.15.0-rc4-syzkaller-00098-g615dca38c2ea #0 PREEMPT(voluntary)\nCall Trace:\n \u003cTASK\u003e\n __dump_stack lib/dump_stack.c:94 [inline]\n dump_stack_lvl+0x16c/0x1f0 lib/dump_stack.c:120\n check_preemption_disabled+0xd0/0xe0 lib/smp_processor_id.c:49\n usbnet_skb_return+0x74/0x490 drivers/net/usb/usbnet.c:331\n usbnet_resume_rx+0x4b/0x170 drivers/net/usb/usbnet.c:708\n usbnet_change_mtu+0x1be/0x220 drivers/net/usb/usbnet.c:417\n __dev_set_mtu net/core/dev.c:9443 [inline]\n netif_set_mtu_ext+0x369/0x5c0 net/core/dev.c:9496\n netif_set_mtu+0xb0/0x160 net/core/dev.c:9520\n dev_set_mtu+0xae/0x170 net/core/dev_api.c:247\n dev_ifsioc+0xa31/0x18d0 net/core/dev_ioctl.c:572\n dev_ioctl+0x223/0x10e0 net/core/dev_ioctl.c:821\n sock_do_ioctl+0x19d/0x280 net/socket.c:1204\n sock_ioctl+0x42f/0x6a0 net/socket.c:1311\n vfs_ioctl fs/ioctl.c:51 [inline]\n __do_sys_ioctl fs/ioctl.c:906 [inline]\n __se_sys_ioctl fs/ioctl.c:892 [inline]\n __x64_sys_ioctl+0x190/0x200 fs/ioctl.c:892\n do_syscall_x64 arch/x86/entry/syscall_64.c:63 [inline]\n do_syscall_64+0xcd/0x260 arch/x86/entry/syscall_64.c:94\n entry_SYSCALL_64_after_hwframe+0x77/0x7f\n\nFor historical and portability reasons, the netif_rx() is usually\nrun in the softirq or interrupt context, this commit therefore add\nlocal_bh_disable/enable() protection in the usbnet_resume_rx()."
}
],
"providerMetadata": {
"dateUpdated": "2026-01-30T15:35:34.628Z",
"orgId": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"shortName": "Linux"
},
"references": [
{
"url": "https://git.kernel.org/stable/c/17fbad93879e87a334062882b45fa727ba1b3dd7"
},
{
"url": "https://git.kernel.org/stable/c/d1944bab8e0c1511f0cbf364aa06547735bb0ddb"
},
{
"url": "https://git.kernel.org/stable/c/0134c7bff14bd50314a4f92b182850ddfc38e255"
},
{
"url": "https://git.kernel.org/stable/c/327cd4b68b4398b6c24f10eb2b2533ffbfc10185"
}
],
"title": "usbnet: Fix using smp_processor_id() in preemptible code warnings",
"x_generator": {
"engine": "bippy-1.2.0"
}
}
},
"cveMetadata": {
"assignerOrgId": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"assignerShortName": "Linux",
"cveId": "CVE-2025-40164",
"datePublished": "2025-11-12T10:26:23.482Z",
"dateReserved": "2025-04-16T07:20:57.176Z",
"dateUpdated": "2026-01-30T15:35:34.628Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.2",
"vulnerability-lookup:meta": {
"nvd": "{\"cve\":{\"id\":\"CVE-2025-40164\",\"sourceIdentifier\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\",\"published\":\"2025-11-12T11:15:46.660\",\"lastModified\":\"2026-01-30T10:15:55.310\",\"vulnStatus\":\"Awaiting Analysis\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"In the Linux kernel, the following vulnerability has been resolved:\\n\\nusbnet: Fix using smp_processor_id() in preemptible code warnings\\n\\nSyzbot reported the following warning:\\n\\nBUG: using smp_processor_id() in preemptible [00000000] code: dhcpcd/2879\\ncaller is usbnet_skb_return+0x74/0x490 drivers/net/usb/usbnet.c:331\\nCPU: 1 UID: 0 PID: 2879 Comm: dhcpcd Not tainted 6.15.0-rc4-syzkaller-00098-g615dca38c2ea #0 PREEMPT(voluntary)\\nCall Trace:\\n \u003cTASK\u003e\\n __dump_stack lib/dump_stack.c:94 [inline]\\n dump_stack_lvl+0x16c/0x1f0 lib/dump_stack.c:120\\n check_preemption_disabled+0xd0/0xe0 lib/smp_processor_id.c:49\\n usbnet_skb_return+0x74/0x490 drivers/net/usb/usbnet.c:331\\n usbnet_resume_rx+0x4b/0x170 drivers/net/usb/usbnet.c:708\\n usbnet_change_mtu+0x1be/0x220 drivers/net/usb/usbnet.c:417\\n __dev_set_mtu net/core/dev.c:9443 [inline]\\n netif_set_mtu_ext+0x369/0x5c0 net/core/dev.c:9496\\n netif_set_mtu+0xb0/0x160 net/core/dev.c:9520\\n dev_set_mtu+0xae/0x170 net/core/dev_api.c:247\\n dev_ifsioc+0xa31/0x18d0 net/core/dev_ioctl.c:572\\n dev_ioctl+0x223/0x10e0 net/core/dev_ioctl.c:821\\n sock_do_ioctl+0x19d/0x280 net/socket.c:1204\\n sock_ioctl+0x42f/0x6a0 net/socket.c:1311\\n vfs_ioctl fs/ioctl.c:51 [inline]\\n __do_sys_ioctl fs/ioctl.c:906 [inline]\\n __se_sys_ioctl fs/ioctl.c:892 [inline]\\n __x64_sys_ioctl+0x190/0x200 fs/ioctl.c:892\\n do_syscall_x64 arch/x86/entry/syscall_64.c:63 [inline]\\n do_syscall_64+0xcd/0x260 arch/x86/entry/syscall_64.c:94\\n entry_SYSCALL_64_after_hwframe+0x77/0x7f\\n\\nFor historical and portability reasons, the netif_rx() is usually\\nrun in the softirq or interrupt context, this commit therefore add\\nlocal_bh_disable/enable() protection in the usbnet_resume_rx().\"}],\"metrics\":{},\"references\":[{\"url\":\"https://git.kernel.org/stable/c/0134c7bff14bd50314a4f92b182850ddfc38e255\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\"},{\"url\":\"https://git.kernel.org/stable/c/17fbad93879e87a334062882b45fa727ba1b3dd7\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\"},{\"url\":\"https://git.kernel.org/stable/c/327cd4b68b4398b6c24f10eb2b2533ffbfc10185\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\"},{\"url\":\"https://git.kernel.org/stable/c/d1944bab8e0c1511f0cbf364aa06547735bb0ddb\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\"}]}}"
}
}
SUSE-SU-2025:4422-1
Vulnerability from csaf_suse - Published: 2025-12-17 10:52 - Updated: 2025-12-17 10:52Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Security update for the Linux Kernel",
"title": "Title of the patch"
},
{
"category": "description",
"text": "\nThe SUSE Linux Enterprise 15 SP6 kernel was updated to fix various security issues\n\nThe following security issues were fixed:\n\n- CVE-2022-50253: bpf: make sure skb-\u003elen != 0 when redirecting to a tunneling device (bsc#1249912).\n- CVE-2023-53676: scsi: target: iscsi: Fix buffer overflow in lio_target_nacl_info_show() (bsc#1251786).\n- CVE-2025-21710: tcp: correct handling of extreme memory squeeze (bsc#1237888).\n- CVE-2025-37916: pds_core: remove write-after-free of client_id (bsc#1243474).\n- CVE-2025-38359: s390/mm: Fix in_atomic() handling in do_secure_storage_access() (bsc#1247076).\n- CVE-2025-38361: drm/amd/display: Check dce_hwseq before dereferencing it (bsc#1247079).\n- CVE-2025-39788: scsi: ufs: exynos: Fix programming of HCI_UTRL_NEXUS_TYPE (bsc#1249547).\n- CVE-2025-39805: net: macb: fix unregister_netdev call order in macb_remove() (bsc#1249982).\n- CVE-2025-39819: fs/smb: Fix inconsistent refcnt update (bsc#1250176).\n- CVE-2025-39859: ptp: ocp: fix use-after-free bugs causing by ptp_ocp_watchdog (bsc#1250252).\n- CVE-2025-39944: octeontx2-pf: Fix use-after-free bugs in otx2_sync_tstamp() (bsc#1251120).\n- CVE-2025-39980: nexthop: Forbid FDB status change while nexthop is in a group (bsc#1252063).\n- CVE-2025-40001: scsi: mvsas: Fix use-after-free bugs in mvs_work_queue (bsc#1252303).\n- CVE-2025-40021: tracing: dynevent: Add a missing lockdown check on dynevent (bsc#1252681).\n- CVE-2025-40027: net/9p: fix double req put in p9_fd_cancelled (bsc#1252763).\n- CVE-2025-40030: pinctrl: check the return value of pinmux_ops::get_function_name() (bsc#1252773).\n- CVE-2025-40038: KVM: SVM: Skip fastpath emulation on VM-Exit if next RIP isn\u0027t valid (bsc#1252817).\n- CVE-2025-40040: mm/ksm: fix flag-dropping behavior in ksm_madvise (bsc#1252780).\n- CVE-2025-40048: uio_hv_generic: Let userspace take care of interrupt mask (bsc#1252862).\n- CVE-2025-40055: ocfs2: fix double free in user_cluster_connect() (bsc#1252821).\n- CVE-2025-40059: coresight: Fix incorrect handling for return value of devm_kzalloc (bsc#1252809).\n- CVE-2025-40064: smc: Fix use-after-free in __pnet_find_base_ndev() (bsc#1252845).\n- CVE-2025-40070: pps: fix warning in pps_register_cdev when register device fail (bsc#1252836).\n- CVE-2025-40074: ipv4: start using dst_dev_rcu() (bsc#1252794).\n- CVE-2025-40075: tcp_metrics: use dst_dev_net_rcu() (bsc#1252795).\n- CVE-2025-40083: net/sched: sch_qfq: Fix null-deref in agg_dequeue (bsc#1252912).\n- CVE-2025-40098: ALSA: hda: cs35l41: Fix NULL pointer dereference in cs35l41_get_acpi_mute_state() (bsc#1252917).\n- CVE-2025-40105: vfs: Don\u0027t leak disconnected dentries on umount (bsc#1252928).\n- CVE-2025-40139: smc: Use __sk_dst_get() and dst_dev_rcu() in in smc_clc_prfx_set() (bsc#1253409).\n- CVE-2025-40149: tls: Use __sk_dst_get() and dst_dev_rcu() in get_netdev_for_sock() (bsc#1253355).\n- CVE-2025-40159: xsk: Harden userspace-supplied xdp_desc validation (bsc#1253403).\n- CVE-2025-40168: smc: Use __sk_dst_get() and dst_dev_rcu() in smc_clc_prfx_match() (bsc#1253427).\n- CVE-2025-40169: bpf: Reject negative offsets for ALU ops (bsc#1253416).\n- CVE-2025-40173: net/ip6_tunnel: Prevent perpetual tunnel growth (bsc#1253421).\n- CVE-2025-40176: tls: wait for pending async decryptions if tls_strp_msg_hold fails (bsc#1253425).\n- CVE-2025-40204: sctp: Fix MAC comparison to be constant-time (bsc#1253436).\n\nThe following non security issues were fixed:\n\n- ACPI: CPPC: Check _CPC validity for only the online CPUs (git-fixes).\n- ACPI: CPPC: Limit perf ctrs in PCC check only to online CPUs (git-fixes).\n- ACPI: CPPC: Perform fast check switch only for online CPUs (git-fixes).\n- ACPI: PRM: Skip handlers with NULL handler_address or NULL VA (stable-fixes).\n- ACPI: SBS: Fix present test in acpi_battery_read() (git-fixes).\n- ACPI: property: Return present device nodes only on fwnode interface (stable-fixes).\n- ACPI: scan: Add Intel CVS ACPI HIDs to acpi_ignore_dep_ids (stable-fixes).\n- ACPICA: Update dsmethod.c to get rid of unused variable warning (stable-fixes).\n- ACPICA: dispatcher: Use acpi_ds_clear_operands() in acpi_ds_call_control_method() (stable-fixes).\n- ALSA: hda: Fix missing pointer check in hda_component_manager_init function (git-fixes).\n- ALSA: serial-generic: remove shared static buffer (stable-fixes).\n- ALSA: usb-audio: Add validation of UAC2/UAC3 effect units (stable-fixes).\n- ALSA: usb-audio: Fix NULL pointer dereference in snd_usb_mixer_controls_badd (git-fixes).\n- ALSA: usb-audio: Fix potential overflow of PCM transfer buffer (stable-fixes).\n- ALSA: usb-audio: add mono main switch to Presonus S1824c (stable-fixes).\n- ALSA: usb-audio: apply quirk for MOONDROP Quark2 (stable-fixes).\n- ALSA: usb-audio: don\u0027t log messages meant for 1810c when initializing 1824c (git-fixes).\n- ALSA: usb-audio: fix uac2 clock source at terminal parser (git-fixes).\n- ASoC: codecs: va-macro: fix resource leak in probe error path (git-fixes).\n- ASoC: cs4271: Fix regulator leak on probe failure (git-fixes).\n- ASoC: max98090/91: fixed max98091 ALSA widget powering up/down (stable-fixes).\n- ASoC: meson: aiu-encoder-i2s: fix bit clock polarity (stable-fixes).\n- ASoC: qcom: sc8280xp: explicitly set S16LE format in sc8280xp_be_hw_params_fixup() (stable-fixes).\n- ASoC: stm32: sai: manage context in set_sysclk callback (stable-fixes).\n- ASoC: tlv320aic3x: Fix class-D initialization for tlv320aic3007 (stable-fixes).\n- Bluetooth: 6lowpan: Don\u0027t hold spin lock over sleeping functions (git-fixes).\n- Bluetooth: 6lowpan: add missing l2cap_chan_lock() (git-fixes).\n- Bluetooth: 6lowpan: fix BDADDR_LE vs ADDR_LE_DEV address type confusion (git-fixes).\n- Bluetooth: 6lowpan: reset link-local header on ipv6 recv path (git-fixes).\n- Bluetooth: L2CAP: export l2cap_chan_hold for modules (stable-fixes).\n- Bluetooth: MGMT: cancel mesh send timer when hdev removed (git-fixes).\n- Bluetooth: SCO: Fix UAF on sco_conn_free (stable-fixes).\n- Bluetooth: bcsp: receive data only if registered (stable-fixes).\n- Bluetooth: btrtl: Fix memory leak in rtlbt_parse_firmware_v2() (git-fixes).\n- Bluetooth: btusb: Check for unexpected bytes when defragmenting HCI frames (stable-fixes).\n- Bluetooth: btusb: reorder cleanup in btusb_disconnect to avoid UAF (git-fixes).\n- Bluetooth: hci_event: validate skb length for unknown CC opcode (git-fixes).\n- Drivers: hv: vmbus: Add utility function for querying ring size (git-fixes).\n- HID: amd_sfh: Stop sensor before starting (git-fixes).\n- HID: hid-ntrig: Prevent memory leak in ntrig_report_version() (git-fixes).\n- HID: quirks: avoid Cooler Master MM712 dongle wakeup bug (stable-fixes).\n- HID: quirks: work around VID/PID conflict for 0x4c4a/0x4155 (git-fixes).\n- HID: uclogic: Fix potential memory leak in error path (git-fixes).\n- Input: atmel_mxt_ts - allow reset GPIO to sleep (stable-fixes).\n- Input: imx_sc_key - fix memory corruption on unload (git-fixes).\n- Input: pegasus-notetaker - fix potential out-of-bounds access (git-fixes).\n- KVM: Pass new routing entries and irqfd when updating IRTEs (git-fixes).\n- KVM: SVM: Delete IRTE link from previous vCPU before setting new IRTE (git-fixes).\n- KVM: SVM: Delete IRTE link from previous vCPU irrespective of new routing (git-fixes).\n- KVM: SVM: Emulate PERF_CNTR_GLOBAL_STATUS_SET for PerfMonV2 (git-fixes).\n- KVM: SVM: Mark VMCB_LBR dirty when MSR_IA32_DEBUGCTLMSR is updated (git-fixes).\n- KVM: SVM: Re-load current, not host, TSC_AUX on #VMEXIT from SEV-ES guest (git-fixes).\n- KVM: SVM: Track per-vCPU IRTEs using kvm_kernel_irqfd structure (git-fixes).\n- KVM: SVM: WARN if an invalid posted interrupt IRTE entry is added (git-fixes).\n- KVM: VMX: Allow guest to set DEBUGCTL.RTM_DEBUG if RTM is supported (git-fixes).\n- KVM: VMX: Apply MMIO Stale Data mitigation if KVM maps MMIO into the guest (git-fixes).\n- KVM: VMX: Fix check for valid GVA on an EPT violation (git-fixes).\n- KVM: VMX: Preserve host\u0027s DEBUGCTLMSR_FREEZE_IN_SMM while running the guest (git-fixes).\n- KVM: VMX: Wrap all accesses to IA32_DEBUGCTL with getter/setter APIs (git-fixes).\n- KVM: nVMX: Check vmcs12-\u003eguest_ia32_debugctl on nested VM-Enter (git-fixes).\n- KVM: x86/mmu: Locally cache whether a PFN is host MMIO when making a SPTE (git-fixes).\n- KVM: x86: Add helper to retrieve current value of user return MSR (git-fixes).\n- KVM: x86: Convert vcpu_run()\u0027s immediate exit param into a generic bitmap (git-fixes).\n- KVM: x86: Don\u0027t treat ENTER and LEAVE as branches, because they aren\u0027t (git-fixes).\n- KVM: x86: Drop kvm_x86_ops.set_dr6() in favor of a new KVM_RUN flag (git-fixes).\n- NFS4: Fix state renewals missing after boot (git-fixes).\n- NFS: check if suid/sgid was cleared after a write as needed (git-fixes).\n- NFSD: Never cache a COMPOUND when the SEQUENCE operation fails (git-fixes).\n- NFSD: Skip close replay processing if XDR encoding fails (git-fixes).\n- NFSD: free copynotify stateid in nfs4_free_ol_stateid() (git-fixes).\n- NFSv4.1: fix mount hang after CREATE_SESSION failure (git-fixes).\n- NFSv4: handle ERR_GRACE on delegation recalls (git-fixes).\n- PCI/P2PDMA: Fix incorrect pointer usage in devm_kfree() call (stable-fixes).\n- PCI/PM: Skip resuming to D0 if device is disconnected (stable-fixes).\n- PCI: Disable MSI on RDC PCI to PCIe bridges (stable-fixes).\n- PCI: cadence: Check for the existence of cdns_pcie::ops before using it (stable-fixes).\n- PCI: dwc: Verify the single eDMA IRQ in dw_pcie_edma_irq_verify() (stable-fixes).\n- PCI: j721e: Fix incorrect error message in probe() (git-fixes).\n- PCI: rcar-host: Convert struct rcar_msi mask_lock into raw spinlock (git-fixes).\n- PCI: tegra194: Reset BARs when running in PCIe endpoint mode (git-fixes).\n- RDMA/bnxt_re: Don\u0027t fail destroy QP and cleanup debugfs earlier (git-fixes).\n- RDMA/bnxt_re: Fix a potential memory leak in destroy_gsi_sqp (git-fixes).\n- RDMA/hns: Fix recv CQ and QP cache affinity (git-fixes).\n- RDMA/hns: Fix the modification of max_send_sge (git-fixes).\n- RDMA/hns: Fix wrong WQE data when QP wraps around (git-fixes).\n- RDMA/irdma: Fix SD index calculation (git-fixes).\n- RDMA/irdma: Set irdma_cq cq_num field during CQ create (git-fixes).\n- accel/habanalabs/gaudi2: fix BMON disable configuration (stable-fixes).\n- accel/habanalabs/gaudi2: read preboot status after recovering from dirty state (stable-fixes).\n- accel/habanalabs: return ENOMEM if less than requested pages were pinned (stable-fixes).\n- accel/habanalabs: support mapping cb with vmalloc-backed coherent memory (stable-fixes).\n- acpi,srat: Fix incorrect device handle check for Generic Initiator (git-fixes).\n- amd/amdkfd: resolve a race in amdgpu_amdkfd_device_fini_sw (stable-fixes).\n- block: avoid possible overflow for chunk_sectors check in blk_stack_limits() (git-fixes).\n- block: fix kobject double initialization in add_disk (git-fixes).\n- btrfs: abort transaction on failure to add link to inode (git-fixes).\n- btrfs: avoid page_lockend underflow in btrfs_punch_hole_lock_range() (git-fix).\n- btrfs: avoid using fixed char array size for tree names (git-fix).\n- btrfs: do not update last_log_commit when logging inode due to a new name (git-fixes).\n- btrfs: fix COW handling in run_delalloc_nocow() (git-fix).\n- btrfs: fix inode leak on failure to add link to inode (git-fixes).\n- btrfs: make btrfs_clear_delalloc_extent() free delalloc reserve (git-fix).\n- btrfs: mark dirty extent range for out of bound prealloc extents (git-fixes).\n- btrfs: qgroup: correctly model root qgroup rsv in convert (git-fix).\n- btrfs: rename err to ret in btrfs_link() (git-fixes).\n- btrfs: run btrfs_error_commit_super() early (git-fix).\n- btrfs: scrub: put bio after errors in scrub_raid56_parity_stripe() (git-fix).\n- btrfs: scrub: put bio after errors in scrub_raid56_parity_stripe() (git-fixes).\n- btrfs: send: fix duplicated rmdir operations when using extrefs (git-fixes).\n- btrfs: set inode flag BTRFS_INODE_COPY_EVERYTHING when logging new name (git-fixes).\n- btrfs: simplify error handling logic for btrfs_link() (git-fixes).\n- btrfs: tree-checker: add dev extent item checks (git-fix).\n- btrfs: tree-checker: add type and sequence check for inline backrefs (git-fix).\n- btrfs: tree-checker: fix the wrong output of data backref objectid (git-fix).\n- btrfs: tree-checker: reject BTRFS_FT_UNKNOWN dir type (git-fix).\n- btrfs: tree-checker: validate dref root and objectid (git-fix).\n- btrfs: use smp_mb__after_atomic() when forcing COW in create_pending_snapshot() (git-fixes).\n- char: misc: Does not request module for miscdevice with dynamic minor (stable-fixes).\n- char: misc: Make misc_register() reentry for miscdevice who wants dynamic minor (stable-fixes).\n- char: misc: restrict the dynamic range to exclude reserved minors (stable-fixes).\n- cramfs: Verify inode mode when loading from disk (git-fixes).\n- crypto: aspeed - fix double free caused by devm (git-fixes).\n- crypto: aspeed-acry - Convert to platform remove callback returning void (stable-fixes).\n- crypto: hisilicon/qm - Fix device reference leak in qm_get_qos_value (git-fixes).\n- crypto: iaa - Do not clobber req-\u003ebase.data (git-fixes).\n- crypto: qat - use kcalloc() in qat_uclo_map_objs_from_mof() (stable-fixes).\n- dmaengine: dw-edma: Set status for callback_result (stable-fixes).\n- dmaengine: mv_xor: match alloc_wc and free_wc (stable-fixes).\n- drm/amd/display: Add AVI infoframe copy in copy_stream_update_to_stream (stable-fixes).\n- drm/amd/display: Disable VRR on DCE 6 (stable-fixes).\n- drm/amd/display: Fix DVI-D/HDMI adapters (stable-fixes).\n- drm/amd/display: Fix NULL deref in debugfs odm_combine_segments (git-fixes).\n- drm/amd/display: Fix black screen with HDMI outputs (git-fixes).\n- drm/amd/display: Increase AUX Intra-Hop Done Max Wait Duration (stable-fixes).\n- drm/amd/display: add more cyan skillfish devices (stable-fixes).\n- drm/amd/display: ensure committing streams is seamless (stable-fixes).\n- drm/amd/display: update dpp/disp clock from smu clock table (stable-fixes).\n- drm/amd/pm: Disable MCLK switching on SI at high pixel clocks (stable-fixes).\n- drm/amd/pm: Use cached metrics data on aldebaran (stable-fixes).\n- drm/amd/pm: Use cached metrics data on arcturus (stable-fixes).\n- drm/amd: Avoid evicting resources at S5 (stable-fixes).\n- drm/amd: Fix suspend failure with secure display TA (git-fixes).\n- drm/amd: add more cyan skillfish PCI ids (stable-fixes).\n- drm/amdgpu/jpeg: Hold pg_lock before jpeg poweroff (stable-fixes).\n- drm/amdgpu: Allow kfd CRIU with no buffer objects (stable-fixes).\n- drm/amdgpu: Fix NULL pointer dereference in VRAM logic for APU devices (stable-fixes).\n- drm/amdgpu: Use memdup_array_user in amdgpu_cs_wait_fences_ioctl (stable-fixes).\n- drm/amdgpu: add support for cyan skillfish gpu_info (stable-fixes).\n- drm/amdgpu: don\u0027t enable SMU on cyan skillfish (stable-fixes).\n- drm/amdgpu: reject gang submissions under SRIOV (stable-fixes).\n- drm/amdkfd: Handle lack of READ permissions in SVM mapping (stable-fixes).\n- drm/amdkfd: Tie UNMAP_LATENCY to queue_preemption (stable-fixes).\n- drm/amdkfd: fix vram allocation failure for a special case (stable-fixes).\n- drm/amdkfd: return -ENOTTY for unsupported IOCTLs (stable-fixes).\n- drm/bridge: cdns-dsi: Don\u0027t fail on MIPI_DSI_MODE_VIDEO_BURST (stable-fixes).\n- drm/bridge: cdns-dsi: Fix REG_WAKEUP_TIME value (stable-fixes).\n- drm/bridge: display-connector: don\u0027t set OP_DETECT for DisplayPorts (stable-fixes).\n- drm/i915: Avoid lock inversion when pinning to GGTT on CHV/BXT+VTD (git-fixes).\n- drm/i915: Fix conversion between clock ticks and nanoseconds (git-fixes).\n- drm/msm/dsi/phy: Toggle back buffer resync after preparing PLL (stable-fixes).\n- drm/msm/dsi/phy_7nm: Fix missing initial VCO rate (stable-fixes).\n- drm/msm: make sure to not queue up recovery more than once (stable-fixes).\n- drm/nouveau: replace snprintf() with scnprintf() in nvkm_snprintbf() (stable-fixes).\n- drm/sched: Fix deadlock in drm_sched_entity_kill_jobs_cb (git-fixes).\n- drm/tegra: Add call to put_pid() (git-fixes).\n- drm/tegra: dc: Fix reference leak in tegra_dc_couple() (git-fixes).\n- drm/tidss: Set crtc modesetting parameters with adjusted mode (stable-fixes).\n- drm/tidss: Use the crtc_* timings when programming the HW (stable-fixes).\n- drm/vmwgfx: Validate command header size against SVGA_CMD_MAX_DATASIZE (git-fixes).\n- exfat: limit log print for IO error (git-fixes).\n- extcon: adc-jack: Cleanup wakeup source only if it was enabled (git-fixes).\n- extcon: adc-jack: Fix wakeup source leaks on device unbind (stable-fixes).\n- fbcon: Set fb_display[i]-\u003emode to NULL when the mode is released (stable-fixes).\n- fbdev: Add bounds checking in bit_putcs to fix vmalloc-out-of-bounds (stable-fixes).\n- fbdev: bitblit: bound-check glyph index in bit_putcs* (stable-fixes).\n- fbdev: pvr2fb: Fix leftover reference to ONCHIP_NR_DMA_CHANNELS (stable-fixes).\n- hwmon: (asus-ec-sensors) increase timeout for locking ACPI mutex (stable-fixes).\n- hwmon: (dell-smm) Add support for Dell OptiPlex 7040 (stable-fixes).\n- hwmon: (k10temp) Add device ID for Strix Halo (stable-fixes).\n- hwmon: (k10temp) Add thermal support for AMD Family 1Ah-based models (stable-fixes).\n- hwmon: (sbtsi_temp) AMD CPU extended temperature range support (stable-fixes).\n- hwmon: sy7636a: add alias (stable-fixes).\n- iio: adc: imx93_adc: load calibrated values even calibration failed (stable-fixes).\n- iio: adc: spear_adc: mask SPEAR_ADC_STATUS channel and avg sample before setting register (stable-fixes).\n- ima: don\u0027t clear IMA_DIGSIG flag when setting or removing non-IMA xattr (stable-fixes).\n- iommu/amd: Return an error if vCPU affinity is set for non-vCPU IRTE (git-fixes).\n- isdn: mISDN: hfcsusb: fix memory leak in hfcsusb_probe() (git-fixes).\n- jfs: Verify inode mode when loading from disk (git-fixes).\n- jfs: fix uninitialized waitqueue in transaction manager (git-fixes).\n- lib/crypto: curve25519-hacl64: Fix older clang KASAN workaround for GCC (git-fixes).\n- md/raid1: fix data lost for writemostly rdev (git-fixes).\n- md: fix mssing blktrace bio split events (git-fixes).\n- media: adv7180: Add missing lock in suspend callback (stable-fixes).\n- media: adv7180: Do not write format to device in set_fmt (stable-fixes).\n- media: adv7180: Only validate format in querystd (stable-fixes).\n- media: amphion: Delete v4l2_fh synchronously in .release() (stable-fixes).\n- media: fix uninitialized symbol warnings (stable-fixes).\n- media: i2c: Kconfig: Ensure a dependency on HAVE_CLK for VIDEO_CAMERA_SENSOR (stable-fixes).\n- media: i2c: og01a1b: Specify monochrome media bus format instead of Bayer (stable-fixes).\n- media: imon: make send_packet() more robust (stable-fixes).\n- media: ov08x40: Fix the horizontal flip control (stable-fixes).\n- media: redrat3: use int type to store negative error codes (stable-fixes).\n- media: uvcvideo: Use heuristic to find stream entity (git-fixes).\n- memstick: Add timeout to prevent indefinite waiting (stable-fixes).\n- mfd: da9063: Split chip variant reading in two bus transactions (stable-fixes).\n- mfd: madera: Work around false-positive -Wininitialized warning (stable-fixes).\n- mfd: stmpe-i2c: Add missing MODULE_LICENSE (stable-fixes).\n- mfd: stmpe: Remove IRQ domain upon removal (stable-fixes).\n- minixfs: Verify inode mode when loading from disk (git-fixes).\n- mm/mm_init: fix hash table order logging in alloc_large_system_hash() (git-fixes).\n- mm/secretmem: fix use-after-free race in fault handler (git-fixes).\n- mmc: host: renesas_sdhi: Fix the actual clock (stable-fixes).\n- mmc: sdhci-msm: Enable tuning for SDR50 mode for SD card (stable-fixes).\n- mmc: sdhci-of-dwcmshc: Change DLL_STRBIN_TAPNUM_DEFAULT to 0x4 (git-fixes).\n- mtd: onenand: Pass correct pointer to IRQ handler (git-fixes).\n- mtd: rawnand: cadence: fix DMA device NULL pointer dereference (git-fixes).\n- mtdchar: fix integer overflow in read/write ioctls (git-fixes).\n- net/mana: fix warning in the writer of client oob (git-fixes).\n- net/smc: Remove validation of reserved bits in CLC Decline message (bsc#1253779).\n- net: nfc: nci: Increase NCI_DATA_TIMEOUT to 3000 ms (stable-fixes).\n- net: phy: clear link parameters on admin link down (stable-fixes).\n- net: phy: fixed_phy: let fixed_phy_unregister free the phy_device (stable-fixes).\n- net: phy: marvell: Fix 88e1510 downshift counter errata (stable-fixes).\n- net: tcp: send zero-window ACK when no memory (bsc#1253779).\n- net: usb: qmi_wwan: initialize MAC header offset in qmimux_rx_fixup (git-fixes).\n- nfs4_setup_readdir(): insufficient locking for -\u003ed_parent-\u003ed_inode dereferencing (git-fixes).\n- nfsd: do not defer requests during idmap lookup in v4 compound decode (bsc#1232223).\n- nfsd: fix return error codes for nfsd_map_name_to_id (bsc#1232223).\n- nouveau/firmware: Add missing kfree() of nvkm_falcon_fw::boot (git-fixes).\n- perf script: add --addr2line option (bsc#1247509).\n- phy: cadence: cdns-dphy: Enable lower resolutions in dphy (stable-fixes).\n- phy: renesas: r8a779f0-ether-serdes: add new step added to latest datasheet (stable-fixes).\n- phy: rockchip: phy-rockchip-inno-csidphy: allow writes to grf register 0 (stable-fixes).\n- pinctrl: s32cc: fix uninitialized memory in s32_pinctrl_desc (git-fixes).\n- pinctrl: s32cc: initialize gpio_pin_config::list after kmalloc() (git-fixes).\n- pinctrl: single: fix bias pull up/down handling in pin_config_set (stable-fixes).\n- platform/x86/intel/speed_select_if: Convert PCIBIOS_* return codes to errnos (git-fixes).\n- power: supply: qcom_battmgr: add OOI chemistry (stable-fixes).\n- power: supply: qcom_battmgr: handle charging state change notifications (stable-fixes).\n- power: supply: sbs-charger: Support multiple devices (stable-fixes).\n- regulator: fixed: fix GPIO descriptor leak on register failure (git-fixes).\n- rtc: rx8025: fix incorrect register reference (git-fixes).\n- s390/mm,fault: simplify kfence fault handling (bsc#1247076).\n- scsi: Fix sas_user_scan() to handle wildcard and multi-channel scans (git-fixes).\n- scsi: aacraid: Stop using PCI_IRQ_AFFINITY (git-fixes).\n- scsi: core: sysfs: Correct sysfs attributes access rights (git-fixes).\n- scsi: hpsa: Fix potential memory leak in hpsa_big_passthru_ioctl() (git-fixes).\n- scsi: libfc: Prevent integer overflow in fc_fcp_recv_data() (git-fixes).\n- scsi: mpi3mr: Correctly handle ATA device errors (git-fixes).\n- scsi: mpi3mr: Drop unnecessary volatile from __iomem pointers (git-fixes).\n- scsi: mpt3sas: Correctly handle ATA device errors (git-fixes).\n- scsi: mpt3sas: Fix crash in transport port remove by using ioc_info() (git-fixes).\n- scsi: pm80xx: Fix array-index-out-of-of-bounds on rmmod (git-fixes).\n- scsi: storvsc: Prefer returning channel with the same CPU as on the I/O issuing CPU (bsc#1252267).\n- selftests/bpf: Close fd in error path in drop_on_reuseport (git-fixes).\n- selftests/bpf: Close obj in error path in xdp_adjust_tail (git-fixes).\n- selftests/bpf: Fix missing ARRAY_SIZE() definition in bench.c (git-fixes).\n- selftests/bpf: Fix missing BUILD_BUG_ON() declaration (git-fixes).\n- selftests/bpf: Fix missing UINT_MAX definitions in benchmarks (git-fixes).\n- selftests/bpf: Fix string read in strncmp benchmark (git-fixes).\n- selftests/bpf: Mitigate sockmap_ktls disconnect_after_delete failure (git-fixes).\n- selftests/bpf: Use pid_t consistently in test_progs.c (git-fixes).\n- selftests/bpf: fix signedness bug in redir_partial() (git-fixes).\n- serial: 8250_exar: add support for Advantech 2 port card with Device ID 0x0018 (git-fixes).\n- serial: 8250_mtk: Enable baud clock and manage in runtime PM (git-fixes).\n- soc/tegra: fuse: Add Tegra114 nvmem cells and fuse lookups (stable-fixes).\n- soc: aspeed: socinfo: Add AST27xx silicon IDs (stable-fixes).\n- soc: qcom: smem: Fix endian-unaware access of num_entries (stable-fixes).\n- spi: Try to get ACPI GPIO IRQ earlier (git-fixes).\n- spi: loopback-test: Don\u0027t use %pK through printk (stable-fixes).\n- spi: rpc-if: Add resume support for RZ/G3E (stable-fixes).\n- strparser: Fix signed/unsigned mismatch bug (git-fixes).\n- tcp_bpf: Call sk_msg_free() when tcp_bpf_send_verdict() fails to allocate psock-\u003ecork (bsc#1250705).\n- thunderbolt: Use is_pciehp instead of is_hotplug_bridge (stable-fixes).\n- tools/cpupower: Fix incorrect size in cpuidle_state_disable() (stable-fixes).\n- tools/cpupower: fix error return value in cpupower_write_sysfs() (stable-fixes).\n- tools/power x86_energy_perf_policy: Enhance HWP enable (stable-fixes).\n- tools/power x86_energy_perf_policy: Fix incorrect fopen mode usage (stable-fixes).\n- tools/power x86_energy_perf_policy: Prefer driver HWP limits (stable-fixes).\n- tools: lib: thermal: don\u0027t preserve owner in install (stable-fixes).\n- tools: lib: thermal: use pkg-config to locate libnl3 (stable-fixes).\n- uio_hv_generic: Query the ringbuffer size for device (git-fixes).\n- usb/core/quirks: Add Huawei ME906S to wakeup quirk (git-fixes).\n- usb: cdns3: gadget: Use-after-free during failed initialization and exit of cdnsp gadget (stable-fixes).\n- usb: gadget: f_fs: Fix epfile null pointer access after ep enable (stable-fixes).\n- usb: gadget: f_hid: Fix zero length packet transfer (stable-fixes).\n- usb: gadget: f_ncm: Fix MAC assignment NCM ethernet (stable-fixes).\n- usb: mon: Increase BUFF_MAX to 64 MiB to support multi-MB URBs (stable-fixes).\n- usb: xhci: plat: Facilitate using autosuspend for xhci plat devices (stable-fixes).\n- video: backlight: lp855x_bl: Set correct EPROM start for LP8556 (stable-fixes).\n- watchdog: s3c2410_wdt: Fix max_timeout being calculated larger (stable-fixes).\n- wifi: ath10k: Fix connection after GTK rekeying (stable-fixes).\n- wifi: ath11k: zero init info-\u003estatus in wmi_process_mgmt_tx_comp() (git-fixes).\n- wifi: ath12k: Increase DP_REO_CMD_RING_SIZE to 256 (stable-fixes).\n- wifi: mac80211: Fix HE capabilities element check (stable-fixes).\n- wifi: mac80211: reject address change while connecting (git-fixes).\n- wifi: mac80211: skip rate verification for not captured PSDUs (git-fixes).\n- wifi: mac80211_hwsim: Limit destroy_on_close radio removal to netgroup (git-fixes).\n- wifi: mt76: mt7921: Add 160MHz beamformee capability for mt7922 device (stable-fixes).\n- wifi: mt76: mt7996: Temporarily disable EPCS (stable-fixes).\n- wifi: mwl8k: inject DSSS Parameter Set element into beacons if missing (git-fixes).\n- wifi: rtw88: sdio: use indirect IO for device registers before power-on (stable-fixes).\n- wifi: zd1211rw: fix potential memory leak in __zd_usb_enable_rx() (git-fixes).\n- x86/CPU/AMD: Add RDSEED fix for Zen5 (git-fixes).\n- x86/CPU/AMD: Add additional fixed RDSEED microcode revisions (git-fixes).\n- x86/CPU/AMD: Add missing terminator for zen5_rdseed_microcode (git-fixes).\n- x86/CPU/AMD: Do the common init on future Zens too (git-fixes).\n- x86/amd_nb: Add new PCI IDs for AMD family 0x1a (stable-fixes).\n- x86/bugs: Fix reporting of LFENCE retpoline (git-fixes).\n- x86/bugs: Report correct retbleed mitigation status (git-fixes).\n- x86/vmscape: Add old Intel CPUs to affected list (git-fixes).\n- xhci: dbc: Allow users to modify DbC poll interval via sysfs (stable-fixes).\n- xhci: dbc: Avoid event polling busyloop if pending rx transfers are inactive (git-fixes).\n- xhci: dbc: Improve performance by removing delay in transfer event polling (stable-fixes).\n- xhci: dbc: fix bogus 1024 byte prefix if ttyDBC read races with stall event (git-fixes).\n- xhci: dbc: poll at different rate depending on data transfer activity (stable-fixes).\n",
"title": "Description of the patch"
},
{
"category": "details",
"text": "SUSE-2025-4422,SUSE-SLE-Module-Basesystem-15-SP6-2025-4422,SUSE-SLE-Module-Development-Tools-15-SP6-2025-4422,SUSE-SLE-Module-Legacy-15-SP6-2025-4422,SUSE-SLE-Module-Live-Patching-15-SP6-2025-4422,SUSE-SLE-Product-HA-15-SP6-2025-4422,SUSE-SLE-Product-WE-15-SP6-2025-4422,openSUSE-SLE-15.6-2025-4422",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2025_4422-1.json"
},
{
"category": "self",
"summary": "URL for SUSE-SU-2025:4422-1",
"url": "https://www.suse.com/support/update/announcement/2025/suse-su-20254422-1/"
},
{
"category": "self",
"summary": "E-Mail link for SUSE-SU-2025:4422-1",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-December/023573.html"
},
{
"category": "self",
"summary": "SUSE Bug 1232223",
"url": "https://bugzilla.suse.com/1232223"
},
{
"category": "self",
"summary": "SUSE Bug 1237888",
"url": "https://bugzilla.suse.com/1237888"
},
{
"category": "self",
"summary": "SUSE Bug 1243474",
"url": "https://bugzilla.suse.com/1243474"
},
{
"category": "self",
"summary": "SUSE Bug 1245193",
"url": "https://bugzilla.suse.com/1245193"
},
{
"category": "self",
"summary": "SUSE Bug 1247076",
"url": "https://bugzilla.suse.com/1247076"
},
{
"category": "self",
"summary": "SUSE Bug 1247079",
"url": "https://bugzilla.suse.com/1247079"
},
{
"category": "self",
"summary": "SUSE Bug 1247500",
"url": "https://bugzilla.suse.com/1247500"
},
{
"category": "self",
"summary": "SUSE Bug 1247509",
"url": "https://bugzilla.suse.com/1247509"
},
{
"category": "self",
"summary": "SUSE Bug 1249547",
"url": "https://bugzilla.suse.com/1249547"
},
{
"category": "self",
"summary": "SUSE Bug 1249912",
"url": "https://bugzilla.suse.com/1249912"
},
{
"category": "self",
"summary": "SUSE Bug 1249982",
"url": "https://bugzilla.suse.com/1249982"
},
{
"category": "self",
"summary": "SUSE Bug 1250176",
"url": "https://bugzilla.suse.com/1250176"
},
{
"category": "self",
"summary": "SUSE Bug 1250237",
"url": "https://bugzilla.suse.com/1250237"
},
{
"category": "self",
"summary": "SUSE Bug 1250252",
"url": "https://bugzilla.suse.com/1250252"
},
{
"category": "self",
"summary": "SUSE Bug 1250705",
"url": "https://bugzilla.suse.com/1250705"
},
{
"category": "self",
"summary": "SUSE Bug 1251120",
"url": "https://bugzilla.suse.com/1251120"
},
{
"category": "self",
"summary": "SUSE Bug 1251786",
"url": "https://bugzilla.suse.com/1251786"
},
{
"category": "self",
"summary": "SUSE Bug 1252063",
"url": "https://bugzilla.suse.com/1252063"
},
{
"category": "self",
"summary": "SUSE Bug 1252267",
"url": "https://bugzilla.suse.com/1252267"
},
{
"category": "self",
"summary": "SUSE Bug 1252303",
"url": "https://bugzilla.suse.com/1252303"
},
{
"category": "self",
"summary": "SUSE Bug 1252353",
"url": "https://bugzilla.suse.com/1252353"
},
{
"category": "self",
"summary": "SUSE Bug 1252681",
"url": "https://bugzilla.suse.com/1252681"
},
{
"category": "self",
"summary": "SUSE Bug 1252763",
"url": "https://bugzilla.suse.com/1252763"
},
{
"category": "self",
"summary": "SUSE Bug 1252773",
"url": "https://bugzilla.suse.com/1252773"
},
{
"category": "self",
"summary": "SUSE Bug 1252780",
"url": "https://bugzilla.suse.com/1252780"
},
{
"category": "self",
"summary": "SUSE Bug 1252794",
"url": "https://bugzilla.suse.com/1252794"
},
{
"category": "self",
"summary": "SUSE Bug 1252795",
"url": "https://bugzilla.suse.com/1252795"
},
{
"category": "self",
"summary": "SUSE Bug 1252809",
"url": "https://bugzilla.suse.com/1252809"
},
{
"category": "self",
"summary": "SUSE Bug 1252817",
"url": "https://bugzilla.suse.com/1252817"
},
{
"category": "self",
"summary": "SUSE Bug 1252821",
"url": "https://bugzilla.suse.com/1252821"
},
{
"category": "self",
"summary": "SUSE Bug 1252836",
"url": "https://bugzilla.suse.com/1252836"
},
{
"category": "self",
"summary": "SUSE Bug 1252845",
"url": "https://bugzilla.suse.com/1252845"
},
{
"category": "self",
"summary": "SUSE Bug 1252862",
"url": "https://bugzilla.suse.com/1252862"
},
{
"category": "self",
"summary": "SUSE Bug 1252912",
"url": "https://bugzilla.suse.com/1252912"
},
{
"category": "self",
"summary": "SUSE Bug 1252917",
"url": "https://bugzilla.suse.com/1252917"
},
{
"category": "self",
"summary": "SUSE Bug 1252928",
"url": "https://bugzilla.suse.com/1252928"
},
{
"category": "self",
"summary": "SUSE Bug 1253018",
"url": "https://bugzilla.suse.com/1253018"
},
{
"category": "self",
"summary": "SUSE Bug 1253176",
"url": "https://bugzilla.suse.com/1253176"
},
{
"category": "self",
"summary": "SUSE Bug 1253275",
"url": "https://bugzilla.suse.com/1253275"
},
{
"category": "self",
"summary": "SUSE Bug 1253318",
"url": "https://bugzilla.suse.com/1253318"
},
{
"category": "self",
"summary": "SUSE Bug 1253324",
"url": "https://bugzilla.suse.com/1253324"
},
{
"category": "self",
"summary": "SUSE Bug 1253349",
"url": "https://bugzilla.suse.com/1253349"
},
{
"category": "self",
"summary": "SUSE Bug 1253352",
"url": "https://bugzilla.suse.com/1253352"
},
{
"category": "self",
"summary": "SUSE Bug 1253355",
"url": "https://bugzilla.suse.com/1253355"
},
{
"category": "self",
"summary": "SUSE Bug 1253360",
"url": "https://bugzilla.suse.com/1253360"
},
{
"category": "self",
"summary": "SUSE Bug 1253362",
"url": "https://bugzilla.suse.com/1253362"
},
{
"category": "self",
"summary": "SUSE Bug 1253363",
"url": "https://bugzilla.suse.com/1253363"
},
{
"category": "self",
"summary": "SUSE Bug 1253367",
"url": "https://bugzilla.suse.com/1253367"
},
{
"category": "self",
"summary": "SUSE Bug 1253369",
"url": "https://bugzilla.suse.com/1253369"
},
{
"category": "self",
"summary": "SUSE Bug 1253393",
"url": "https://bugzilla.suse.com/1253393"
},
{
"category": "self",
"summary": "SUSE Bug 1253395",
"url": "https://bugzilla.suse.com/1253395"
},
{
"category": "self",
"summary": "SUSE Bug 1253403",
"url": "https://bugzilla.suse.com/1253403"
},
{
"category": "self",
"summary": "SUSE Bug 1253407",
"url": "https://bugzilla.suse.com/1253407"
},
{
"category": "self",
"summary": "SUSE Bug 1253409",
"url": "https://bugzilla.suse.com/1253409"
},
{
"category": "self",
"summary": "SUSE Bug 1253412",
"url": "https://bugzilla.suse.com/1253412"
},
{
"category": "self",
"summary": "SUSE Bug 1253416",
"url": "https://bugzilla.suse.com/1253416"
},
{
"category": "self",
"summary": "SUSE Bug 1253421",
"url": "https://bugzilla.suse.com/1253421"
},
{
"category": "self",
"summary": "SUSE Bug 1253423",
"url": "https://bugzilla.suse.com/1253423"
},
{
"category": "self",
"summary": "SUSE Bug 1253424",
"url": "https://bugzilla.suse.com/1253424"
},
{
"category": "self",
"summary": "SUSE Bug 1253425",
"url": "https://bugzilla.suse.com/1253425"
},
{
"category": "self",
"summary": "SUSE Bug 1253427",
"url": "https://bugzilla.suse.com/1253427"
},
{
"category": "self",
"summary": "SUSE Bug 1253428",
"url": "https://bugzilla.suse.com/1253428"
},
{
"category": "self",
"summary": "SUSE Bug 1253431",
"url": "https://bugzilla.suse.com/1253431"
},
{
"category": "self",
"summary": "SUSE Bug 1253436",
"url": "https://bugzilla.suse.com/1253436"
},
{
"category": "self",
"summary": "SUSE Bug 1253438",
"url": "https://bugzilla.suse.com/1253438"
},
{
"category": "self",
"summary": "SUSE Bug 1253440",
"url": "https://bugzilla.suse.com/1253440"
},
{
"category": "self",
"summary": "SUSE Bug 1253441",
"url": "https://bugzilla.suse.com/1253441"
},
{
"category": "self",
"summary": "SUSE Bug 1253445",
"url": "https://bugzilla.suse.com/1253445"
},
{
"category": "self",
"summary": "SUSE Bug 1253448",
"url": "https://bugzilla.suse.com/1253448"
},
{
"category": "self",
"summary": "SUSE Bug 1253449",
"url": "https://bugzilla.suse.com/1253449"
},
{
"category": "self",
"summary": "SUSE Bug 1253453",
"url": "https://bugzilla.suse.com/1253453"
},
{
"category": "self",
"summary": "SUSE Bug 1253456",
"url": "https://bugzilla.suse.com/1253456"
},
{
"category": "self",
"summary": "SUSE Bug 1253472",
"url": "https://bugzilla.suse.com/1253472"
},
{
"category": "self",
"summary": "SUSE Bug 1253779",
"url": "https://bugzilla.suse.com/1253779"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-50253 page",
"url": "https://www.suse.com/security/cve/CVE-2022-50253/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2023-53676 page",
"url": "https://www.suse.com/security/cve/CVE-2023-53676/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-21710 page",
"url": "https://www.suse.com/security/cve/CVE-2025-21710/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-37916 page",
"url": "https://www.suse.com/security/cve/CVE-2025-37916/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-38359 page",
"url": "https://www.suse.com/security/cve/CVE-2025-38359/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-38361 page",
"url": "https://www.suse.com/security/cve/CVE-2025-38361/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-39788 page",
"url": "https://www.suse.com/security/cve/CVE-2025-39788/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-39805 page",
"url": "https://www.suse.com/security/cve/CVE-2025-39805/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-39819 page",
"url": "https://www.suse.com/security/cve/CVE-2025-39819/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-39859 page",
"url": "https://www.suse.com/security/cve/CVE-2025-39859/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-39944 page",
"url": "https://www.suse.com/security/cve/CVE-2025-39944/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-39980 page",
"url": "https://www.suse.com/security/cve/CVE-2025-39980/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40001 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40001/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40021 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40021/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40027 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40027/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40030 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40030/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40038 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40038/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40040 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40040/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40048 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40048/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40055 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40055/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40059 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40059/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40064 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40064/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40070 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40070/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40074 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40074/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40075 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40075/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40083 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40083/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40098 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40098/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40105 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40105/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40107 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40107/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40109 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40109/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40110 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40110/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40111 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40111/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40115 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40115/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40116 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40116/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40118 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40118/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40120 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40120/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40121 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40121/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40127 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40127/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40129 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40129/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40139 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40139/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40140 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40140/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40141 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40141/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40149 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40149/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40154 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40154/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40156 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40156/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40157 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40157/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40159 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40159/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40164 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40164/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40168 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40168/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40169 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40169/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40171 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40171/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40172 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40172/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40173 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40173/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40176 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40176/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40180 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40180/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40183 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40183/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40186 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40186/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40188 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40188/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40194 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40194/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40198 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40198/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40200 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40200/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40204 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40204/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40205 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40205/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40206 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40206/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40207 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40207/"
}
],
"title": "Security update for the Linux Kernel",
"tracking": {
"current_release_date": "2025-12-17T10:52:47Z",
"generator": {
"date": "2025-12-17T10:52:47Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "SUSE-SU-2025:4422-1",
"initial_release_date": "2025-12-17T10:52:47Z",
"revision_history": [
{
"date": "2025-12-17T10:52:47Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "cluster-md-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"product": {
"name": "cluster-md-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"product_id": "cluster-md-kmp-64kb-6.4.0-150600.23.81.3.aarch64"
}
},
{
"category": "product_version",
"name": "cluster-md-kmp-default-6.4.0-150600.23.81.3.aarch64",
"product": {
"name": "cluster-md-kmp-default-6.4.0-150600.23.81.3.aarch64",
"product_id": "cluster-md-kmp-default-6.4.0-150600.23.81.3.aarch64"
}
},
{
"category": "product_version",
"name": "dlm-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"product": {
"name": "dlm-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"product_id": "dlm-kmp-64kb-6.4.0-150600.23.81.3.aarch64"
}
},
{
"category": "product_version",
"name": "dlm-kmp-default-6.4.0-150600.23.81.3.aarch64",
"product": {
"name": "dlm-kmp-default-6.4.0-150600.23.81.3.aarch64",
"product_id": "dlm-kmp-default-6.4.0-150600.23.81.3.aarch64"
}
},
{
"category": "product_version",
"name": "dtb-allwinner-6.4.0-150600.23.81.1.aarch64",
"product": {
"name": "dtb-allwinner-6.4.0-150600.23.81.1.aarch64",
"product_id": "dtb-allwinner-6.4.0-150600.23.81.1.aarch64"
}
},
{
"category": "product_version",
"name": "dtb-altera-6.4.0-150600.23.81.1.aarch64",
"product": {
"name": "dtb-altera-6.4.0-150600.23.81.1.aarch64",
"product_id": "dtb-altera-6.4.0-150600.23.81.1.aarch64"
}
},
{
"category": "product_version",
"name": "dtb-amazon-6.4.0-150600.23.81.1.aarch64",
"product": {
"name": "dtb-amazon-6.4.0-150600.23.81.1.aarch64",
"product_id": "dtb-amazon-6.4.0-150600.23.81.1.aarch64"
}
},
{
"category": "product_version",
"name": "dtb-amd-6.4.0-150600.23.81.1.aarch64",
"product": {
"name": "dtb-amd-6.4.0-150600.23.81.1.aarch64",
"product_id": "dtb-amd-6.4.0-150600.23.81.1.aarch64"
}
},
{
"category": "product_version",
"name": "dtb-amlogic-6.4.0-150600.23.81.1.aarch64",
"product": {
"name": "dtb-amlogic-6.4.0-150600.23.81.1.aarch64",
"product_id": "dtb-amlogic-6.4.0-150600.23.81.1.aarch64"
}
},
{
"category": "product_version",
"name": "dtb-apm-6.4.0-150600.23.81.1.aarch64",
"product": {
"name": "dtb-apm-6.4.0-150600.23.81.1.aarch64",
"product_id": "dtb-apm-6.4.0-150600.23.81.1.aarch64"
}
},
{
"category": "product_version",
"name": "dtb-apple-6.4.0-150600.23.81.1.aarch64",
"product": {
"name": "dtb-apple-6.4.0-150600.23.81.1.aarch64",
"product_id": "dtb-apple-6.4.0-150600.23.81.1.aarch64"
}
},
{
"category": "product_version",
"name": "dtb-arm-6.4.0-150600.23.81.1.aarch64",
"product": {
"name": "dtb-arm-6.4.0-150600.23.81.1.aarch64",
"product_id": "dtb-arm-6.4.0-150600.23.81.1.aarch64"
}
},
{
"category": "product_version",
"name": "dtb-broadcom-6.4.0-150600.23.81.1.aarch64",
"product": {
"name": "dtb-broadcom-6.4.0-150600.23.81.1.aarch64",
"product_id": "dtb-broadcom-6.4.0-150600.23.81.1.aarch64"
}
},
{
"category": "product_version",
"name": "dtb-cavium-6.4.0-150600.23.81.1.aarch64",
"product": {
"name": "dtb-cavium-6.4.0-150600.23.81.1.aarch64",
"product_id": "dtb-cavium-6.4.0-150600.23.81.1.aarch64"
}
},
{
"category": "product_version",
"name": "dtb-exynos-6.4.0-150600.23.81.1.aarch64",
"product": {
"name": "dtb-exynos-6.4.0-150600.23.81.1.aarch64",
"product_id": "dtb-exynos-6.4.0-150600.23.81.1.aarch64"
}
},
{
"category": "product_version",
"name": "dtb-freescale-6.4.0-150600.23.81.1.aarch64",
"product": {
"name": "dtb-freescale-6.4.0-150600.23.81.1.aarch64",
"product_id": "dtb-freescale-6.4.0-150600.23.81.1.aarch64"
}
},
{
"category": "product_version",
"name": "dtb-hisilicon-6.4.0-150600.23.81.1.aarch64",
"product": {
"name": "dtb-hisilicon-6.4.0-150600.23.81.1.aarch64",
"product_id": "dtb-hisilicon-6.4.0-150600.23.81.1.aarch64"
}
},
{
"category": "product_version",
"name": "dtb-lg-6.4.0-150600.23.81.1.aarch64",
"product": {
"name": "dtb-lg-6.4.0-150600.23.81.1.aarch64",
"product_id": "dtb-lg-6.4.0-150600.23.81.1.aarch64"
}
},
{
"category": "product_version",
"name": "dtb-marvell-6.4.0-150600.23.81.1.aarch64",
"product": {
"name": "dtb-marvell-6.4.0-150600.23.81.1.aarch64",
"product_id": "dtb-marvell-6.4.0-150600.23.81.1.aarch64"
}
},
{
"category": "product_version",
"name": "dtb-mediatek-6.4.0-150600.23.81.1.aarch64",
"product": {
"name": "dtb-mediatek-6.4.0-150600.23.81.1.aarch64",
"product_id": "dtb-mediatek-6.4.0-150600.23.81.1.aarch64"
}
},
{
"category": "product_version",
"name": "dtb-nvidia-6.4.0-150600.23.81.1.aarch64",
"product": {
"name": "dtb-nvidia-6.4.0-150600.23.81.1.aarch64",
"product_id": "dtb-nvidia-6.4.0-150600.23.81.1.aarch64"
}
},
{
"category": "product_version",
"name": "dtb-qcom-6.4.0-150600.23.81.1.aarch64",
"product": {
"name": "dtb-qcom-6.4.0-150600.23.81.1.aarch64",
"product_id": "dtb-qcom-6.4.0-150600.23.81.1.aarch64"
}
},
{
"category": "product_version",
"name": "dtb-renesas-6.4.0-150600.23.81.1.aarch64",
"product": {
"name": "dtb-renesas-6.4.0-150600.23.81.1.aarch64",
"product_id": "dtb-renesas-6.4.0-150600.23.81.1.aarch64"
}
},
{
"category": "product_version",
"name": "dtb-rockchip-6.4.0-150600.23.81.1.aarch64",
"product": {
"name": "dtb-rockchip-6.4.0-150600.23.81.1.aarch64",
"product_id": "dtb-rockchip-6.4.0-150600.23.81.1.aarch64"
}
},
{
"category": "product_version",
"name": "dtb-socionext-6.4.0-150600.23.81.1.aarch64",
"product": {
"name": "dtb-socionext-6.4.0-150600.23.81.1.aarch64",
"product_id": "dtb-socionext-6.4.0-150600.23.81.1.aarch64"
}
},
{
"category": "product_version",
"name": "dtb-sprd-6.4.0-150600.23.81.1.aarch64",
"product": {
"name": "dtb-sprd-6.4.0-150600.23.81.1.aarch64",
"product_id": "dtb-sprd-6.4.0-150600.23.81.1.aarch64"
}
},
{
"category": "product_version",
"name": "dtb-xilinx-6.4.0-150600.23.81.1.aarch64",
"product": {
"name": "dtb-xilinx-6.4.0-150600.23.81.1.aarch64",
"product_id": "dtb-xilinx-6.4.0-150600.23.81.1.aarch64"
}
},
{
"category": "product_version",
"name": "gfs2-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"product": {
"name": "gfs2-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"product_id": "gfs2-kmp-64kb-6.4.0-150600.23.81.3.aarch64"
}
},
{
"category": "product_version",
"name": "gfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"product": {
"name": "gfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"product_id": "gfs2-kmp-default-6.4.0-150600.23.81.3.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-64kb-6.4.0-150600.23.81.3.aarch64",
"product": {
"name": "kernel-64kb-6.4.0-150600.23.81.3.aarch64",
"product_id": "kernel-64kb-6.4.0-150600.23.81.3.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-64kb-devel-6.4.0-150600.23.81.3.aarch64",
"product": {
"name": "kernel-64kb-devel-6.4.0-150600.23.81.3.aarch64",
"product_id": "kernel-64kb-devel-6.4.0-150600.23.81.3.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-64kb-extra-6.4.0-150600.23.81.3.aarch64",
"product": {
"name": "kernel-64kb-extra-6.4.0-150600.23.81.3.aarch64",
"product_id": "kernel-64kb-extra-6.4.0-150600.23.81.3.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-64kb-optional-6.4.0-150600.23.81.3.aarch64",
"product": {
"name": "kernel-64kb-optional-6.4.0-150600.23.81.3.aarch64",
"product_id": "kernel-64kb-optional-6.4.0-150600.23.81.3.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-default-6.4.0-150600.23.81.3.aarch64",
"product": {
"name": "kernel-default-6.4.0-150600.23.81.3.aarch64",
"product_id": "kernel-default-6.4.0-150600.23.81.3.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.aarch64",
"product": {
"name": "kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.aarch64",
"product_id": "kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-default-base-rebuild-6.4.0-150600.23.81.3.150600.12.36.3.aarch64",
"product": {
"name": "kernel-default-base-rebuild-6.4.0-150600.23.81.3.150600.12.36.3.aarch64",
"product_id": "kernel-default-base-rebuild-6.4.0-150600.23.81.3.150600.12.36.3.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-default-devel-6.4.0-150600.23.81.3.aarch64",
"product": {
"name": "kernel-default-devel-6.4.0-150600.23.81.3.aarch64",
"product_id": "kernel-default-devel-6.4.0-150600.23.81.3.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-default-extra-6.4.0-150600.23.81.3.aarch64",
"product": {
"name": "kernel-default-extra-6.4.0-150600.23.81.3.aarch64",
"product_id": "kernel-default-extra-6.4.0-150600.23.81.3.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-default-livepatch-6.4.0-150600.23.81.3.aarch64",
"product": {
"name": "kernel-default-livepatch-6.4.0-150600.23.81.3.aarch64",
"product_id": "kernel-default-livepatch-6.4.0-150600.23.81.3.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-default-optional-6.4.0-150600.23.81.3.aarch64",
"product": {
"name": "kernel-default-optional-6.4.0-150600.23.81.3.aarch64",
"product_id": "kernel-default-optional-6.4.0-150600.23.81.3.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-kvmsmall-6.4.0-150600.23.81.3.aarch64",
"product": {
"name": "kernel-kvmsmall-6.4.0-150600.23.81.3.aarch64",
"product_id": "kernel-kvmsmall-6.4.0-150600.23.81.3.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-kvmsmall-devel-6.4.0-150600.23.81.3.aarch64",
"product": {
"name": "kernel-kvmsmall-devel-6.4.0-150600.23.81.3.aarch64",
"product_id": "kernel-kvmsmall-devel-6.4.0-150600.23.81.3.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-obs-build-6.4.0-150600.23.81.3.aarch64",
"product": {
"name": "kernel-obs-build-6.4.0-150600.23.81.3.aarch64",
"product_id": "kernel-obs-build-6.4.0-150600.23.81.3.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-obs-qa-6.4.0-150600.23.81.1.aarch64",
"product": {
"name": "kernel-obs-qa-6.4.0-150600.23.81.1.aarch64",
"product_id": "kernel-obs-qa-6.4.0-150600.23.81.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-syms-6.4.0-150600.23.81.1.aarch64",
"product": {
"name": "kernel-syms-6.4.0-150600.23.81.1.aarch64",
"product_id": "kernel-syms-6.4.0-150600.23.81.1.aarch64"
}
},
{
"category": "product_version",
"name": "kselftests-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"product": {
"name": "kselftests-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"product_id": "kselftests-kmp-64kb-6.4.0-150600.23.81.3.aarch64"
}
},
{
"category": "product_version",
"name": "kselftests-kmp-default-6.4.0-150600.23.81.3.aarch64",
"product": {
"name": "kselftests-kmp-default-6.4.0-150600.23.81.3.aarch64",
"product_id": "kselftests-kmp-default-6.4.0-150600.23.81.3.aarch64"
}
},
{
"category": "product_version",
"name": "ocfs2-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"product": {
"name": "ocfs2-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"product_id": "ocfs2-kmp-64kb-6.4.0-150600.23.81.3.aarch64"
}
},
{
"category": "product_version",
"name": "ocfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"product": {
"name": "ocfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"product_id": "ocfs2-kmp-default-6.4.0-150600.23.81.3.aarch64"
}
},
{
"category": "product_version",
"name": "reiserfs-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"product": {
"name": "reiserfs-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"product_id": "reiserfs-kmp-64kb-6.4.0-150600.23.81.3.aarch64"
}
},
{
"category": "product_version",
"name": "reiserfs-kmp-default-6.4.0-150600.23.81.3.aarch64",
"product": {
"name": "reiserfs-kmp-default-6.4.0-150600.23.81.3.aarch64",
"product_id": "reiserfs-kmp-default-6.4.0-150600.23.81.3.aarch64"
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-devel-6.4.0-150600.23.81.2.noarch",
"product": {
"name": "kernel-devel-6.4.0-150600.23.81.2.noarch",
"product_id": "kernel-devel-6.4.0-150600.23.81.2.noarch"
}
},
{
"category": "product_version",
"name": "kernel-docs-6.4.0-150600.23.81.1.noarch",
"product": {
"name": "kernel-docs-6.4.0-150600.23.81.1.noarch",
"product_id": "kernel-docs-6.4.0-150600.23.81.1.noarch"
}
},
{
"category": "product_version",
"name": "kernel-docs-html-6.4.0-150600.23.81.1.noarch",
"product": {
"name": "kernel-docs-html-6.4.0-150600.23.81.1.noarch",
"product_id": "kernel-docs-html-6.4.0-150600.23.81.1.noarch"
}
},
{
"category": "product_version",
"name": "kernel-macros-6.4.0-150600.23.81.2.noarch",
"product": {
"name": "kernel-macros-6.4.0-150600.23.81.2.noarch",
"product_id": "kernel-macros-6.4.0-150600.23.81.2.noarch"
}
},
{
"category": "product_version",
"name": "kernel-source-6.4.0-150600.23.81.2.noarch",
"product": {
"name": "kernel-source-6.4.0-150600.23.81.2.noarch",
"product_id": "kernel-source-6.4.0-150600.23.81.2.noarch"
}
},
{
"category": "product_version",
"name": "kernel-source-vanilla-6.4.0-150600.23.81.2.noarch",
"product": {
"name": "kernel-source-vanilla-6.4.0-150600.23.81.2.noarch",
"product_id": "kernel-source-vanilla-6.4.0-150600.23.81.2.noarch"
}
}
],
"category": "architecture",
"name": "noarch"
},
{
"branches": [
{
"category": "product_version",
"name": "cluster-md-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"product": {
"name": "cluster-md-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"product_id": "cluster-md-kmp-default-6.4.0-150600.23.81.3.ppc64le"
}
},
{
"category": "product_version",
"name": "dlm-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"product": {
"name": "dlm-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"product_id": "dlm-kmp-default-6.4.0-150600.23.81.3.ppc64le"
}
},
{
"category": "product_version",
"name": "gfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"product": {
"name": "gfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"product_id": "gfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-debug-6.4.0-150600.23.81.3.ppc64le",
"product": {
"name": "kernel-debug-6.4.0-150600.23.81.3.ppc64le",
"product_id": "kernel-debug-6.4.0-150600.23.81.3.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-debug-devel-6.4.0-150600.23.81.3.ppc64le",
"product": {
"name": "kernel-debug-devel-6.4.0-150600.23.81.3.ppc64le",
"product_id": "kernel-debug-devel-6.4.0-150600.23.81.3.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-default-6.4.0-150600.23.81.3.ppc64le",
"product": {
"name": "kernel-default-6.4.0-150600.23.81.3.ppc64le",
"product_id": "kernel-default-6.4.0-150600.23.81.3.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.ppc64le",
"product": {
"name": "kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.ppc64le",
"product_id": "kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-default-base-rebuild-6.4.0-150600.23.81.3.150600.12.36.3.ppc64le",
"product": {
"name": "kernel-default-base-rebuild-6.4.0-150600.23.81.3.150600.12.36.3.ppc64le",
"product_id": "kernel-default-base-rebuild-6.4.0-150600.23.81.3.150600.12.36.3.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-default-devel-6.4.0-150600.23.81.3.ppc64le",
"product": {
"name": "kernel-default-devel-6.4.0-150600.23.81.3.ppc64le",
"product_id": "kernel-default-devel-6.4.0-150600.23.81.3.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-default-extra-6.4.0-150600.23.81.3.ppc64le",
"product": {
"name": "kernel-default-extra-6.4.0-150600.23.81.3.ppc64le",
"product_id": "kernel-default-extra-6.4.0-150600.23.81.3.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-default-livepatch-6.4.0-150600.23.81.3.ppc64le",
"product": {
"name": "kernel-default-livepatch-6.4.0-150600.23.81.3.ppc64le",
"product_id": "kernel-default-livepatch-6.4.0-150600.23.81.3.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-default-livepatch-devel-6.4.0-150600.23.81.3.ppc64le",
"product": {
"name": "kernel-default-livepatch-devel-6.4.0-150600.23.81.3.ppc64le",
"product_id": "kernel-default-livepatch-devel-6.4.0-150600.23.81.3.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-default-optional-6.4.0-150600.23.81.3.ppc64le",
"product": {
"name": "kernel-default-optional-6.4.0-150600.23.81.3.ppc64le",
"product_id": "kernel-default-optional-6.4.0-150600.23.81.3.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-kvmsmall-6.4.0-150600.23.81.3.ppc64le",
"product": {
"name": "kernel-kvmsmall-6.4.0-150600.23.81.3.ppc64le",
"product_id": "kernel-kvmsmall-6.4.0-150600.23.81.3.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-kvmsmall-devel-6.4.0-150600.23.81.3.ppc64le",
"product": {
"name": "kernel-kvmsmall-devel-6.4.0-150600.23.81.3.ppc64le",
"product_id": "kernel-kvmsmall-devel-6.4.0-150600.23.81.3.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-livepatch-6_4_0-150600_23_81-default-1-150600.13.3.3.ppc64le",
"product": {
"name": "kernel-livepatch-6_4_0-150600_23_81-default-1-150600.13.3.3.ppc64le",
"product_id": "kernel-livepatch-6_4_0-150600_23_81-default-1-150600.13.3.3.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-obs-build-6.4.0-150600.23.81.3.ppc64le",
"product": {
"name": "kernel-obs-build-6.4.0-150600.23.81.3.ppc64le",
"product_id": "kernel-obs-build-6.4.0-150600.23.81.3.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-obs-qa-6.4.0-150600.23.81.1.ppc64le",
"product": {
"name": "kernel-obs-qa-6.4.0-150600.23.81.1.ppc64le",
"product_id": "kernel-obs-qa-6.4.0-150600.23.81.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-syms-6.4.0-150600.23.81.1.ppc64le",
"product": {
"name": "kernel-syms-6.4.0-150600.23.81.1.ppc64le",
"product_id": "kernel-syms-6.4.0-150600.23.81.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kselftests-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"product": {
"name": "kselftests-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"product_id": "kselftests-kmp-default-6.4.0-150600.23.81.3.ppc64le"
}
},
{
"category": "product_version",
"name": "ocfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"product": {
"name": "ocfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"product_id": "ocfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le"
}
},
{
"category": "product_version",
"name": "reiserfs-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"product": {
"name": "reiserfs-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"product_id": "reiserfs-kmp-default-6.4.0-150600.23.81.3.ppc64le"
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "cluster-md-kmp-default-6.4.0-150600.23.81.3.s390x",
"product": {
"name": "cluster-md-kmp-default-6.4.0-150600.23.81.3.s390x",
"product_id": "cluster-md-kmp-default-6.4.0-150600.23.81.3.s390x"
}
},
{
"category": "product_version",
"name": "dlm-kmp-default-6.4.0-150600.23.81.3.s390x",
"product": {
"name": "dlm-kmp-default-6.4.0-150600.23.81.3.s390x",
"product_id": "dlm-kmp-default-6.4.0-150600.23.81.3.s390x"
}
},
{
"category": "product_version",
"name": "gfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"product": {
"name": "gfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"product_id": "gfs2-kmp-default-6.4.0-150600.23.81.3.s390x"
}
},
{
"category": "product_version",
"name": "kernel-default-6.4.0-150600.23.81.3.s390x",
"product": {
"name": "kernel-default-6.4.0-150600.23.81.3.s390x",
"product_id": "kernel-default-6.4.0-150600.23.81.3.s390x"
}
},
{
"category": "product_version",
"name": "kernel-default-devel-6.4.0-150600.23.81.3.s390x",
"product": {
"name": "kernel-default-devel-6.4.0-150600.23.81.3.s390x",
"product_id": "kernel-default-devel-6.4.0-150600.23.81.3.s390x"
}
},
{
"category": "product_version",
"name": "kernel-default-extra-6.4.0-150600.23.81.3.s390x",
"product": {
"name": "kernel-default-extra-6.4.0-150600.23.81.3.s390x",
"product_id": "kernel-default-extra-6.4.0-150600.23.81.3.s390x"
}
},
{
"category": "product_version",
"name": "kernel-default-livepatch-6.4.0-150600.23.81.3.s390x",
"product": {
"name": "kernel-default-livepatch-6.4.0-150600.23.81.3.s390x",
"product_id": "kernel-default-livepatch-6.4.0-150600.23.81.3.s390x"
}
},
{
"category": "product_version",
"name": "kernel-default-livepatch-devel-6.4.0-150600.23.81.3.s390x",
"product": {
"name": "kernel-default-livepatch-devel-6.4.0-150600.23.81.3.s390x",
"product_id": "kernel-default-livepatch-devel-6.4.0-150600.23.81.3.s390x"
}
},
{
"category": "product_version",
"name": "kernel-default-optional-6.4.0-150600.23.81.3.s390x",
"product": {
"name": "kernel-default-optional-6.4.0-150600.23.81.3.s390x",
"product_id": "kernel-default-optional-6.4.0-150600.23.81.3.s390x"
}
},
{
"category": "product_version",
"name": "kernel-livepatch-6_4_0-150600_23_81-default-1-150600.13.3.3.s390x",
"product": {
"name": "kernel-livepatch-6_4_0-150600_23_81-default-1-150600.13.3.3.s390x",
"product_id": "kernel-livepatch-6_4_0-150600_23_81-default-1-150600.13.3.3.s390x"
}
},
{
"category": "product_version",
"name": "kernel-obs-build-6.4.0-150600.23.81.3.s390x",
"product": {
"name": "kernel-obs-build-6.4.0-150600.23.81.3.s390x",
"product_id": "kernel-obs-build-6.4.0-150600.23.81.3.s390x"
}
},
{
"category": "product_version",
"name": "kernel-obs-qa-6.4.0-150600.23.81.1.s390x",
"product": {
"name": "kernel-obs-qa-6.4.0-150600.23.81.1.s390x",
"product_id": "kernel-obs-qa-6.4.0-150600.23.81.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-syms-6.4.0-150600.23.81.1.s390x",
"product": {
"name": "kernel-syms-6.4.0-150600.23.81.1.s390x",
"product_id": "kernel-syms-6.4.0-150600.23.81.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-zfcpdump-6.4.0-150600.23.81.3.s390x",
"product": {
"name": "kernel-zfcpdump-6.4.0-150600.23.81.3.s390x",
"product_id": "kernel-zfcpdump-6.4.0-150600.23.81.3.s390x"
}
},
{
"category": "product_version",
"name": "kselftests-kmp-default-6.4.0-150600.23.81.3.s390x",
"product": {
"name": "kselftests-kmp-default-6.4.0-150600.23.81.3.s390x",
"product_id": "kselftests-kmp-default-6.4.0-150600.23.81.3.s390x"
}
},
{
"category": "product_version",
"name": "ocfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"product": {
"name": "ocfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"product_id": "ocfs2-kmp-default-6.4.0-150600.23.81.3.s390x"
}
},
{
"category": "product_version",
"name": "reiserfs-kmp-default-6.4.0-150600.23.81.3.s390x",
"product": {
"name": "reiserfs-kmp-default-6.4.0-150600.23.81.3.s390x",
"product_id": "reiserfs-kmp-default-6.4.0-150600.23.81.3.s390x"
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "cluster-md-kmp-default-6.4.0-150600.23.81.3.x86_64",
"product": {
"name": "cluster-md-kmp-default-6.4.0-150600.23.81.3.x86_64",
"product_id": "cluster-md-kmp-default-6.4.0-150600.23.81.3.x86_64"
}
},
{
"category": "product_version",
"name": "dlm-kmp-default-6.4.0-150600.23.81.3.x86_64",
"product": {
"name": "dlm-kmp-default-6.4.0-150600.23.81.3.x86_64",
"product_id": "dlm-kmp-default-6.4.0-150600.23.81.3.x86_64"
}
},
{
"category": "product_version",
"name": "gfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"product": {
"name": "gfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"product_id": "gfs2-kmp-default-6.4.0-150600.23.81.3.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-debug-6.4.0-150600.23.81.3.x86_64",
"product": {
"name": "kernel-debug-6.4.0-150600.23.81.3.x86_64",
"product_id": "kernel-debug-6.4.0-150600.23.81.3.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-debug-devel-6.4.0-150600.23.81.3.x86_64",
"product": {
"name": "kernel-debug-devel-6.4.0-150600.23.81.3.x86_64",
"product_id": "kernel-debug-devel-6.4.0-150600.23.81.3.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-debug-vdso-6.4.0-150600.23.81.3.x86_64",
"product": {
"name": "kernel-debug-vdso-6.4.0-150600.23.81.3.x86_64",
"product_id": "kernel-debug-vdso-6.4.0-150600.23.81.3.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-default-6.4.0-150600.23.81.3.x86_64",
"product": {
"name": "kernel-default-6.4.0-150600.23.81.3.x86_64",
"product_id": "kernel-default-6.4.0-150600.23.81.3.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.x86_64",
"product": {
"name": "kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.x86_64",
"product_id": "kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-default-base-rebuild-6.4.0-150600.23.81.3.150600.12.36.3.x86_64",
"product": {
"name": "kernel-default-base-rebuild-6.4.0-150600.23.81.3.150600.12.36.3.x86_64",
"product_id": "kernel-default-base-rebuild-6.4.0-150600.23.81.3.150600.12.36.3.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-default-devel-6.4.0-150600.23.81.3.x86_64",
"product": {
"name": "kernel-default-devel-6.4.0-150600.23.81.3.x86_64",
"product_id": "kernel-default-devel-6.4.0-150600.23.81.3.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-default-extra-6.4.0-150600.23.81.3.x86_64",
"product": {
"name": "kernel-default-extra-6.4.0-150600.23.81.3.x86_64",
"product_id": "kernel-default-extra-6.4.0-150600.23.81.3.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-default-livepatch-6.4.0-150600.23.81.3.x86_64",
"product": {
"name": "kernel-default-livepatch-6.4.0-150600.23.81.3.x86_64",
"product_id": "kernel-default-livepatch-6.4.0-150600.23.81.3.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-default-livepatch-devel-6.4.0-150600.23.81.3.x86_64",
"product": {
"name": "kernel-default-livepatch-devel-6.4.0-150600.23.81.3.x86_64",
"product_id": "kernel-default-livepatch-devel-6.4.0-150600.23.81.3.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-default-optional-6.4.0-150600.23.81.3.x86_64",
"product": {
"name": "kernel-default-optional-6.4.0-150600.23.81.3.x86_64",
"product_id": "kernel-default-optional-6.4.0-150600.23.81.3.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-default-vdso-6.4.0-150600.23.81.3.x86_64",
"product": {
"name": "kernel-default-vdso-6.4.0-150600.23.81.3.x86_64",
"product_id": "kernel-default-vdso-6.4.0-150600.23.81.3.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-kvmsmall-6.4.0-150600.23.81.3.x86_64",
"product": {
"name": "kernel-kvmsmall-6.4.0-150600.23.81.3.x86_64",
"product_id": "kernel-kvmsmall-6.4.0-150600.23.81.3.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-kvmsmall-devel-6.4.0-150600.23.81.3.x86_64",
"product": {
"name": "kernel-kvmsmall-devel-6.4.0-150600.23.81.3.x86_64",
"product_id": "kernel-kvmsmall-devel-6.4.0-150600.23.81.3.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-kvmsmall-vdso-6.4.0-150600.23.81.3.x86_64",
"product": {
"name": "kernel-kvmsmall-vdso-6.4.0-150600.23.81.3.x86_64",
"product_id": "kernel-kvmsmall-vdso-6.4.0-150600.23.81.3.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-livepatch-6_4_0-150600_23_81-default-1-150600.13.3.3.x86_64",
"product": {
"name": "kernel-livepatch-6_4_0-150600_23_81-default-1-150600.13.3.3.x86_64",
"product_id": "kernel-livepatch-6_4_0-150600_23_81-default-1-150600.13.3.3.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-obs-build-6.4.0-150600.23.81.3.x86_64",
"product": {
"name": "kernel-obs-build-6.4.0-150600.23.81.3.x86_64",
"product_id": "kernel-obs-build-6.4.0-150600.23.81.3.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-obs-qa-6.4.0-150600.23.81.1.x86_64",
"product": {
"name": "kernel-obs-qa-6.4.0-150600.23.81.1.x86_64",
"product_id": "kernel-obs-qa-6.4.0-150600.23.81.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-syms-6.4.0-150600.23.81.1.x86_64",
"product": {
"name": "kernel-syms-6.4.0-150600.23.81.1.x86_64",
"product_id": "kernel-syms-6.4.0-150600.23.81.1.x86_64"
}
},
{
"category": "product_version",
"name": "kselftests-kmp-default-6.4.0-150600.23.81.3.x86_64",
"product": {
"name": "kselftests-kmp-default-6.4.0-150600.23.81.3.x86_64",
"product_id": "kselftests-kmp-default-6.4.0-150600.23.81.3.x86_64"
}
},
{
"category": "product_version",
"name": "ocfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"product": {
"name": "ocfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"product_id": "ocfs2-kmp-default-6.4.0-150600.23.81.3.x86_64"
}
},
{
"category": "product_version",
"name": "reiserfs-kmp-default-6.4.0-150600.23.81.3.x86_64",
"product": {
"name": "reiserfs-kmp-default-6.4.0-150600.23.81.3.x86_64",
"product_id": "reiserfs-kmp-default-6.4.0-150600.23.81.3.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "SUSE Linux Enterprise Module for Basesystem 15 SP6",
"product": {
"name": "SUSE Linux Enterprise Module for Basesystem 15 SP6",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP6",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-module-basesystem:15:sp6"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Module for Development Tools 15 SP6",
"product": {
"name": "SUSE Linux Enterprise Module for Development Tools 15 SP6",
"product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP6",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-module-development-tools:15:sp6"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Module for Legacy 15 SP6",
"product": {
"name": "SUSE Linux Enterprise Module for Legacy 15 SP6",
"product_id": "SUSE Linux Enterprise Module for Legacy 15 SP6",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-module-legacy:15:sp6"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Live Patching 15 SP6",
"product": {
"name": "SUSE Linux Enterprise Live Patching 15 SP6",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP6",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-module-live-patching:15:sp6"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise High Availability Extension 15 SP6",
"product": {
"name": "SUSE Linux Enterprise High Availability Extension 15 SP6",
"product_id": "SUSE Linux Enterprise High Availability Extension 15 SP6",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-ha:15:sp6"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Workstation Extension 15 SP6",
"product": {
"name": "SUSE Linux Enterprise Workstation Extension 15 SP6",
"product_id": "SUSE Linux Enterprise Workstation Extension 15 SP6",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-we:15:sp6"
}
}
},
{
"category": "product_name",
"name": "openSUSE Leap 15.6",
"product": {
"name": "openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6",
"product_identification_helper": {
"cpe": "cpe:/o:opensuse:leap:15.6"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-64kb-6.4.0-150600.23.81.3.aarch64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP6",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-64kb-6.4.0-150600.23.81.3.aarch64"
},
"product_reference": "kernel-64kb-6.4.0-150600.23.81.3.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-64kb-devel-6.4.0-150600.23.81.3.aarch64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP6",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-64kb-devel-6.4.0-150600.23.81.3.aarch64"
},
"product_reference": "kernel-64kb-devel-6.4.0-150600.23.81.3.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-6.4.0-150600.23.81.3.aarch64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP6",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.aarch64"
},
"product_reference": "kernel-default-6.4.0-150600.23.81.3.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-6.4.0-150600.23.81.3.ppc64le as component of SUSE Linux Enterprise Module for Basesystem 15 SP6",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.ppc64le"
},
"product_reference": "kernel-default-6.4.0-150600.23.81.3.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-6.4.0-150600.23.81.3.s390x as component of SUSE Linux Enterprise Module for Basesystem 15 SP6",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.s390x"
},
"product_reference": "kernel-default-6.4.0-150600.23.81.3.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-6.4.0-150600.23.81.3.x86_64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP6",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.x86_64"
},
"product_reference": "kernel-default-6.4.0-150600.23.81.3.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.aarch64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP6",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.aarch64"
},
"product_reference": "kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.ppc64le as component of SUSE Linux Enterprise Module for Basesystem 15 SP6",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.ppc64le"
},
"product_reference": "kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.x86_64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP6",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.x86_64"
},
"product_reference": "kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-devel-6.4.0-150600.23.81.3.aarch64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP6",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.aarch64"
},
"product_reference": "kernel-default-devel-6.4.0-150600.23.81.3.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-devel-6.4.0-150600.23.81.3.ppc64le as component of SUSE Linux Enterprise Module for Basesystem 15 SP6",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.ppc64le"
},
"product_reference": "kernel-default-devel-6.4.0-150600.23.81.3.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-devel-6.4.0-150600.23.81.3.s390x as component of SUSE Linux Enterprise Module for Basesystem 15 SP6",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.s390x"
},
"product_reference": "kernel-default-devel-6.4.0-150600.23.81.3.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-devel-6.4.0-150600.23.81.3.x86_64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP6",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.x86_64"
},
"product_reference": "kernel-default-devel-6.4.0-150600.23.81.3.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-6.4.0-150600.23.81.2.noarch as component of SUSE Linux Enterprise Module for Basesystem 15 SP6",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-devel-6.4.0-150600.23.81.2.noarch"
},
"product_reference": "kernel-devel-6.4.0-150600.23.81.2.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-macros-6.4.0-150600.23.81.2.noarch as component of SUSE Linux Enterprise Module for Basesystem 15 SP6",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-macros-6.4.0-150600.23.81.2.noarch"
},
"product_reference": "kernel-macros-6.4.0-150600.23.81.2.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-6.4.0-150600.23.81.3.s390x as component of SUSE Linux Enterprise Module for Basesystem 15 SP6",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-zfcpdump-6.4.0-150600.23.81.3.s390x"
},
"product_reference": "kernel-zfcpdump-6.4.0-150600.23.81.3.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-docs-6.4.0-150600.23.81.1.noarch as component of SUSE Linux Enterprise Module for Development Tools 15 SP6",
"product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-docs-6.4.0-150600.23.81.1.noarch"
},
"product_reference": "kernel-docs-6.4.0-150600.23.81.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-obs-build-6.4.0-150600.23.81.3.aarch64 as component of SUSE Linux Enterprise Module for Development Tools 15 SP6",
"product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.aarch64"
},
"product_reference": "kernel-obs-build-6.4.0-150600.23.81.3.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-obs-build-6.4.0-150600.23.81.3.ppc64le as component of SUSE Linux Enterprise Module for Development Tools 15 SP6",
"product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.ppc64le"
},
"product_reference": "kernel-obs-build-6.4.0-150600.23.81.3.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-obs-build-6.4.0-150600.23.81.3.s390x as component of SUSE Linux Enterprise Module for Development Tools 15 SP6",
"product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.s390x"
},
"product_reference": "kernel-obs-build-6.4.0-150600.23.81.3.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-obs-build-6.4.0-150600.23.81.3.x86_64 as component of SUSE Linux Enterprise Module for Development Tools 15 SP6",
"product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.x86_64"
},
"product_reference": "kernel-obs-build-6.4.0-150600.23.81.3.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-source-6.4.0-150600.23.81.2.noarch as component of SUSE Linux Enterprise Module for Development Tools 15 SP6",
"product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-source-6.4.0-150600.23.81.2.noarch"
},
"product_reference": "kernel-source-6.4.0-150600.23.81.2.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-6.4.0-150600.23.81.1.aarch64 as component of SUSE Linux Enterprise Module for Development Tools 15 SP6",
"product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.aarch64"
},
"product_reference": "kernel-syms-6.4.0-150600.23.81.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-6.4.0-150600.23.81.1.ppc64le as component of SUSE Linux Enterprise Module for Development Tools 15 SP6",
"product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.ppc64le"
},
"product_reference": "kernel-syms-6.4.0-150600.23.81.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-6.4.0-150600.23.81.1.s390x as component of SUSE Linux Enterprise Module for Development Tools 15 SP6",
"product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.s390x"
},
"product_reference": "kernel-syms-6.4.0-150600.23.81.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-6.4.0-150600.23.81.1.x86_64 as component of SUSE Linux Enterprise Module for Development Tools 15 SP6",
"product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.x86_64"
},
"product_reference": "kernel-syms-6.4.0-150600.23.81.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "reiserfs-kmp-default-6.4.0-150600.23.81.3.aarch64 as component of SUSE Linux Enterprise Module for Legacy 15 SP6",
"product_id": "SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.aarch64"
},
"product_reference": "reiserfs-kmp-default-6.4.0-150600.23.81.3.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Legacy 15 SP6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "reiserfs-kmp-default-6.4.0-150600.23.81.3.ppc64le as component of SUSE Linux Enterprise Module for Legacy 15 SP6",
"product_id": "SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.ppc64le"
},
"product_reference": "reiserfs-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Legacy 15 SP6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "reiserfs-kmp-default-6.4.0-150600.23.81.3.s390x as component of SUSE Linux Enterprise Module for Legacy 15 SP6",
"product_id": "SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.s390x"
},
"product_reference": "reiserfs-kmp-default-6.4.0-150600.23.81.3.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Legacy 15 SP6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "reiserfs-kmp-default-6.4.0-150600.23.81.3.x86_64 as component of SUSE Linux Enterprise Module for Legacy 15 SP6",
"product_id": "SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.x86_64"
},
"product_reference": "reiserfs-kmp-default-6.4.0-150600.23.81.3.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Legacy 15 SP6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-livepatch-6.4.0-150600.23.81.3.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP6",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.81.3.ppc64le"
},
"product_reference": "kernel-default-livepatch-6.4.0-150600.23.81.3.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-livepatch-6.4.0-150600.23.81.3.s390x as component of SUSE Linux Enterprise Live Patching 15 SP6",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.81.3.s390x"
},
"product_reference": "kernel-default-livepatch-6.4.0-150600.23.81.3.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-livepatch-6.4.0-150600.23.81.3.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP6",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.81.3.x86_64"
},
"product_reference": "kernel-default-livepatch-6.4.0-150600.23.81.3.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-livepatch-devel-6.4.0-150600.23.81.3.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP6",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.ppc64le"
},
"product_reference": "kernel-default-livepatch-devel-6.4.0-150600.23.81.3.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-livepatch-devel-6.4.0-150600.23.81.3.s390x as component of SUSE Linux Enterprise Live Patching 15 SP6",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.s390x"
},
"product_reference": "kernel-default-livepatch-devel-6.4.0-150600.23.81.3.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-livepatch-devel-6.4.0-150600.23.81.3.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP6",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.x86_64"
},
"product_reference": "kernel-default-livepatch-devel-6.4.0-150600.23.81.3.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-6_4_0-150600_23_81-default-1-150600.13.3.3.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP6",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_81-default-1-150600.13.3.3.ppc64le"
},
"product_reference": "kernel-livepatch-6_4_0-150600_23_81-default-1-150600.13.3.3.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-6_4_0-150600_23_81-default-1-150600.13.3.3.s390x as component of SUSE Linux Enterprise Live Patching 15 SP6",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_81-default-1-150600.13.3.3.s390x"
},
"product_reference": "kernel-livepatch-6_4_0-150600_23_81-default-1-150600.13.3.3.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-6_4_0-150600_23_81-default-1-150600.13.3.3.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP6",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_81-default-1-150600.13.3.3.x86_64"
},
"product_reference": "kernel-livepatch-6_4_0-150600_23_81-default-1-150600.13.3.3.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cluster-md-kmp-default-6.4.0-150600.23.81.3.aarch64 as component of SUSE Linux Enterprise High Availability Extension 15 SP6",
"product_id": "SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.aarch64"
},
"product_reference": "cluster-md-kmp-default-6.4.0-150600.23.81.3.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cluster-md-kmp-default-6.4.0-150600.23.81.3.ppc64le as component of SUSE Linux Enterprise High Availability Extension 15 SP6",
"product_id": "SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.ppc64le"
},
"product_reference": "cluster-md-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cluster-md-kmp-default-6.4.0-150600.23.81.3.s390x as component of SUSE Linux Enterprise High Availability Extension 15 SP6",
"product_id": "SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.s390x"
},
"product_reference": "cluster-md-kmp-default-6.4.0-150600.23.81.3.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cluster-md-kmp-default-6.4.0-150600.23.81.3.x86_64 as component of SUSE Linux Enterprise High Availability Extension 15 SP6",
"product_id": "SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.x86_64"
},
"product_reference": "cluster-md-kmp-default-6.4.0-150600.23.81.3.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dlm-kmp-default-6.4.0-150600.23.81.3.aarch64 as component of SUSE Linux Enterprise High Availability Extension 15 SP6",
"product_id": "SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.aarch64"
},
"product_reference": "dlm-kmp-default-6.4.0-150600.23.81.3.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dlm-kmp-default-6.4.0-150600.23.81.3.ppc64le as component of SUSE Linux Enterprise High Availability Extension 15 SP6",
"product_id": "SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.ppc64le"
},
"product_reference": "dlm-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dlm-kmp-default-6.4.0-150600.23.81.3.s390x as component of SUSE Linux Enterprise High Availability Extension 15 SP6",
"product_id": "SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.s390x"
},
"product_reference": "dlm-kmp-default-6.4.0-150600.23.81.3.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dlm-kmp-default-6.4.0-150600.23.81.3.x86_64 as component of SUSE Linux Enterprise High Availability Extension 15 SP6",
"product_id": "SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.x86_64"
},
"product_reference": "dlm-kmp-default-6.4.0-150600.23.81.3.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gfs2-kmp-default-6.4.0-150600.23.81.3.aarch64 as component of SUSE Linux Enterprise High Availability Extension 15 SP6",
"product_id": "SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.aarch64"
},
"product_reference": "gfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le as component of SUSE Linux Enterprise High Availability Extension 15 SP6",
"product_id": "SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le"
},
"product_reference": "gfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gfs2-kmp-default-6.4.0-150600.23.81.3.s390x as component of SUSE Linux Enterprise High Availability Extension 15 SP6",
"product_id": "SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.s390x"
},
"product_reference": "gfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gfs2-kmp-default-6.4.0-150600.23.81.3.x86_64 as component of SUSE Linux Enterprise High Availability Extension 15 SP6",
"product_id": "SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.x86_64"
},
"product_reference": "gfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ocfs2-kmp-default-6.4.0-150600.23.81.3.aarch64 as component of SUSE Linux Enterprise High Availability Extension 15 SP6",
"product_id": "SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.aarch64"
},
"product_reference": "ocfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ocfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le as component of SUSE Linux Enterprise High Availability Extension 15 SP6",
"product_id": "SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le"
},
"product_reference": "ocfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ocfs2-kmp-default-6.4.0-150600.23.81.3.s390x as component of SUSE Linux Enterprise High Availability Extension 15 SP6",
"product_id": "SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.s390x"
},
"product_reference": "ocfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ocfs2-kmp-default-6.4.0-150600.23.81.3.x86_64 as component of SUSE Linux Enterprise High Availability Extension 15 SP6",
"product_id": "SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.x86_64"
},
"product_reference": "ocfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-extra-6.4.0-150600.23.81.3.x86_64 as component of SUSE Linux Enterprise Workstation Extension 15 SP6",
"product_id": "SUSE Linux Enterprise Workstation Extension 15 SP6:kernel-default-extra-6.4.0-150600.23.81.3.x86_64"
},
"product_reference": "kernel-default-extra-6.4.0-150600.23.81.3.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Workstation Extension 15 SP6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cluster-md-kmp-64kb-6.4.0-150600.23.81.3.aarch64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:cluster-md-kmp-64kb-6.4.0-150600.23.81.3.aarch64"
},
"product_reference": "cluster-md-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cluster-md-kmp-default-6.4.0-150600.23.81.3.aarch64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.aarch64"
},
"product_reference": "cluster-md-kmp-default-6.4.0-150600.23.81.3.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cluster-md-kmp-default-6.4.0-150600.23.81.3.ppc64le as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.ppc64le"
},
"product_reference": "cluster-md-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cluster-md-kmp-default-6.4.0-150600.23.81.3.s390x as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.s390x"
},
"product_reference": "cluster-md-kmp-default-6.4.0-150600.23.81.3.s390x",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cluster-md-kmp-default-6.4.0-150600.23.81.3.x86_64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.x86_64"
},
"product_reference": "cluster-md-kmp-default-6.4.0-150600.23.81.3.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dlm-kmp-64kb-6.4.0-150600.23.81.3.aarch64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:dlm-kmp-64kb-6.4.0-150600.23.81.3.aarch64"
},
"product_reference": "dlm-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dlm-kmp-default-6.4.0-150600.23.81.3.aarch64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.aarch64"
},
"product_reference": "dlm-kmp-default-6.4.0-150600.23.81.3.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dlm-kmp-default-6.4.0-150600.23.81.3.ppc64le as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.ppc64le"
},
"product_reference": "dlm-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dlm-kmp-default-6.4.0-150600.23.81.3.s390x as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.s390x"
},
"product_reference": "dlm-kmp-default-6.4.0-150600.23.81.3.s390x",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dlm-kmp-default-6.4.0-150600.23.81.3.x86_64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.x86_64"
},
"product_reference": "dlm-kmp-default-6.4.0-150600.23.81.3.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dtb-allwinner-6.4.0-150600.23.81.1.aarch64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:dtb-allwinner-6.4.0-150600.23.81.1.aarch64"
},
"product_reference": "dtb-allwinner-6.4.0-150600.23.81.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dtb-altera-6.4.0-150600.23.81.1.aarch64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:dtb-altera-6.4.0-150600.23.81.1.aarch64"
},
"product_reference": "dtb-altera-6.4.0-150600.23.81.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dtb-amazon-6.4.0-150600.23.81.1.aarch64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:dtb-amazon-6.4.0-150600.23.81.1.aarch64"
},
"product_reference": "dtb-amazon-6.4.0-150600.23.81.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dtb-amd-6.4.0-150600.23.81.1.aarch64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:dtb-amd-6.4.0-150600.23.81.1.aarch64"
},
"product_reference": "dtb-amd-6.4.0-150600.23.81.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dtb-amlogic-6.4.0-150600.23.81.1.aarch64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:dtb-amlogic-6.4.0-150600.23.81.1.aarch64"
},
"product_reference": "dtb-amlogic-6.4.0-150600.23.81.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dtb-apm-6.4.0-150600.23.81.1.aarch64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:dtb-apm-6.4.0-150600.23.81.1.aarch64"
},
"product_reference": "dtb-apm-6.4.0-150600.23.81.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dtb-apple-6.4.0-150600.23.81.1.aarch64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:dtb-apple-6.4.0-150600.23.81.1.aarch64"
},
"product_reference": "dtb-apple-6.4.0-150600.23.81.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dtb-arm-6.4.0-150600.23.81.1.aarch64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:dtb-arm-6.4.0-150600.23.81.1.aarch64"
},
"product_reference": "dtb-arm-6.4.0-150600.23.81.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dtb-broadcom-6.4.0-150600.23.81.1.aarch64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:dtb-broadcom-6.4.0-150600.23.81.1.aarch64"
},
"product_reference": "dtb-broadcom-6.4.0-150600.23.81.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dtb-cavium-6.4.0-150600.23.81.1.aarch64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:dtb-cavium-6.4.0-150600.23.81.1.aarch64"
},
"product_reference": "dtb-cavium-6.4.0-150600.23.81.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dtb-exynos-6.4.0-150600.23.81.1.aarch64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:dtb-exynos-6.4.0-150600.23.81.1.aarch64"
},
"product_reference": "dtb-exynos-6.4.0-150600.23.81.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dtb-freescale-6.4.0-150600.23.81.1.aarch64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:dtb-freescale-6.4.0-150600.23.81.1.aarch64"
},
"product_reference": "dtb-freescale-6.4.0-150600.23.81.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dtb-hisilicon-6.4.0-150600.23.81.1.aarch64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:dtb-hisilicon-6.4.0-150600.23.81.1.aarch64"
},
"product_reference": "dtb-hisilicon-6.4.0-150600.23.81.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dtb-lg-6.4.0-150600.23.81.1.aarch64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:dtb-lg-6.4.0-150600.23.81.1.aarch64"
},
"product_reference": "dtb-lg-6.4.0-150600.23.81.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dtb-marvell-6.4.0-150600.23.81.1.aarch64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:dtb-marvell-6.4.0-150600.23.81.1.aarch64"
},
"product_reference": "dtb-marvell-6.4.0-150600.23.81.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dtb-mediatek-6.4.0-150600.23.81.1.aarch64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:dtb-mediatek-6.4.0-150600.23.81.1.aarch64"
},
"product_reference": "dtb-mediatek-6.4.0-150600.23.81.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dtb-nvidia-6.4.0-150600.23.81.1.aarch64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:dtb-nvidia-6.4.0-150600.23.81.1.aarch64"
},
"product_reference": "dtb-nvidia-6.4.0-150600.23.81.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dtb-qcom-6.4.0-150600.23.81.1.aarch64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:dtb-qcom-6.4.0-150600.23.81.1.aarch64"
},
"product_reference": "dtb-qcom-6.4.0-150600.23.81.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dtb-renesas-6.4.0-150600.23.81.1.aarch64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:dtb-renesas-6.4.0-150600.23.81.1.aarch64"
},
"product_reference": "dtb-renesas-6.4.0-150600.23.81.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dtb-rockchip-6.4.0-150600.23.81.1.aarch64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:dtb-rockchip-6.4.0-150600.23.81.1.aarch64"
},
"product_reference": "dtb-rockchip-6.4.0-150600.23.81.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dtb-socionext-6.4.0-150600.23.81.1.aarch64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:dtb-socionext-6.4.0-150600.23.81.1.aarch64"
},
"product_reference": "dtb-socionext-6.4.0-150600.23.81.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dtb-sprd-6.4.0-150600.23.81.1.aarch64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:dtb-sprd-6.4.0-150600.23.81.1.aarch64"
},
"product_reference": "dtb-sprd-6.4.0-150600.23.81.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dtb-xilinx-6.4.0-150600.23.81.1.aarch64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:dtb-xilinx-6.4.0-150600.23.81.1.aarch64"
},
"product_reference": "dtb-xilinx-6.4.0-150600.23.81.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gfs2-kmp-64kb-6.4.0-150600.23.81.3.aarch64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:gfs2-kmp-64kb-6.4.0-150600.23.81.3.aarch64"
},
"product_reference": "gfs2-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gfs2-kmp-default-6.4.0-150600.23.81.3.aarch64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.aarch64"
},
"product_reference": "gfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le"
},
"product_reference": "gfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gfs2-kmp-default-6.4.0-150600.23.81.3.s390x as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.s390x"
},
"product_reference": "gfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gfs2-kmp-default-6.4.0-150600.23.81.3.x86_64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.x86_64"
},
"product_reference": "gfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-64kb-6.4.0-150600.23.81.3.aarch64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:kernel-64kb-6.4.0-150600.23.81.3.aarch64"
},
"product_reference": "kernel-64kb-6.4.0-150600.23.81.3.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-64kb-devel-6.4.0-150600.23.81.3.aarch64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:kernel-64kb-devel-6.4.0-150600.23.81.3.aarch64"
},
"product_reference": "kernel-64kb-devel-6.4.0-150600.23.81.3.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-64kb-extra-6.4.0-150600.23.81.3.aarch64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:kernel-64kb-extra-6.4.0-150600.23.81.3.aarch64"
},
"product_reference": "kernel-64kb-extra-6.4.0-150600.23.81.3.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-64kb-optional-6.4.0-150600.23.81.3.aarch64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:kernel-64kb-optional-6.4.0-150600.23.81.3.aarch64"
},
"product_reference": "kernel-64kb-optional-6.4.0-150600.23.81.3.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-6.4.0-150600.23.81.3.ppc64le as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.81.3.ppc64le"
},
"product_reference": "kernel-debug-6.4.0-150600.23.81.3.ppc64le",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-6.4.0-150600.23.81.3.x86_64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.81.3.x86_64"
},
"product_reference": "kernel-debug-6.4.0-150600.23.81.3.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-6.4.0-150600.23.81.3.ppc64le as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.81.3.ppc64le"
},
"product_reference": "kernel-debug-devel-6.4.0-150600.23.81.3.ppc64le",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-6.4.0-150600.23.81.3.x86_64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.81.3.x86_64"
},
"product_reference": "kernel-debug-devel-6.4.0-150600.23.81.3.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-vdso-6.4.0-150600.23.81.3.x86_64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:kernel-debug-vdso-6.4.0-150600.23.81.3.x86_64"
},
"product_reference": "kernel-debug-vdso-6.4.0-150600.23.81.3.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-6.4.0-150600.23.81.3.aarch64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.aarch64"
},
"product_reference": "kernel-default-6.4.0-150600.23.81.3.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-6.4.0-150600.23.81.3.ppc64le as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.ppc64le"
},
"product_reference": "kernel-default-6.4.0-150600.23.81.3.ppc64le",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-6.4.0-150600.23.81.3.s390x as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.s390x"
},
"product_reference": "kernel-default-6.4.0-150600.23.81.3.s390x",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-6.4.0-150600.23.81.3.x86_64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.x86_64"
},
"product_reference": "kernel-default-6.4.0-150600.23.81.3.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.aarch64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.aarch64"
},
"product_reference": "kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.ppc64le as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.ppc64le"
},
"product_reference": "kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.ppc64le",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.x86_64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.x86_64"
},
"product_reference": "kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-rebuild-6.4.0-150600.23.81.3.150600.12.36.3.aarch64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.81.3.150600.12.36.3.aarch64"
},
"product_reference": "kernel-default-base-rebuild-6.4.0-150600.23.81.3.150600.12.36.3.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-rebuild-6.4.0-150600.23.81.3.150600.12.36.3.ppc64le as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.81.3.150600.12.36.3.ppc64le"
},
"product_reference": "kernel-default-base-rebuild-6.4.0-150600.23.81.3.150600.12.36.3.ppc64le",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-rebuild-6.4.0-150600.23.81.3.150600.12.36.3.x86_64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.81.3.150600.12.36.3.x86_64"
},
"product_reference": "kernel-default-base-rebuild-6.4.0-150600.23.81.3.150600.12.36.3.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-devel-6.4.0-150600.23.81.3.aarch64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.aarch64"
},
"product_reference": "kernel-default-devel-6.4.0-150600.23.81.3.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-devel-6.4.0-150600.23.81.3.ppc64le as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.ppc64le"
},
"product_reference": "kernel-default-devel-6.4.0-150600.23.81.3.ppc64le",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-devel-6.4.0-150600.23.81.3.s390x as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.s390x"
},
"product_reference": "kernel-default-devel-6.4.0-150600.23.81.3.s390x",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-devel-6.4.0-150600.23.81.3.x86_64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.x86_64"
},
"product_reference": "kernel-default-devel-6.4.0-150600.23.81.3.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-extra-6.4.0-150600.23.81.3.aarch64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.aarch64"
},
"product_reference": "kernel-default-extra-6.4.0-150600.23.81.3.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-extra-6.4.0-150600.23.81.3.ppc64le as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.ppc64le"
},
"product_reference": "kernel-default-extra-6.4.0-150600.23.81.3.ppc64le",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-extra-6.4.0-150600.23.81.3.s390x as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.s390x"
},
"product_reference": "kernel-default-extra-6.4.0-150600.23.81.3.s390x",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-extra-6.4.0-150600.23.81.3.x86_64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.x86_64"
},
"product_reference": "kernel-default-extra-6.4.0-150600.23.81.3.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-livepatch-6.4.0-150600.23.81.3.aarch64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.aarch64"
},
"product_reference": "kernel-default-livepatch-6.4.0-150600.23.81.3.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-livepatch-6.4.0-150600.23.81.3.ppc64le as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.ppc64le"
},
"product_reference": "kernel-default-livepatch-6.4.0-150600.23.81.3.ppc64le",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-livepatch-6.4.0-150600.23.81.3.s390x as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.s390x"
},
"product_reference": "kernel-default-livepatch-6.4.0-150600.23.81.3.s390x",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-livepatch-6.4.0-150600.23.81.3.x86_64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.x86_64"
},
"product_reference": "kernel-default-livepatch-6.4.0-150600.23.81.3.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-livepatch-devel-6.4.0-150600.23.81.3.ppc64le as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.ppc64le"
},
"product_reference": "kernel-default-livepatch-devel-6.4.0-150600.23.81.3.ppc64le",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-livepatch-devel-6.4.0-150600.23.81.3.s390x as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.s390x"
},
"product_reference": "kernel-default-livepatch-devel-6.4.0-150600.23.81.3.s390x",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-livepatch-devel-6.4.0-150600.23.81.3.x86_64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.x86_64"
},
"product_reference": "kernel-default-livepatch-devel-6.4.0-150600.23.81.3.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-optional-6.4.0-150600.23.81.3.aarch64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.aarch64"
},
"product_reference": "kernel-default-optional-6.4.0-150600.23.81.3.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-optional-6.4.0-150600.23.81.3.ppc64le as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.ppc64le"
},
"product_reference": "kernel-default-optional-6.4.0-150600.23.81.3.ppc64le",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-optional-6.4.0-150600.23.81.3.s390x as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.s390x"
},
"product_reference": "kernel-default-optional-6.4.0-150600.23.81.3.s390x",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-optional-6.4.0-150600.23.81.3.x86_64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.x86_64"
},
"product_reference": "kernel-default-optional-6.4.0-150600.23.81.3.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-vdso-6.4.0-150600.23.81.3.x86_64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:kernel-default-vdso-6.4.0-150600.23.81.3.x86_64"
},
"product_reference": "kernel-default-vdso-6.4.0-150600.23.81.3.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-6.4.0-150600.23.81.2.noarch as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:kernel-devel-6.4.0-150600.23.81.2.noarch"
},
"product_reference": "kernel-devel-6.4.0-150600.23.81.2.noarch",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-docs-6.4.0-150600.23.81.1.noarch as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:kernel-docs-6.4.0-150600.23.81.1.noarch"
},
"product_reference": "kernel-docs-6.4.0-150600.23.81.1.noarch",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-docs-html-6.4.0-150600.23.81.1.noarch as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:kernel-docs-html-6.4.0-150600.23.81.1.noarch"
},
"product_reference": "kernel-docs-html-6.4.0-150600.23.81.1.noarch",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kvmsmall-6.4.0-150600.23.81.3.aarch64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.81.3.aarch64"
},
"product_reference": "kernel-kvmsmall-6.4.0-150600.23.81.3.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kvmsmall-6.4.0-150600.23.81.3.ppc64le as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.81.3.ppc64le"
},
"product_reference": "kernel-kvmsmall-6.4.0-150600.23.81.3.ppc64le",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kvmsmall-6.4.0-150600.23.81.3.x86_64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.81.3.x86_64"
},
"product_reference": "kernel-kvmsmall-6.4.0-150600.23.81.3.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kvmsmall-devel-6.4.0-150600.23.81.3.aarch64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.81.3.aarch64"
},
"product_reference": "kernel-kvmsmall-devel-6.4.0-150600.23.81.3.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kvmsmall-devel-6.4.0-150600.23.81.3.ppc64le as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.81.3.ppc64le"
},
"product_reference": "kernel-kvmsmall-devel-6.4.0-150600.23.81.3.ppc64le",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kvmsmall-devel-6.4.0-150600.23.81.3.x86_64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.81.3.x86_64"
},
"product_reference": "kernel-kvmsmall-devel-6.4.0-150600.23.81.3.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kvmsmall-vdso-6.4.0-150600.23.81.3.x86_64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:kernel-kvmsmall-vdso-6.4.0-150600.23.81.3.x86_64"
},
"product_reference": "kernel-kvmsmall-vdso-6.4.0-150600.23.81.3.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-macros-6.4.0-150600.23.81.2.noarch as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:kernel-macros-6.4.0-150600.23.81.2.noarch"
},
"product_reference": "kernel-macros-6.4.0-150600.23.81.2.noarch",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-obs-build-6.4.0-150600.23.81.3.aarch64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.aarch64"
},
"product_reference": "kernel-obs-build-6.4.0-150600.23.81.3.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-obs-build-6.4.0-150600.23.81.3.ppc64le as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.ppc64le"
},
"product_reference": "kernel-obs-build-6.4.0-150600.23.81.3.ppc64le",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-obs-build-6.4.0-150600.23.81.3.s390x as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.s390x"
},
"product_reference": "kernel-obs-build-6.4.0-150600.23.81.3.s390x",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-obs-build-6.4.0-150600.23.81.3.x86_64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.x86_64"
},
"product_reference": "kernel-obs-build-6.4.0-150600.23.81.3.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-obs-qa-6.4.0-150600.23.81.1.aarch64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.aarch64"
},
"product_reference": "kernel-obs-qa-6.4.0-150600.23.81.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-obs-qa-6.4.0-150600.23.81.1.ppc64le as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.ppc64le"
},
"product_reference": "kernel-obs-qa-6.4.0-150600.23.81.1.ppc64le",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-obs-qa-6.4.0-150600.23.81.1.s390x as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.s390x"
},
"product_reference": "kernel-obs-qa-6.4.0-150600.23.81.1.s390x",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-obs-qa-6.4.0-150600.23.81.1.x86_64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.x86_64"
},
"product_reference": "kernel-obs-qa-6.4.0-150600.23.81.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-source-6.4.0-150600.23.81.2.noarch as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:kernel-source-6.4.0-150600.23.81.2.noarch"
},
"product_reference": "kernel-source-6.4.0-150600.23.81.2.noarch",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-source-vanilla-6.4.0-150600.23.81.2.noarch as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:kernel-source-vanilla-6.4.0-150600.23.81.2.noarch"
},
"product_reference": "kernel-source-vanilla-6.4.0-150600.23.81.2.noarch",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-6.4.0-150600.23.81.1.aarch64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.aarch64"
},
"product_reference": "kernel-syms-6.4.0-150600.23.81.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-6.4.0-150600.23.81.1.ppc64le as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.ppc64le"
},
"product_reference": "kernel-syms-6.4.0-150600.23.81.1.ppc64le",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-6.4.0-150600.23.81.1.s390x as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.s390x"
},
"product_reference": "kernel-syms-6.4.0-150600.23.81.1.s390x",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-6.4.0-150600.23.81.1.x86_64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.x86_64"
},
"product_reference": "kernel-syms-6.4.0-150600.23.81.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-6.4.0-150600.23.81.3.s390x as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:kernel-zfcpdump-6.4.0-150600.23.81.3.s390x"
},
"product_reference": "kernel-zfcpdump-6.4.0-150600.23.81.3.s390x",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kselftests-kmp-64kb-6.4.0-150600.23.81.3.aarch64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:kselftests-kmp-64kb-6.4.0-150600.23.81.3.aarch64"
},
"product_reference": "kselftests-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kselftests-kmp-default-6.4.0-150600.23.81.3.aarch64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.aarch64"
},
"product_reference": "kselftests-kmp-default-6.4.0-150600.23.81.3.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kselftests-kmp-default-6.4.0-150600.23.81.3.ppc64le as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.ppc64le"
},
"product_reference": "kselftests-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kselftests-kmp-default-6.4.0-150600.23.81.3.s390x as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.s390x"
},
"product_reference": "kselftests-kmp-default-6.4.0-150600.23.81.3.s390x",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kselftests-kmp-default-6.4.0-150600.23.81.3.x86_64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.x86_64"
},
"product_reference": "kselftests-kmp-default-6.4.0-150600.23.81.3.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ocfs2-kmp-64kb-6.4.0-150600.23.81.3.aarch64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:ocfs2-kmp-64kb-6.4.0-150600.23.81.3.aarch64"
},
"product_reference": "ocfs2-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ocfs2-kmp-default-6.4.0-150600.23.81.3.aarch64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.aarch64"
},
"product_reference": "ocfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ocfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le"
},
"product_reference": "ocfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ocfs2-kmp-default-6.4.0-150600.23.81.3.s390x as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.s390x"
},
"product_reference": "ocfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ocfs2-kmp-default-6.4.0-150600.23.81.3.x86_64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.x86_64"
},
"product_reference": "ocfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "reiserfs-kmp-64kb-6.4.0-150600.23.81.3.aarch64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:reiserfs-kmp-64kb-6.4.0-150600.23.81.3.aarch64"
},
"product_reference": "reiserfs-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "reiserfs-kmp-default-6.4.0-150600.23.81.3.aarch64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.aarch64"
},
"product_reference": "reiserfs-kmp-default-6.4.0-150600.23.81.3.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "reiserfs-kmp-default-6.4.0-150600.23.81.3.ppc64le as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.ppc64le"
},
"product_reference": "reiserfs-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "reiserfs-kmp-default-6.4.0-150600.23.81.3.s390x as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.s390x"
},
"product_reference": "reiserfs-kmp-default-6.4.0-150600.23.81.3.s390x",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "reiserfs-kmp-default-6.4.0-150600.23.81.3.x86_64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.x86_64"
},
"product_reference": "reiserfs-kmp-default-6.4.0-150600.23.81.3.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.6"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2022-50253",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-50253"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nbpf: make sure skb-\u003elen != 0 when redirecting to a tunneling device\n\nsyzkaller managed to trigger another case where skb-\u003elen == 0\nwhen we enter __dev_queue_xmit:\n\nWARNING: CPU: 0 PID: 2470 at include/linux/skbuff.h:2576 skb_assert_len include/linux/skbuff.h:2576 [inline]\nWARNING: CPU: 0 PID: 2470 at include/linux/skbuff.h:2576 __dev_queue_xmit+0x2069/0x35e0 net/core/dev.c:4295\n\nCall Trace:\n dev_queue_xmit+0x17/0x20 net/core/dev.c:4406\n __bpf_tx_skb net/core/filter.c:2115 [inline]\n __bpf_redirect_no_mac net/core/filter.c:2140 [inline]\n __bpf_redirect+0x5fb/0xda0 net/core/filter.c:2163\n ____bpf_clone_redirect net/core/filter.c:2447 [inline]\n bpf_clone_redirect+0x247/0x390 net/core/filter.c:2419\n bpf_prog_48159a89cb4a9a16+0x59/0x5e\n bpf_dispatcher_nop_func include/linux/bpf.h:897 [inline]\n __bpf_prog_run include/linux/filter.h:596 [inline]\n bpf_prog_run include/linux/filter.h:603 [inline]\n bpf_test_run+0x46c/0x890 net/bpf/test_run.c:402\n bpf_prog_test_run_skb+0xbdc/0x14c0 net/bpf/test_run.c:1170\n bpf_prog_test_run+0x345/0x3c0 kernel/bpf/syscall.c:3648\n __sys_bpf+0x43a/0x6c0 kernel/bpf/syscall.c:5005\n __do_sys_bpf kernel/bpf/syscall.c:5091 [inline]\n __se_sys_bpf kernel/bpf/syscall.c:5089 [inline]\n __x64_sys_bpf+0x7c/0x90 kernel/bpf/syscall.c:5089\n do_syscall_64+0x54/0x70 arch/x86/entry/common.c:48\n entry_SYSCALL_64_after_hwframe+0x61/0xc6\n\nThe reproducer doesn\u0027t really reproduce outside of syzkaller\nenvironment, so I\u0027m taking a guess here. It looks like we\ndo generate correct ETH_HLEN-sized packet, but we redirect\nthe packet to the tunneling device. Before we do so, we\n__skb_pull l2 header and arrive again at skb-\u003elen == 0.\nDoesn\u0027t seem like we can do anything better than having\nan explicit check after __skb_pull?",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_81-default-1-150600.13.3.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_81-default-1-150600.13.3.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_81-default-1-150600.13.3.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-64kb-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-64kb-devel-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-devel-6.4.0-150600.23.81.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-macros-6.4.0-150600.23.81.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-zfcpdump-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-docs-6.4.0-150600.23.81.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-source-6.4.0-150600.23.81.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP6:kernel-default-extra-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:dlm-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:dtb-allwinner-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-altera-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-amazon-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-amd-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-amlogic-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-apm-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-apple-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-arm-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-broadcom-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-cavium-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-exynos-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-freescale-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-hisilicon-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-lg-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-marvell-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-mediatek-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-nvidia-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-qcom-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-renesas-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-rockchip-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-socionext-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-sprd-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-xilinx-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-64kb-devel-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-64kb-extra-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-64kb-optional-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-debug-vdso-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.aarch64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.x86_64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.81.3.150600.12.36.3.aarch64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.81.3.150600.12.36.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.81.3.150600.12.36.3.x86_64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-vdso-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-devel-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-docs-6.4.0-150600.23.81.1.noarch",
"openSUSE Leap 15.6:kernel-docs-html-6.4.0-150600.23.81.1.noarch",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-vdso-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-macros-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.s390x",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.x86_64",
"openSUSE Leap 15.6:kernel-source-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-source-vanilla-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.ppc64le",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.s390x",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.x86_64",
"openSUSE Leap 15.6:kernel-zfcpdump-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kselftests-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-50253",
"url": "https://www.suse.com/security/cve/CVE-2022-50253"
},
{
"category": "external",
"summary": "SUSE Bug 1249912 for CVE-2022-50253",
"url": "https://bugzilla.suse.com/1249912"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_81-default-1-150600.13.3.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_81-default-1-150600.13.3.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_81-default-1-150600.13.3.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-64kb-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-64kb-devel-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-devel-6.4.0-150600.23.81.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-macros-6.4.0-150600.23.81.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-zfcpdump-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-docs-6.4.0-150600.23.81.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-source-6.4.0-150600.23.81.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP6:kernel-default-extra-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:dlm-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:dtb-allwinner-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-altera-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-amazon-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-amd-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-amlogic-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-apm-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-apple-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-arm-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-broadcom-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-cavium-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-exynos-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-freescale-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-hisilicon-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-lg-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-marvell-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-mediatek-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-nvidia-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-qcom-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-renesas-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-rockchip-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-socionext-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-sprd-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-xilinx-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-64kb-devel-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-64kb-extra-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-64kb-optional-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-debug-vdso-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.aarch64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.x86_64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.81.3.150600.12.36.3.aarch64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.81.3.150600.12.36.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.81.3.150600.12.36.3.x86_64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-vdso-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-devel-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-docs-6.4.0-150600.23.81.1.noarch",
"openSUSE Leap 15.6:kernel-docs-html-6.4.0-150600.23.81.1.noarch",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-vdso-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-macros-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.s390x",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.x86_64",
"openSUSE Leap 15.6:kernel-source-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-source-vanilla-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.ppc64le",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.s390x",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.x86_64",
"openSUSE Leap 15.6:kernel-zfcpdump-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kselftests-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_81-default-1-150600.13.3.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_81-default-1-150600.13.3.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_81-default-1-150600.13.3.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-64kb-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-64kb-devel-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-devel-6.4.0-150600.23.81.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-macros-6.4.0-150600.23.81.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-zfcpdump-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-docs-6.4.0-150600.23.81.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-source-6.4.0-150600.23.81.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP6:kernel-default-extra-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:dlm-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:dtb-allwinner-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-altera-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-amazon-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-amd-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-amlogic-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-apm-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-apple-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-arm-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-broadcom-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-cavium-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-exynos-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-freescale-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-hisilicon-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-lg-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-marvell-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-mediatek-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-nvidia-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-qcom-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-renesas-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-rockchip-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-socionext-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-sprd-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-xilinx-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-64kb-devel-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-64kb-extra-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-64kb-optional-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-debug-vdso-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.aarch64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.x86_64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.81.3.150600.12.36.3.aarch64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.81.3.150600.12.36.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.81.3.150600.12.36.3.x86_64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-vdso-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-devel-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-docs-6.4.0-150600.23.81.1.noarch",
"openSUSE Leap 15.6:kernel-docs-html-6.4.0-150600.23.81.1.noarch",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-vdso-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-macros-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.s390x",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.x86_64",
"openSUSE Leap 15.6:kernel-source-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-source-vanilla-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.ppc64le",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.s390x",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.x86_64",
"openSUSE Leap 15.6:kernel-zfcpdump-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kselftests-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-17T10:52:47Z",
"details": "moderate"
}
],
"title": "CVE-2022-50253"
},
{
"cve": "CVE-2023-53676",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2023-53676"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nscsi: target: iscsi: Fix buffer overflow in lio_target_nacl_info_show()\n\nThe function lio_target_nacl_info_show() uses sprintf() in a loop to print\ndetails for every iSCSI connection in a session without checking for the\nbuffer length. With enough iSCSI connections it\u0027s possible to overflow the\nbuffer provided by configfs and corrupt the memory.\n\nThis patch replaces sprintf() with sysfs_emit_at() that checks for buffer\nboundries.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_81-default-1-150600.13.3.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_81-default-1-150600.13.3.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_81-default-1-150600.13.3.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-64kb-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-64kb-devel-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-devel-6.4.0-150600.23.81.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-macros-6.4.0-150600.23.81.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-zfcpdump-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-docs-6.4.0-150600.23.81.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-source-6.4.0-150600.23.81.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP6:kernel-default-extra-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:dlm-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:dtb-allwinner-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-altera-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-amazon-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-amd-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-amlogic-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-apm-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-apple-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-arm-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-broadcom-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-cavium-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-exynos-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-freescale-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-hisilicon-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-lg-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-marvell-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-mediatek-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-nvidia-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-qcom-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-renesas-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-rockchip-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-socionext-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-sprd-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-xilinx-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-64kb-devel-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-64kb-extra-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-64kb-optional-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-debug-vdso-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.aarch64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.x86_64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.81.3.150600.12.36.3.aarch64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.81.3.150600.12.36.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.81.3.150600.12.36.3.x86_64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-vdso-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-devel-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-docs-6.4.0-150600.23.81.1.noarch",
"openSUSE Leap 15.6:kernel-docs-html-6.4.0-150600.23.81.1.noarch",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-vdso-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-macros-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.s390x",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.x86_64",
"openSUSE Leap 15.6:kernel-source-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-source-vanilla-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.ppc64le",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.s390x",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.x86_64",
"openSUSE Leap 15.6:kernel-zfcpdump-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kselftests-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2023-53676",
"url": "https://www.suse.com/security/cve/CVE-2023-53676"
},
{
"category": "external",
"summary": "SUSE Bug 1251786 for CVE-2023-53676",
"url": "https://bugzilla.suse.com/1251786"
},
{
"category": "external",
"summary": "SUSE Bug 1251787 for CVE-2023-53676",
"url": "https://bugzilla.suse.com/1251787"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_81-default-1-150600.13.3.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_81-default-1-150600.13.3.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_81-default-1-150600.13.3.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-64kb-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-64kb-devel-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-devel-6.4.0-150600.23.81.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-macros-6.4.0-150600.23.81.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-zfcpdump-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-docs-6.4.0-150600.23.81.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-source-6.4.0-150600.23.81.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP6:kernel-default-extra-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:dlm-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:dtb-allwinner-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-altera-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-amazon-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-amd-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-amlogic-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-apm-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-apple-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-arm-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-broadcom-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-cavium-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-exynos-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-freescale-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-hisilicon-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-lg-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-marvell-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-mediatek-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-nvidia-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-qcom-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-renesas-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-rockchip-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-socionext-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-sprd-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-xilinx-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-64kb-devel-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-64kb-extra-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-64kb-optional-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-debug-vdso-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.aarch64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.x86_64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.81.3.150600.12.36.3.aarch64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.81.3.150600.12.36.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.81.3.150600.12.36.3.x86_64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-vdso-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-devel-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-docs-6.4.0-150600.23.81.1.noarch",
"openSUSE Leap 15.6:kernel-docs-html-6.4.0-150600.23.81.1.noarch",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-vdso-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-macros-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.s390x",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.x86_64",
"openSUSE Leap 15.6:kernel-source-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-source-vanilla-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.ppc64le",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.s390x",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.x86_64",
"openSUSE Leap 15.6:kernel-zfcpdump-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kselftests-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_81-default-1-150600.13.3.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_81-default-1-150600.13.3.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_81-default-1-150600.13.3.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-64kb-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-64kb-devel-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-devel-6.4.0-150600.23.81.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-macros-6.4.0-150600.23.81.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-zfcpdump-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-docs-6.4.0-150600.23.81.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-source-6.4.0-150600.23.81.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP6:kernel-default-extra-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:dlm-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:dtb-allwinner-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-altera-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-amazon-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-amd-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-amlogic-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-apm-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-apple-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-arm-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-broadcom-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-cavium-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-exynos-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-freescale-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-hisilicon-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-lg-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-marvell-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-mediatek-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-nvidia-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-qcom-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-renesas-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-rockchip-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-socionext-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-sprd-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-xilinx-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-64kb-devel-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-64kb-extra-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-64kb-optional-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-debug-vdso-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.aarch64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.x86_64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.81.3.150600.12.36.3.aarch64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.81.3.150600.12.36.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.81.3.150600.12.36.3.x86_64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-vdso-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-devel-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-docs-6.4.0-150600.23.81.1.noarch",
"openSUSE Leap 15.6:kernel-docs-html-6.4.0-150600.23.81.1.noarch",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-vdso-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-macros-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.s390x",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.x86_64",
"openSUSE Leap 15.6:kernel-source-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-source-vanilla-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.ppc64le",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.s390x",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.x86_64",
"openSUSE Leap 15.6:kernel-zfcpdump-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kselftests-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-17T10:52:47Z",
"details": "important"
}
],
"title": "CVE-2023-53676"
},
{
"cve": "CVE-2025-21710",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-21710"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\ntcp: correct handling of extreme memory squeeze\n\nTesting with iperf3 using the \"pasta\" protocol splicer has revealed\na problem in the way tcp handles window advertising in extreme memory\nsqueeze situations.\n\nUnder memory pressure, a socket endpoint may temporarily advertise\na zero-sized window, but this is not stored as part of the socket data.\nThe reasoning behind this is that it is considered a temporary setting\nwhich shouldn\u0027t influence any further calculations.\n\nHowever, if we happen to stall at an unfortunate value of the current\nwindow size, the algorithm selecting a new value will consistently fail\nto advertise a non-zero window once we have freed up enough memory.\nThis means that this side\u0027s notion of the current window size is\ndifferent from the one last advertised to the peer, causing the latter\nto not send any data to resolve the sitution.\n\nThe problem occurs on the iperf3 server side, and the socket in question\nis a completely regular socket with the default settings for the\nfedora40 kernel. We do not use SO_PEEK or SO_RCVBUF on the socket.\n\nThe following excerpt of a logging session, with own comments added,\nshows more in detail what is happening:\n\n// tcp_v4_rcv(-\u003e)\n// tcp_rcv_established(-\u003e)\n[5201\u003c-\u003e39222]: ==== Activating log @ net/ipv4/tcp_input.c/tcp_data_queue()/5257 ====\n[5201\u003c-\u003e39222]: tcp_data_queue(-\u003e)\n[5201\u003c-\u003e39222]: DROPPING skb [265600160..265665640], reason: SKB_DROP_REASON_PROTO_MEM\n [rcv_nxt 265600160, rcv_wnd 262144, snt_ack 265469200, win_now 131184]\n [copied_seq 259909392-\u003e260034360 (124968), unread 5565800, qlen 85, ofoq 0]\n [OFO queue: gap: 65480, len: 0]\n[5201\u003c-\u003e39222]: tcp_data_queue(\u003c-)\n[5201\u003c-\u003e39222]: __tcp_transmit_skb(-\u003e)\n [tp-\u003ercv_wup: 265469200, tp-\u003ercv_wnd: 262144, tp-\u003ercv_nxt 265600160]\n[5201\u003c-\u003e39222]: tcp_select_window(-\u003e)\n[5201\u003c-\u003e39222]: (inet_csk(sk)-\u003eicsk_ack.pending \u0026 ICSK_ACK_NOMEM) ? --\u003e TRUE\n [tp-\u003ercv_wup: 265469200, tp-\u003ercv_wnd: 262144, tp-\u003ercv_nxt 265600160]\n returning 0\n[5201\u003c-\u003e39222]: tcp_select_window(\u003c-)\n[5201\u003c-\u003e39222]: ADVERTISING WIN 0, ACK_SEQ: 265600160\n[5201\u003c-\u003e39222]: [__tcp_transmit_skb(\u003c-)\n[5201\u003c-\u003e39222]: tcp_rcv_established(\u003c-)\n[5201\u003c-\u003e39222]: tcp_v4_rcv(\u003c-)\n\n// Receive queue is at 85 buffers and we are out of memory.\n// We drop the incoming buffer, although it is in sequence, and decide\n// to send an advertisement with a window of zero.\n// We don\u0027t update tp-\u003ercv_wnd and tp-\u003ercv_wup accordingly, which means\n// we unconditionally shrink the window.\n\n[5201\u003c-\u003e39222]: tcp_recvmsg_locked(-\u003e)\n[5201\u003c-\u003e39222]: __tcp_cleanup_rbuf(-\u003e) tp-\u003ercv_wup: 265469200, tp-\u003ercv_wnd: 262144, tp-\u003ercv_nxt 265600160\n[5201\u003c-\u003e39222]: [new_win = 0, win_now = 131184, 2 * win_now = 262368]\n[5201\u003c-\u003e39222]: [new_win \u003e= (2 * win_now) ? --\u003e time_to_ack = 0]\n[5201\u003c-\u003e39222]: NOT calling tcp_send_ack()\n [tp-\u003ercv_wup: 265469200, tp-\u003ercv_wnd: 262144, tp-\u003ercv_nxt 265600160]\n[5201\u003c-\u003e39222]: __tcp_cleanup_rbuf(\u003c-)\n [rcv_nxt 265600160, rcv_wnd 262144, snt_ack 265469200, win_now 131184]\n [copied_seq 260040464-\u003e260040464 (0), unread 5559696, qlen 85, ofoq 0]\n returning 6104 bytes\n[5201\u003c-\u003e39222]: tcp_recvmsg_locked(\u003c-)\n\n// After each read, the algorithm for calculating the new receive\n// window in __tcp_cleanup_rbuf() finds it is too small to advertise\n// or to update tp-\u003ercv_wnd.\n// Meanwhile, the peer thinks the window is zero, and will not send\n// any more data to trigger an update from the interrupt mode side.\n\n[5201\u003c-\u003e39222]: tcp_recvmsg_locked(-\u003e)\n[5201\u003c-\u003e39222]: __tcp_cleanup_rbuf(-\u003e) tp-\u003ercv_wup: 265469200, tp-\u003ercv_wnd: 262144, tp-\u003ercv_nxt 265600160\n[5201\u003c-\u003e39222]: [new_win = 262144, win_now = 131184, 2 * win_n\n---truncated---",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_81-default-1-150600.13.3.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_81-default-1-150600.13.3.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_81-default-1-150600.13.3.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-64kb-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-64kb-devel-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-devel-6.4.0-150600.23.81.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-macros-6.4.0-150600.23.81.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-zfcpdump-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-docs-6.4.0-150600.23.81.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-source-6.4.0-150600.23.81.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP6:kernel-default-extra-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:dlm-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:dtb-allwinner-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-altera-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-amazon-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-amd-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-amlogic-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-apm-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-apple-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-arm-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-broadcom-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-cavium-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-exynos-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-freescale-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-hisilicon-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-lg-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-marvell-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-mediatek-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-nvidia-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-qcom-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-renesas-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-rockchip-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-socionext-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-sprd-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-xilinx-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-64kb-devel-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-64kb-extra-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-64kb-optional-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-debug-vdso-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.aarch64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.x86_64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.81.3.150600.12.36.3.aarch64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.81.3.150600.12.36.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.81.3.150600.12.36.3.x86_64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-vdso-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-devel-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-docs-6.4.0-150600.23.81.1.noarch",
"openSUSE Leap 15.6:kernel-docs-html-6.4.0-150600.23.81.1.noarch",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-vdso-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-macros-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.s390x",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.x86_64",
"openSUSE Leap 15.6:kernel-source-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-source-vanilla-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.ppc64le",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.s390x",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.x86_64",
"openSUSE Leap 15.6:kernel-zfcpdump-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kselftests-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-21710",
"url": "https://www.suse.com/security/cve/CVE-2025-21710"
},
{
"category": "external",
"summary": "SUSE Bug 1237888 for CVE-2025-21710",
"url": "https://bugzilla.suse.com/1237888"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_81-default-1-150600.13.3.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_81-default-1-150600.13.3.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_81-default-1-150600.13.3.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-64kb-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-64kb-devel-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-devel-6.4.0-150600.23.81.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-macros-6.4.0-150600.23.81.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-zfcpdump-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-docs-6.4.0-150600.23.81.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-source-6.4.0-150600.23.81.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP6:kernel-default-extra-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:dlm-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:dtb-allwinner-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-altera-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-amazon-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-amd-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-amlogic-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-apm-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-apple-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-arm-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-broadcom-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-cavium-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-exynos-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-freescale-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-hisilicon-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-lg-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-marvell-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-mediatek-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-nvidia-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-qcom-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-renesas-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-rockchip-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-socionext-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-sprd-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-xilinx-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-64kb-devel-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-64kb-extra-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-64kb-optional-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-debug-vdso-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.aarch64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.x86_64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.81.3.150600.12.36.3.aarch64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.81.3.150600.12.36.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.81.3.150600.12.36.3.x86_64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-vdso-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-devel-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-docs-6.4.0-150600.23.81.1.noarch",
"openSUSE Leap 15.6:kernel-docs-html-6.4.0-150600.23.81.1.noarch",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-vdso-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-macros-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.s390x",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.x86_64",
"openSUSE Leap 15.6:kernel-source-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-source-vanilla-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.ppc64le",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.s390x",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.x86_64",
"openSUSE Leap 15.6:kernel-zfcpdump-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kselftests-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_81-default-1-150600.13.3.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_81-default-1-150600.13.3.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_81-default-1-150600.13.3.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-64kb-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-64kb-devel-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-devel-6.4.0-150600.23.81.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-macros-6.4.0-150600.23.81.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-zfcpdump-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-docs-6.4.0-150600.23.81.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-source-6.4.0-150600.23.81.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP6:kernel-default-extra-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:dlm-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:dtb-allwinner-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-altera-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-amazon-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-amd-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-amlogic-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-apm-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-apple-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-arm-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-broadcom-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-cavium-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-exynos-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-freescale-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-hisilicon-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-lg-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-marvell-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-mediatek-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-nvidia-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-qcom-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-renesas-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-rockchip-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-socionext-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-sprd-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-xilinx-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-64kb-devel-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-64kb-extra-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-64kb-optional-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-debug-vdso-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.aarch64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.x86_64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.81.3.150600.12.36.3.aarch64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.81.3.150600.12.36.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.81.3.150600.12.36.3.x86_64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-vdso-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-devel-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-docs-6.4.0-150600.23.81.1.noarch",
"openSUSE Leap 15.6:kernel-docs-html-6.4.0-150600.23.81.1.noarch",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-vdso-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-macros-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.s390x",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.x86_64",
"openSUSE Leap 15.6:kernel-source-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-source-vanilla-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.ppc64le",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.s390x",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.x86_64",
"openSUSE Leap 15.6:kernel-zfcpdump-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kselftests-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-17T10:52:47Z",
"details": "moderate"
}
],
"title": "CVE-2025-21710"
},
{
"cve": "CVE-2025-37916",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-37916"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\npds_core: remove write-after-free of client_id\n\nA use-after-free error popped up in stress testing:\n\n[Mon Apr 21 21:21:33 2025] BUG: KFENCE: use-after-free write in pdsc_auxbus_dev_del+0xef/0x160 [pds_core]\n[Mon Apr 21 21:21:33 2025] Use-after-free write at 0x000000007013ecd1 (in kfence-#47):\n[Mon Apr 21 21:21:33 2025] pdsc_auxbus_dev_del+0xef/0x160 [pds_core]\n[Mon Apr 21 21:21:33 2025] pdsc_remove+0xc0/0x1b0 [pds_core]\n[Mon Apr 21 21:21:33 2025] pci_device_remove+0x24/0x70\n[Mon Apr 21 21:21:33 2025] device_release_driver_internal+0x11f/0x180\n[Mon Apr 21 21:21:33 2025] driver_detach+0x45/0x80\n[Mon Apr 21 21:21:33 2025] bus_remove_driver+0x83/0xe0\n[Mon Apr 21 21:21:33 2025] pci_unregister_driver+0x1a/0x80\n\nThe actual device uninit usually happens on a separate thread\nscheduled after this code runs, but there is no guarantee of order\nof thread execution, so this could be a problem. There\u0027s no\nactual need to clear the client_id at this point, so simply\nremove the offending code.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_81-default-1-150600.13.3.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_81-default-1-150600.13.3.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_81-default-1-150600.13.3.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-64kb-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-64kb-devel-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-devel-6.4.0-150600.23.81.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-macros-6.4.0-150600.23.81.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-zfcpdump-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-docs-6.4.0-150600.23.81.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-source-6.4.0-150600.23.81.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP6:kernel-default-extra-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:dlm-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:dtb-allwinner-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-altera-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-amazon-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-amd-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-amlogic-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-apm-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-apple-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-arm-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-broadcom-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-cavium-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-exynos-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-freescale-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-hisilicon-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-lg-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-marvell-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-mediatek-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-nvidia-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-qcom-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-renesas-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-rockchip-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-socionext-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-sprd-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-xilinx-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-64kb-devel-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-64kb-extra-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-64kb-optional-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-debug-vdso-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.aarch64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.x86_64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.81.3.150600.12.36.3.aarch64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.81.3.150600.12.36.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.81.3.150600.12.36.3.x86_64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-vdso-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-devel-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-docs-6.4.0-150600.23.81.1.noarch",
"openSUSE Leap 15.6:kernel-docs-html-6.4.0-150600.23.81.1.noarch",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-vdso-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-macros-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.s390x",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.x86_64",
"openSUSE Leap 15.6:kernel-source-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-source-vanilla-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.ppc64le",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.s390x",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.x86_64",
"openSUSE Leap 15.6:kernel-zfcpdump-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kselftests-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-37916",
"url": "https://www.suse.com/security/cve/CVE-2025-37916"
},
{
"category": "external",
"summary": "SUSE Bug 1243474 for CVE-2025-37916",
"url": "https://bugzilla.suse.com/1243474"
},
{
"category": "external",
"summary": "SUSE Bug 1243535 for CVE-2025-37916",
"url": "https://bugzilla.suse.com/1243535"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_81-default-1-150600.13.3.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_81-default-1-150600.13.3.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_81-default-1-150600.13.3.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-64kb-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-64kb-devel-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-devel-6.4.0-150600.23.81.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-macros-6.4.0-150600.23.81.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-zfcpdump-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-docs-6.4.0-150600.23.81.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-source-6.4.0-150600.23.81.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP6:kernel-default-extra-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:dlm-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:dtb-allwinner-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-altera-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-amazon-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-amd-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-amlogic-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-apm-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-apple-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-arm-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-broadcom-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-cavium-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-exynos-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-freescale-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-hisilicon-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-lg-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-marvell-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-mediatek-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-nvidia-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-qcom-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-renesas-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-rockchip-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-socionext-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-sprd-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-xilinx-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-64kb-devel-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-64kb-extra-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-64kb-optional-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-debug-vdso-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.aarch64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.x86_64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.81.3.150600.12.36.3.aarch64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.81.3.150600.12.36.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.81.3.150600.12.36.3.x86_64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-vdso-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-devel-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-docs-6.4.0-150600.23.81.1.noarch",
"openSUSE Leap 15.6:kernel-docs-html-6.4.0-150600.23.81.1.noarch",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-vdso-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-macros-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.s390x",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.x86_64",
"openSUSE Leap 15.6:kernel-source-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-source-vanilla-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.ppc64le",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.s390x",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.x86_64",
"openSUSE Leap 15.6:kernel-zfcpdump-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kselftests-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_81-default-1-150600.13.3.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_81-default-1-150600.13.3.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_81-default-1-150600.13.3.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-64kb-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-64kb-devel-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-devel-6.4.0-150600.23.81.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-macros-6.4.0-150600.23.81.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-zfcpdump-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-docs-6.4.0-150600.23.81.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-source-6.4.0-150600.23.81.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP6:kernel-default-extra-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:dlm-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:dtb-allwinner-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-altera-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-amazon-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-amd-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-amlogic-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-apm-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-apple-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-arm-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-broadcom-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-cavium-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-exynos-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-freescale-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-hisilicon-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-lg-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-marvell-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-mediatek-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-nvidia-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-qcom-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-renesas-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-rockchip-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-socionext-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-sprd-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-xilinx-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-64kb-devel-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-64kb-extra-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-64kb-optional-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-debug-vdso-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.aarch64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.x86_64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.81.3.150600.12.36.3.aarch64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.81.3.150600.12.36.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.81.3.150600.12.36.3.x86_64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-vdso-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-devel-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-docs-6.4.0-150600.23.81.1.noarch",
"openSUSE Leap 15.6:kernel-docs-html-6.4.0-150600.23.81.1.noarch",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-vdso-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-macros-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.s390x",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.x86_64",
"openSUSE Leap 15.6:kernel-source-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-source-vanilla-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.ppc64le",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.s390x",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.x86_64",
"openSUSE Leap 15.6:kernel-zfcpdump-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kselftests-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-17T10:52:47Z",
"details": "moderate"
}
],
"title": "CVE-2025-37916"
},
{
"cve": "CVE-2025-38359",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-38359"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\ns390/mm: Fix in_atomic() handling in do_secure_storage_access()\n\nKernel user spaces accesses to not exported pages in atomic context\nincorrectly try to resolve the page fault.\nWith debug options enabled call traces like this can be seen:\n\nBUG: sleeping function called from invalid context at kernel/locking/rwsem.c:1523\nin_atomic(): 1, irqs_disabled(): 0, non_block: 0, pid: 419074, name: qemu-system-s39\npreempt_count: 1, expected: 0\nRCU nest depth: 0, expected: 0\nINFO: lockdep is turned off.\nPreemption disabled at:\n[\u003c00000383ea47cfa2\u003e] copy_page_from_iter_atomic+0xa2/0x8a0\nCPU: 12 UID: 0 PID: 419074 Comm: qemu-system-s39\nTainted: G W 6.16.0-20250531.rc0.git0.69b3a602feac.63.fc42.s390x+debug #1 PREEMPT\nTainted: [W]=WARN\nHardware name: IBM 3931 A01 703 (LPAR)\nCall Trace:\n [\u003c00000383e990d282\u003e] dump_stack_lvl+0xa2/0xe8\n [\u003c00000383e99bf152\u003e] __might_resched+0x292/0x2d0\n [\u003c00000383eaa7c374\u003e] down_read+0x34/0x2d0\n [\u003c00000383e99432f8\u003e] do_secure_storage_access+0x108/0x360\n [\u003c00000383eaa724b0\u003e] __do_pgm_check+0x130/0x220\n [\u003c00000383eaa842e4\u003e] pgm_check_handler+0x114/0x160\n [\u003c00000383ea47d028\u003e] copy_page_from_iter_atomic+0x128/0x8a0\n([\u003c00000383ea47d016\u003e] copy_page_from_iter_atomic+0x116/0x8a0)\n [\u003c00000383e9c45eae\u003e] generic_perform_write+0x16e/0x310\n [\u003c00000383e9eb87f4\u003e] ext4_buffered_write_iter+0x84/0x160\n [\u003c00000383e9da0de4\u003e] vfs_write+0x1c4/0x460\n [\u003c00000383e9da123c\u003e] ksys_write+0x7c/0x100\n [\u003c00000383eaa7284e\u003e] __do_syscall+0x15e/0x280\n [\u003c00000383eaa8417e\u003e] system_call+0x6e/0x90\nINFO: lockdep is turned off.\n\nIt is not allowed to take the mmap_lock while in atomic context. Therefore\nhandle such a secure storage access fault as if the accessed page is not\nmapped: the uaccess function will return -EFAULT, and the caller has to\ndeal with this. Usually this means that the access is retried in process\ncontext, which allows to resolve the page fault (or in this case export the\npage).",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_81-default-1-150600.13.3.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_81-default-1-150600.13.3.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_81-default-1-150600.13.3.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-64kb-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-64kb-devel-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-devel-6.4.0-150600.23.81.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-macros-6.4.0-150600.23.81.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-zfcpdump-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-docs-6.4.0-150600.23.81.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-source-6.4.0-150600.23.81.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP6:kernel-default-extra-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:dlm-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:dtb-allwinner-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-altera-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-amazon-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-amd-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-amlogic-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-apm-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-apple-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-arm-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-broadcom-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-cavium-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-exynos-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-freescale-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-hisilicon-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-lg-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-marvell-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-mediatek-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-nvidia-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-qcom-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-renesas-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-rockchip-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-socionext-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-sprd-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-xilinx-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-64kb-devel-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-64kb-extra-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-64kb-optional-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-debug-vdso-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.aarch64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.x86_64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.81.3.150600.12.36.3.aarch64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.81.3.150600.12.36.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.81.3.150600.12.36.3.x86_64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-vdso-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-devel-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-docs-6.4.0-150600.23.81.1.noarch",
"openSUSE Leap 15.6:kernel-docs-html-6.4.0-150600.23.81.1.noarch",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-vdso-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-macros-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.s390x",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.x86_64",
"openSUSE Leap 15.6:kernel-source-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-source-vanilla-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.ppc64le",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.s390x",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.x86_64",
"openSUSE Leap 15.6:kernel-zfcpdump-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kselftests-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-38359",
"url": "https://www.suse.com/security/cve/CVE-2025-38359"
},
{
"category": "external",
"summary": "SUSE Bug 1247076 for CVE-2025-38359",
"url": "https://bugzilla.suse.com/1247076"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_81-default-1-150600.13.3.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_81-default-1-150600.13.3.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_81-default-1-150600.13.3.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-64kb-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-64kb-devel-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-devel-6.4.0-150600.23.81.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-macros-6.4.0-150600.23.81.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-zfcpdump-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-docs-6.4.0-150600.23.81.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-source-6.4.0-150600.23.81.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP6:kernel-default-extra-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:dlm-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:dtb-allwinner-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-altera-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-amazon-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-amd-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-amlogic-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-apm-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-apple-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-arm-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-broadcom-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-cavium-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-exynos-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-freescale-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-hisilicon-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-lg-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-marvell-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-mediatek-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-nvidia-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-qcom-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-renesas-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-rockchip-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-socionext-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-sprd-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-xilinx-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-64kb-devel-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-64kb-extra-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-64kb-optional-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-debug-vdso-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.aarch64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.x86_64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.81.3.150600.12.36.3.aarch64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.81.3.150600.12.36.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.81.3.150600.12.36.3.x86_64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-vdso-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-devel-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-docs-6.4.0-150600.23.81.1.noarch",
"openSUSE Leap 15.6:kernel-docs-html-6.4.0-150600.23.81.1.noarch",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-vdso-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-macros-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.s390x",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.x86_64",
"openSUSE Leap 15.6:kernel-source-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-source-vanilla-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.ppc64le",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.s390x",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.x86_64",
"openSUSE Leap 15.6:kernel-zfcpdump-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kselftests-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_81-default-1-150600.13.3.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_81-default-1-150600.13.3.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_81-default-1-150600.13.3.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-64kb-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-64kb-devel-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-devel-6.4.0-150600.23.81.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-macros-6.4.0-150600.23.81.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-zfcpdump-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-docs-6.4.0-150600.23.81.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-source-6.4.0-150600.23.81.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP6:kernel-default-extra-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:dlm-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:dtb-allwinner-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-altera-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-amazon-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-amd-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-amlogic-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-apm-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-apple-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-arm-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-broadcom-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-cavium-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-exynos-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-freescale-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-hisilicon-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-lg-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-marvell-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-mediatek-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-nvidia-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-qcom-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-renesas-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-rockchip-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-socionext-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-sprd-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-xilinx-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-64kb-devel-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-64kb-extra-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-64kb-optional-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-debug-vdso-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.aarch64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.x86_64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.81.3.150600.12.36.3.aarch64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.81.3.150600.12.36.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.81.3.150600.12.36.3.x86_64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-vdso-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-devel-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-docs-6.4.0-150600.23.81.1.noarch",
"openSUSE Leap 15.6:kernel-docs-html-6.4.0-150600.23.81.1.noarch",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-vdso-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-macros-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.s390x",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.x86_64",
"openSUSE Leap 15.6:kernel-source-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-source-vanilla-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.ppc64le",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.s390x",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.x86_64",
"openSUSE Leap 15.6:kernel-zfcpdump-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kselftests-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-17T10:52:47Z",
"details": "moderate"
}
],
"title": "CVE-2025-38359"
},
{
"cve": "CVE-2025-38361",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-38361"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\ndrm/amd/display: Check dce_hwseq before dereferencing it\n\n[WHAT]\n\nhws was checked for null earlier in dce110_blank_stream, indicating hws\ncan be null, and should be checked whenever it is used.\n\n(cherry picked from commit 79db43611ff61280b6de58ce1305e0b2ecf675ad)",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_81-default-1-150600.13.3.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_81-default-1-150600.13.3.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_81-default-1-150600.13.3.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-64kb-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-64kb-devel-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-devel-6.4.0-150600.23.81.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-macros-6.4.0-150600.23.81.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-zfcpdump-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-docs-6.4.0-150600.23.81.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-source-6.4.0-150600.23.81.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP6:kernel-default-extra-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:dlm-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:dtb-allwinner-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-altera-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-amazon-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-amd-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-amlogic-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-apm-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-apple-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-arm-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-broadcom-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-cavium-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-exynos-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-freescale-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-hisilicon-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-lg-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-marvell-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-mediatek-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-nvidia-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-qcom-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-renesas-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-rockchip-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-socionext-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-sprd-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-xilinx-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-64kb-devel-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-64kb-extra-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-64kb-optional-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-debug-vdso-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.aarch64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.x86_64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.81.3.150600.12.36.3.aarch64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.81.3.150600.12.36.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.81.3.150600.12.36.3.x86_64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-vdso-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-devel-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-docs-6.4.0-150600.23.81.1.noarch",
"openSUSE Leap 15.6:kernel-docs-html-6.4.0-150600.23.81.1.noarch",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-vdso-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-macros-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.s390x",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.x86_64",
"openSUSE Leap 15.6:kernel-source-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-source-vanilla-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.ppc64le",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.s390x",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.x86_64",
"openSUSE Leap 15.6:kernel-zfcpdump-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kselftests-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-38361",
"url": "https://www.suse.com/security/cve/CVE-2025-38361"
},
{
"category": "external",
"summary": "SUSE Bug 1247079 for CVE-2025-38361",
"url": "https://bugzilla.suse.com/1247079"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_81-default-1-150600.13.3.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_81-default-1-150600.13.3.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_81-default-1-150600.13.3.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-64kb-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-64kb-devel-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-devel-6.4.0-150600.23.81.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-macros-6.4.0-150600.23.81.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-zfcpdump-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-docs-6.4.0-150600.23.81.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-source-6.4.0-150600.23.81.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP6:kernel-default-extra-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:dlm-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:dtb-allwinner-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-altera-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-amazon-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-amd-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-amlogic-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-apm-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-apple-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-arm-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-broadcom-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-cavium-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-exynos-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-freescale-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-hisilicon-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-lg-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-marvell-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-mediatek-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-nvidia-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-qcom-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-renesas-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-rockchip-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-socionext-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-sprd-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-xilinx-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-64kb-devel-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-64kb-extra-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-64kb-optional-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-debug-vdso-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.aarch64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.x86_64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.81.3.150600.12.36.3.aarch64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.81.3.150600.12.36.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.81.3.150600.12.36.3.x86_64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-vdso-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-devel-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-docs-6.4.0-150600.23.81.1.noarch",
"openSUSE Leap 15.6:kernel-docs-html-6.4.0-150600.23.81.1.noarch",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-vdso-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-macros-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.s390x",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.x86_64",
"openSUSE Leap 15.6:kernel-source-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-source-vanilla-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.ppc64le",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.s390x",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.x86_64",
"openSUSE Leap 15.6:kernel-zfcpdump-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kselftests-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_81-default-1-150600.13.3.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_81-default-1-150600.13.3.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_81-default-1-150600.13.3.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-64kb-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-64kb-devel-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-devel-6.4.0-150600.23.81.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-macros-6.4.0-150600.23.81.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-zfcpdump-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-docs-6.4.0-150600.23.81.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-source-6.4.0-150600.23.81.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP6:kernel-default-extra-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:dlm-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:dtb-allwinner-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-altera-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-amazon-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-amd-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-amlogic-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-apm-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-apple-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-arm-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-broadcom-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-cavium-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-exynos-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-freescale-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-hisilicon-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-lg-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-marvell-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-mediatek-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-nvidia-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-qcom-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-renesas-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-rockchip-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-socionext-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-sprd-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-xilinx-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-64kb-devel-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-64kb-extra-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-64kb-optional-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-debug-vdso-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.aarch64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.x86_64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.81.3.150600.12.36.3.aarch64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.81.3.150600.12.36.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.81.3.150600.12.36.3.x86_64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-vdso-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-devel-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-docs-6.4.0-150600.23.81.1.noarch",
"openSUSE Leap 15.6:kernel-docs-html-6.4.0-150600.23.81.1.noarch",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-vdso-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-macros-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.s390x",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.x86_64",
"openSUSE Leap 15.6:kernel-source-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-source-vanilla-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.ppc64le",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.s390x",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.x86_64",
"openSUSE Leap 15.6:kernel-zfcpdump-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kselftests-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-17T10:52:47Z",
"details": "moderate"
}
],
"title": "CVE-2025-38361"
},
{
"cve": "CVE-2025-39788",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-39788"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nscsi: ufs: exynos: Fix programming of HCI_UTRL_NEXUS_TYPE\n\nOn Google gs101, the number of UTP transfer request slots (nutrs) is 32,\nand in this case the driver ends up programming the UTRL_NEXUS_TYPE\nincorrectly as 0.\n\nThis is because the left hand side of the shift is 1, which is of type\nint, i.e. 31 bits wide. Shifting by more than that width results in\nundefined behaviour.\n\nFix this by switching to the BIT() macro, which applies correct type\ncasting as required. This ensures the correct value is written to\nUTRL_NEXUS_TYPE (0xffffffff on gs101), and it also fixes a UBSAN shift\nwarning:\n\n UBSAN: shift-out-of-bounds in drivers/ufs/host/ufs-exynos.c:1113:21\n shift exponent 32 is too large for 32-bit type \u0027int\u0027\n\nFor consistency, apply the same change to the nutmrs / UTMRL_NEXUS_TYPE\nwrite.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_81-default-1-150600.13.3.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_81-default-1-150600.13.3.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_81-default-1-150600.13.3.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-64kb-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-64kb-devel-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-devel-6.4.0-150600.23.81.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-macros-6.4.0-150600.23.81.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-zfcpdump-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-docs-6.4.0-150600.23.81.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-source-6.4.0-150600.23.81.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP6:kernel-default-extra-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:dlm-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:dtb-allwinner-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-altera-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-amazon-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-amd-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-amlogic-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-apm-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-apple-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-arm-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-broadcom-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-cavium-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-exynos-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-freescale-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-hisilicon-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-lg-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-marvell-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-mediatek-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-nvidia-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-qcom-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-renesas-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-rockchip-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-socionext-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-sprd-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-xilinx-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-64kb-devel-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-64kb-extra-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-64kb-optional-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-debug-vdso-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.aarch64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.x86_64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.81.3.150600.12.36.3.aarch64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.81.3.150600.12.36.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.81.3.150600.12.36.3.x86_64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-vdso-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-devel-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-docs-6.4.0-150600.23.81.1.noarch",
"openSUSE Leap 15.6:kernel-docs-html-6.4.0-150600.23.81.1.noarch",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-vdso-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-macros-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.s390x",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.x86_64",
"openSUSE Leap 15.6:kernel-source-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-source-vanilla-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.ppc64le",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.s390x",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.x86_64",
"openSUSE Leap 15.6:kernel-zfcpdump-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kselftests-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-39788",
"url": "https://www.suse.com/security/cve/CVE-2025-39788"
},
{
"category": "external",
"summary": "SUSE Bug 1249547 for CVE-2025-39788",
"url": "https://bugzilla.suse.com/1249547"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_81-default-1-150600.13.3.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_81-default-1-150600.13.3.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_81-default-1-150600.13.3.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-64kb-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-64kb-devel-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-devel-6.4.0-150600.23.81.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-macros-6.4.0-150600.23.81.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-zfcpdump-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-docs-6.4.0-150600.23.81.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-source-6.4.0-150600.23.81.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP6:kernel-default-extra-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:dlm-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:dtb-allwinner-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-altera-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-amazon-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-amd-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-amlogic-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-apm-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-apple-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-arm-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-broadcom-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-cavium-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-exynos-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-freescale-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-hisilicon-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-lg-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-marvell-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-mediatek-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-nvidia-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-qcom-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-renesas-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-rockchip-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-socionext-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-sprd-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-xilinx-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-64kb-devel-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-64kb-extra-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-64kb-optional-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-debug-vdso-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.aarch64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.x86_64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.81.3.150600.12.36.3.aarch64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.81.3.150600.12.36.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.81.3.150600.12.36.3.x86_64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-vdso-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-devel-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-docs-6.4.0-150600.23.81.1.noarch",
"openSUSE Leap 15.6:kernel-docs-html-6.4.0-150600.23.81.1.noarch",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-vdso-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-macros-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.s390x",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.x86_64",
"openSUSE Leap 15.6:kernel-source-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-source-vanilla-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.ppc64le",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.s390x",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.x86_64",
"openSUSE Leap 15.6:kernel-zfcpdump-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kselftests-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_81-default-1-150600.13.3.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_81-default-1-150600.13.3.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_81-default-1-150600.13.3.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-64kb-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-64kb-devel-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-devel-6.4.0-150600.23.81.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-macros-6.4.0-150600.23.81.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-zfcpdump-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-docs-6.4.0-150600.23.81.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-source-6.4.0-150600.23.81.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP6:kernel-default-extra-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:dlm-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:dtb-allwinner-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-altera-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-amazon-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-amd-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-amlogic-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-apm-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-apple-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-arm-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-broadcom-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-cavium-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-exynos-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-freescale-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-hisilicon-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-lg-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-marvell-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-mediatek-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-nvidia-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-qcom-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-renesas-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-rockchip-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-socionext-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-sprd-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-xilinx-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-64kb-devel-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-64kb-extra-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-64kb-optional-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-debug-vdso-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.aarch64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.x86_64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.81.3.150600.12.36.3.aarch64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.81.3.150600.12.36.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.81.3.150600.12.36.3.x86_64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-vdso-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-devel-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-docs-6.4.0-150600.23.81.1.noarch",
"openSUSE Leap 15.6:kernel-docs-html-6.4.0-150600.23.81.1.noarch",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-vdso-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-macros-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.s390x",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.x86_64",
"openSUSE Leap 15.6:kernel-source-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-source-vanilla-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.ppc64le",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.s390x",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.x86_64",
"openSUSE Leap 15.6:kernel-zfcpdump-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kselftests-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-17T10:52:47Z",
"details": "moderate"
}
],
"title": "CVE-2025-39788"
},
{
"cve": "CVE-2025-39805",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-39805"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnet: macb: fix unregister_netdev call order in macb_remove()\n\nWhen removing a macb device, the driver calls phy_exit() before\nunregister_netdev(). This leads to a WARN from kernfs:\n\n ------------[ cut here ]------------\n kernfs: can not remove \u0027attached_dev\u0027, no directory\n WARNING: CPU: 1 PID: 27146 at fs/kernfs/dir.c:1683\n Call trace:\n kernfs_remove_by_name_ns+0xd8/0xf0\n sysfs_remove_link+0x24/0x58\n phy_detach+0x5c/0x168\n phy_disconnect+0x4c/0x70\n phylink_disconnect_phy+0x6c/0xc0 [phylink]\n macb_close+0x6c/0x170 [macb]\n ...\n macb_remove+0x60/0x168 [macb]\n platform_remove+0x5c/0x80\n ...\n\nThe warning happens because the PHY is being exited while the netdev\nis still registered. The correct order is to unregister the netdev\nbefore shutting down the PHY and cleaning up the MDIO bus.\n\nFix this by moving unregister_netdev() ahead of phy_exit() in\nmacb_remove().",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_81-default-1-150600.13.3.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_81-default-1-150600.13.3.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_81-default-1-150600.13.3.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-64kb-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-64kb-devel-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-devel-6.4.0-150600.23.81.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-macros-6.4.0-150600.23.81.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-zfcpdump-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-docs-6.4.0-150600.23.81.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-source-6.4.0-150600.23.81.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP6:kernel-default-extra-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:dlm-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:dtb-allwinner-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-altera-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-amazon-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-amd-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-amlogic-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-apm-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-apple-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-arm-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-broadcom-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-cavium-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-exynos-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-freescale-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-hisilicon-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-lg-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-marvell-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-mediatek-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-nvidia-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-qcom-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-renesas-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-rockchip-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-socionext-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-sprd-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-xilinx-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-64kb-devel-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-64kb-extra-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-64kb-optional-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-debug-vdso-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.aarch64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.x86_64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.81.3.150600.12.36.3.aarch64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.81.3.150600.12.36.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.81.3.150600.12.36.3.x86_64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-vdso-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-devel-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-docs-6.4.0-150600.23.81.1.noarch",
"openSUSE Leap 15.6:kernel-docs-html-6.4.0-150600.23.81.1.noarch",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-vdso-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-macros-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.s390x",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.x86_64",
"openSUSE Leap 15.6:kernel-source-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-source-vanilla-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.ppc64le",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.s390x",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.x86_64",
"openSUSE Leap 15.6:kernel-zfcpdump-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kselftests-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-39805",
"url": "https://www.suse.com/security/cve/CVE-2025-39805"
},
{
"category": "external",
"summary": "SUSE Bug 1249982 for CVE-2025-39805",
"url": "https://bugzilla.suse.com/1249982"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_81-default-1-150600.13.3.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_81-default-1-150600.13.3.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_81-default-1-150600.13.3.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-64kb-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-64kb-devel-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-devel-6.4.0-150600.23.81.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-macros-6.4.0-150600.23.81.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-zfcpdump-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-docs-6.4.0-150600.23.81.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-source-6.4.0-150600.23.81.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP6:kernel-default-extra-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:dlm-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:dtb-allwinner-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-altera-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-amazon-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-amd-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-amlogic-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-apm-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-apple-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-arm-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-broadcom-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-cavium-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-exynos-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-freescale-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-hisilicon-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-lg-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-marvell-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-mediatek-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-nvidia-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-qcom-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-renesas-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-rockchip-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-socionext-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-sprd-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-xilinx-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-64kb-devel-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-64kb-extra-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-64kb-optional-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-debug-vdso-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.aarch64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.x86_64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.81.3.150600.12.36.3.aarch64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.81.3.150600.12.36.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.81.3.150600.12.36.3.x86_64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-vdso-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-devel-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-docs-6.4.0-150600.23.81.1.noarch",
"openSUSE Leap 15.6:kernel-docs-html-6.4.0-150600.23.81.1.noarch",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-vdso-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-macros-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.s390x",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.x86_64",
"openSUSE Leap 15.6:kernel-source-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-source-vanilla-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.ppc64le",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.s390x",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.x86_64",
"openSUSE Leap 15.6:kernel-zfcpdump-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kselftests-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_81-default-1-150600.13.3.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_81-default-1-150600.13.3.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_81-default-1-150600.13.3.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-64kb-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-64kb-devel-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-devel-6.4.0-150600.23.81.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-macros-6.4.0-150600.23.81.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-zfcpdump-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-docs-6.4.0-150600.23.81.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-source-6.4.0-150600.23.81.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP6:kernel-default-extra-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:dlm-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:dtb-allwinner-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-altera-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-amazon-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-amd-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-amlogic-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-apm-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-apple-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-arm-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-broadcom-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-cavium-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-exynos-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-freescale-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-hisilicon-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-lg-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-marvell-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-mediatek-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-nvidia-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-qcom-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-renesas-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-rockchip-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-socionext-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-sprd-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-xilinx-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-64kb-devel-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-64kb-extra-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-64kb-optional-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-debug-vdso-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.aarch64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.x86_64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.81.3.150600.12.36.3.aarch64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.81.3.150600.12.36.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.81.3.150600.12.36.3.x86_64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-vdso-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-devel-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-docs-6.4.0-150600.23.81.1.noarch",
"openSUSE Leap 15.6:kernel-docs-html-6.4.0-150600.23.81.1.noarch",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-vdso-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-macros-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.s390x",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.x86_64",
"openSUSE Leap 15.6:kernel-source-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-source-vanilla-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.ppc64le",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.s390x",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.x86_64",
"openSUSE Leap 15.6:kernel-zfcpdump-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kselftests-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-17T10:52:47Z",
"details": "moderate"
}
],
"title": "CVE-2025-39805"
},
{
"cve": "CVE-2025-39819",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-39819"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nfs/smb: Fix inconsistent refcnt update\n\nA possible inconsistent update of refcount was identified in `smb2_compound_op`.\nSuch inconsistent update could lead to possible resource leaks.\n\nWhy it is a possible bug:\n1. In the comment section of the function, it clearly states that the\nreference to `cfile` should be dropped after calling this function.\n2. Every control flow path would check and drop the reference to\n`cfile`, except the patched one.\n3. Existing callers would not handle refcount update of `cfile` if\n-ENOMEM is returned.\n\nTo fix the bug, an extra goto label \"out\" is added, to make sure that the\ncleanup logic would always be respected. As the problem is caused by the\nallocation failure of `vars`, the cleanup logic between label \"finished\"\nand \"out\" can be safely ignored. According to the definition of function\n`is_replayable_error`, the error code of \"-ENOMEM\" is not recoverable.\nTherefore, the replay logic also gets ignored.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_81-default-1-150600.13.3.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_81-default-1-150600.13.3.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_81-default-1-150600.13.3.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-64kb-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-64kb-devel-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-devel-6.4.0-150600.23.81.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-macros-6.4.0-150600.23.81.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-zfcpdump-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-docs-6.4.0-150600.23.81.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-source-6.4.0-150600.23.81.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP6:kernel-default-extra-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:dlm-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:dtb-allwinner-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-altera-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-amazon-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-amd-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-amlogic-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-apm-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-apple-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-arm-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-broadcom-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-cavium-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-exynos-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-freescale-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-hisilicon-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-lg-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-marvell-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-mediatek-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-nvidia-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-qcom-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-renesas-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-rockchip-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-socionext-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-sprd-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-xilinx-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-64kb-devel-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-64kb-extra-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-64kb-optional-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-debug-vdso-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.aarch64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.x86_64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.81.3.150600.12.36.3.aarch64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.81.3.150600.12.36.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.81.3.150600.12.36.3.x86_64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-vdso-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-devel-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-docs-6.4.0-150600.23.81.1.noarch",
"openSUSE Leap 15.6:kernel-docs-html-6.4.0-150600.23.81.1.noarch",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-vdso-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-macros-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.s390x",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.x86_64",
"openSUSE Leap 15.6:kernel-source-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-source-vanilla-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.ppc64le",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.s390x",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.x86_64",
"openSUSE Leap 15.6:kernel-zfcpdump-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kselftests-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-39819",
"url": "https://www.suse.com/security/cve/CVE-2025-39819"
},
{
"category": "external",
"summary": "SUSE Bug 1250176 for CVE-2025-39819",
"url": "https://bugzilla.suse.com/1250176"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_81-default-1-150600.13.3.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_81-default-1-150600.13.3.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_81-default-1-150600.13.3.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-64kb-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-64kb-devel-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-devel-6.4.0-150600.23.81.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-macros-6.4.0-150600.23.81.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-zfcpdump-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-docs-6.4.0-150600.23.81.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-source-6.4.0-150600.23.81.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP6:kernel-default-extra-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:dlm-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:dtb-allwinner-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-altera-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-amazon-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-amd-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-amlogic-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-apm-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-apple-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-arm-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-broadcom-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-cavium-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-exynos-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-freescale-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-hisilicon-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-lg-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-marvell-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-mediatek-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-nvidia-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-qcom-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-renesas-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-rockchip-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-socionext-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-sprd-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-xilinx-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-64kb-devel-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-64kb-extra-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-64kb-optional-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-debug-vdso-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.aarch64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.x86_64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.81.3.150600.12.36.3.aarch64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.81.3.150600.12.36.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.81.3.150600.12.36.3.x86_64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-vdso-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-devel-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-docs-6.4.0-150600.23.81.1.noarch",
"openSUSE Leap 15.6:kernel-docs-html-6.4.0-150600.23.81.1.noarch",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-vdso-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-macros-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.s390x",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.x86_64",
"openSUSE Leap 15.6:kernel-source-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-source-vanilla-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.ppc64le",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.s390x",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.x86_64",
"openSUSE Leap 15.6:kernel-zfcpdump-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kselftests-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_81-default-1-150600.13.3.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_81-default-1-150600.13.3.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_81-default-1-150600.13.3.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-64kb-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-64kb-devel-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-devel-6.4.0-150600.23.81.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-macros-6.4.0-150600.23.81.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-zfcpdump-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-docs-6.4.0-150600.23.81.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-source-6.4.0-150600.23.81.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP6:kernel-default-extra-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:dlm-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:dtb-allwinner-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-altera-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-amazon-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-amd-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-amlogic-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-apm-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-apple-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-arm-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-broadcom-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-cavium-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-exynos-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-freescale-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-hisilicon-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-lg-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-marvell-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-mediatek-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-nvidia-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-qcom-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-renesas-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-rockchip-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-socionext-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-sprd-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-xilinx-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-64kb-devel-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-64kb-extra-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-64kb-optional-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-debug-vdso-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.aarch64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.x86_64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.81.3.150600.12.36.3.aarch64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.81.3.150600.12.36.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.81.3.150600.12.36.3.x86_64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-vdso-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-devel-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-docs-6.4.0-150600.23.81.1.noarch",
"openSUSE Leap 15.6:kernel-docs-html-6.4.0-150600.23.81.1.noarch",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-vdso-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-macros-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.s390x",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.x86_64",
"openSUSE Leap 15.6:kernel-source-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-source-vanilla-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.ppc64le",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.s390x",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.x86_64",
"openSUSE Leap 15.6:kernel-zfcpdump-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kselftests-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-17T10:52:47Z",
"details": "moderate"
}
],
"title": "CVE-2025-39819"
},
{
"cve": "CVE-2025-39859",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-39859"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nptp: ocp: fix use-after-free bugs causing by ptp_ocp_watchdog\n\nThe ptp_ocp_detach() only shuts down the watchdog timer if it is\npending. However, if the timer handler is already running, the\ntimer_delete_sync() is not called. This leads to race conditions\nwhere the devlink that contains the ptp_ocp is deallocated while\nthe timer handler is still accessing it, resulting in use-after-free\nbugs. The following details one of the race scenarios.\n\n(thread 1) | (thread 2)\nptp_ocp_remove() |\n ptp_ocp_detach() | ptp_ocp_watchdog()\n if (timer_pending(\u0026bp-\u003ewatchdog))| bp = timer_container_of()\n timer_delete_sync() |\n |\n devlink_free(devlink) //free |\n | bp-\u003e //use\n\nResolve this by unconditionally calling timer_delete_sync() to ensure\nthe timer is reliably deactivated, preventing any access after free.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_81-default-1-150600.13.3.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_81-default-1-150600.13.3.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_81-default-1-150600.13.3.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-64kb-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-64kb-devel-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-devel-6.4.0-150600.23.81.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-macros-6.4.0-150600.23.81.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-zfcpdump-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-docs-6.4.0-150600.23.81.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-source-6.4.0-150600.23.81.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP6:kernel-default-extra-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:dlm-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:dtb-allwinner-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-altera-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-amazon-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-amd-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-amlogic-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-apm-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-apple-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-arm-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-broadcom-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-cavium-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-exynos-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-freescale-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-hisilicon-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-lg-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-marvell-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-mediatek-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-nvidia-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-qcom-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-renesas-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-rockchip-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-socionext-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-sprd-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-xilinx-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-64kb-devel-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-64kb-extra-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-64kb-optional-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-debug-vdso-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.aarch64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.x86_64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.81.3.150600.12.36.3.aarch64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.81.3.150600.12.36.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.81.3.150600.12.36.3.x86_64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-vdso-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-devel-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-docs-6.4.0-150600.23.81.1.noarch",
"openSUSE Leap 15.6:kernel-docs-html-6.4.0-150600.23.81.1.noarch",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-vdso-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-macros-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.s390x",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.x86_64",
"openSUSE Leap 15.6:kernel-source-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-source-vanilla-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.ppc64le",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.s390x",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.x86_64",
"openSUSE Leap 15.6:kernel-zfcpdump-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kselftests-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-39859",
"url": "https://www.suse.com/security/cve/CVE-2025-39859"
},
{
"category": "external",
"summary": "SUSE Bug 1250252 for CVE-2025-39859",
"url": "https://bugzilla.suse.com/1250252"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_81-default-1-150600.13.3.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_81-default-1-150600.13.3.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_81-default-1-150600.13.3.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-64kb-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-64kb-devel-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-devel-6.4.0-150600.23.81.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-macros-6.4.0-150600.23.81.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-zfcpdump-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-docs-6.4.0-150600.23.81.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-source-6.4.0-150600.23.81.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP6:kernel-default-extra-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:dlm-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:dtb-allwinner-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-altera-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-amazon-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-amd-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-amlogic-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-apm-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-apple-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-arm-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-broadcom-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-cavium-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-exynos-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-freescale-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-hisilicon-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-lg-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-marvell-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-mediatek-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-nvidia-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-qcom-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-renesas-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-rockchip-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-socionext-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-sprd-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-xilinx-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-64kb-devel-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-64kb-extra-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-64kb-optional-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-debug-vdso-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.aarch64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.x86_64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.81.3.150600.12.36.3.aarch64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.81.3.150600.12.36.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.81.3.150600.12.36.3.x86_64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-vdso-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-devel-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-docs-6.4.0-150600.23.81.1.noarch",
"openSUSE Leap 15.6:kernel-docs-html-6.4.0-150600.23.81.1.noarch",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-vdso-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-macros-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.s390x",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.x86_64",
"openSUSE Leap 15.6:kernel-source-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-source-vanilla-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.ppc64le",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.s390x",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.x86_64",
"openSUSE Leap 15.6:kernel-zfcpdump-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kselftests-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_81-default-1-150600.13.3.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_81-default-1-150600.13.3.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_81-default-1-150600.13.3.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-64kb-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-64kb-devel-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-devel-6.4.0-150600.23.81.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-macros-6.4.0-150600.23.81.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-zfcpdump-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-docs-6.4.0-150600.23.81.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-source-6.4.0-150600.23.81.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP6:kernel-default-extra-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:dlm-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:dtb-allwinner-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-altera-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-amazon-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-amd-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-amlogic-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-apm-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-apple-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-arm-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-broadcom-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-cavium-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-exynos-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-freescale-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-hisilicon-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-lg-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-marvell-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-mediatek-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-nvidia-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-qcom-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-renesas-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-rockchip-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-socionext-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-sprd-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-xilinx-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-64kb-devel-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-64kb-extra-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-64kb-optional-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-debug-vdso-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.aarch64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.x86_64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.81.3.150600.12.36.3.aarch64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.81.3.150600.12.36.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.81.3.150600.12.36.3.x86_64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-vdso-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-devel-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-docs-6.4.0-150600.23.81.1.noarch",
"openSUSE Leap 15.6:kernel-docs-html-6.4.0-150600.23.81.1.noarch",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-vdso-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-macros-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.s390x",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.x86_64",
"openSUSE Leap 15.6:kernel-source-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-source-vanilla-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.ppc64le",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.s390x",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.x86_64",
"openSUSE Leap 15.6:kernel-zfcpdump-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kselftests-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-17T10:52:47Z",
"details": "moderate"
}
],
"title": "CVE-2025-39859"
},
{
"cve": "CVE-2025-39944",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-39944"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nocteontx2-pf: Fix use-after-free bugs in otx2_sync_tstamp()\n\nThe original code relies on cancel_delayed_work() in otx2_ptp_destroy(),\nwhich does not ensure that the delayed work item synctstamp_work has fully\ncompleted if it was already running. This leads to use-after-free scenarios\nwhere otx2_ptp is deallocated by otx2_ptp_destroy(), while synctstamp_work\nremains active and attempts to dereference otx2_ptp in otx2_sync_tstamp().\nFurthermore, the synctstamp_work is cyclic, the likelihood of triggering\nthe bug is nonnegligible.\n\nA typical race condition is illustrated below:\n\nCPU 0 (cleanup) | CPU 1 (delayed work callback)\notx2_remove() |\n otx2_ptp_destroy() | otx2_sync_tstamp()\n cancel_delayed_work() |\n kfree(ptp) |\n | ptp = container_of(...); //UAF\n | ptp-\u003e //UAF\n\nThis is confirmed by a KASAN report:\n\nBUG: KASAN: slab-use-after-free in __run_timer_base.part.0+0x7d7/0x8c0\nWrite of size 8 at addr ffff88800aa09a18 by task bash/136\n...\nCall Trace:\n \u003cIRQ\u003e\n dump_stack_lvl+0x55/0x70\n print_report+0xcf/0x610\n ? __run_timer_base.part.0+0x7d7/0x8c0\n kasan_report+0xb8/0xf0\n ? __run_timer_base.part.0+0x7d7/0x8c0\n __run_timer_base.part.0+0x7d7/0x8c0\n ? __pfx___run_timer_base.part.0+0x10/0x10\n ? __pfx_read_tsc+0x10/0x10\n ? ktime_get+0x60/0x140\n ? lapic_next_event+0x11/0x20\n ? clockevents_program_event+0x1d4/0x2a0\n run_timer_softirq+0xd1/0x190\n handle_softirqs+0x16a/0x550\n irq_exit_rcu+0xaf/0xe0\n sysvec_apic_timer_interrupt+0x70/0x80\n \u003c/IRQ\u003e\n...\nAllocated by task 1:\n kasan_save_stack+0x24/0x50\n kasan_save_track+0x14/0x30\n __kasan_kmalloc+0x7f/0x90\n otx2_ptp_init+0xb1/0x860\n otx2_probe+0x4eb/0xc30\n local_pci_probe+0xdc/0x190\n pci_device_probe+0x2fe/0x470\n really_probe+0x1ca/0x5c0\n __driver_probe_device+0x248/0x310\n driver_probe_device+0x44/0x120\n __driver_attach+0xd2/0x310\n bus_for_each_dev+0xed/0x170\n bus_add_driver+0x208/0x500\n driver_register+0x132/0x460\n do_one_initcall+0x89/0x300\n kernel_init_freeable+0x40d/0x720\n kernel_init+0x1a/0x150\n ret_from_fork+0x10c/0x1a0\n ret_from_fork_asm+0x1a/0x30\n\nFreed by task 136:\n kasan_save_stack+0x24/0x50\n kasan_save_track+0x14/0x30\n kasan_save_free_info+0x3a/0x60\n __kasan_slab_free+0x3f/0x50\n kfree+0x137/0x370\n otx2_ptp_destroy+0x38/0x80\n otx2_remove+0x10d/0x4c0\n pci_device_remove+0xa6/0x1d0\n device_release_driver_internal+0xf8/0x210\n pci_stop_bus_device+0x105/0x150\n pci_stop_and_remove_bus_device_locked+0x15/0x30\n remove_store+0xcc/0xe0\n kernfs_fop_write_iter+0x2c3/0x440\n vfs_write+0x871/0xd70\n ksys_write+0xee/0x1c0\n do_syscall_64+0xac/0x280\n entry_SYSCALL_64_after_hwframe+0x77/0x7f\n...\n\nReplace cancel_delayed_work() with cancel_delayed_work_sync() to ensure\nthat the delayed work item is properly canceled before the otx2_ptp is\ndeallocated.\n\nThis bug was initially identified through static analysis. To reproduce\nand test it, I simulated the OcteonTX2 PCI device in QEMU and introduced\nartificial delays within the otx2_sync_tstamp() function to increase the\nlikelihood of triggering the bug.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_81-default-1-150600.13.3.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_81-default-1-150600.13.3.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_81-default-1-150600.13.3.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-64kb-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-64kb-devel-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-devel-6.4.0-150600.23.81.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-macros-6.4.0-150600.23.81.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-zfcpdump-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-docs-6.4.0-150600.23.81.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-source-6.4.0-150600.23.81.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP6:kernel-default-extra-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:dlm-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:dtb-allwinner-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-altera-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-amazon-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-amd-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-amlogic-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-apm-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-apple-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-arm-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-broadcom-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-cavium-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-exynos-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-freescale-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-hisilicon-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-lg-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-marvell-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-mediatek-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-nvidia-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-qcom-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-renesas-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-rockchip-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-socionext-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-sprd-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-xilinx-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-64kb-devel-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-64kb-extra-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-64kb-optional-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-debug-vdso-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.aarch64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.x86_64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.81.3.150600.12.36.3.aarch64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.81.3.150600.12.36.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.81.3.150600.12.36.3.x86_64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-vdso-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-devel-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-docs-6.4.0-150600.23.81.1.noarch",
"openSUSE Leap 15.6:kernel-docs-html-6.4.0-150600.23.81.1.noarch",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-vdso-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-macros-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.s390x",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.x86_64",
"openSUSE Leap 15.6:kernel-source-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-source-vanilla-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.ppc64le",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.s390x",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.x86_64",
"openSUSE Leap 15.6:kernel-zfcpdump-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kselftests-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-39944",
"url": "https://www.suse.com/security/cve/CVE-2025-39944"
},
{
"category": "external",
"summary": "SUSE Bug 1251120 for CVE-2025-39944",
"url": "https://bugzilla.suse.com/1251120"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_81-default-1-150600.13.3.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_81-default-1-150600.13.3.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_81-default-1-150600.13.3.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-64kb-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-64kb-devel-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-devel-6.4.0-150600.23.81.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-macros-6.4.0-150600.23.81.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-zfcpdump-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-docs-6.4.0-150600.23.81.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-source-6.4.0-150600.23.81.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP6:kernel-default-extra-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:dlm-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:dtb-allwinner-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-altera-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-amazon-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-amd-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-amlogic-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-apm-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-apple-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-arm-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-broadcom-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-cavium-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-exynos-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-freescale-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-hisilicon-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-lg-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-marvell-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-mediatek-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-nvidia-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-qcom-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-renesas-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-rockchip-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-socionext-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-sprd-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-xilinx-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-64kb-devel-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-64kb-extra-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-64kb-optional-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-debug-vdso-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.aarch64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.x86_64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.81.3.150600.12.36.3.aarch64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.81.3.150600.12.36.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.81.3.150600.12.36.3.x86_64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-vdso-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-devel-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-docs-6.4.0-150600.23.81.1.noarch",
"openSUSE Leap 15.6:kernel-docs-html-6.4.0-150600.23.81.1.noarch",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-vdso-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-macros-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.s390x",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.x86_64",
"openSUSE Leap 15.6:kernel-source-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-source-vanilla-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.ppc64le",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.s390x",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.x86_64",
"openSUSE Leap 15.6:kernel-zfcpdump-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kselftests-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_81-default-1-150600.13.3.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_81-default-1-150600.13.3.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_81-default-1-150600.13.3.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-64kb-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-64kb-devel-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-devel-6.4.0-150600.23.81.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-macros-6.4.0-150600.23.81.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-zfcpdump-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-docs-6.4.0-150600.23.81.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-source-6.4.0-150600.23.81.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP6:kernel-default-extra-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:dlm-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:dtb-allwinner-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-altera-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-amazon-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-amd-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-amlogic-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-apm-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-apple-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-arm-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-broadcom-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-cavium-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-exynos-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-freescale-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-hisilicon-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-lg-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-marvell-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-mediatek-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-nvidia-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-qcom-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-renesas-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-rockchip-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-socionext-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-sprd-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-xilinx-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-64kb-devel-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-64kb-extra-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-64kb-optional-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-debug-vdso-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.aarch64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.x86_64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.81.3.150600.12.36.3.aarch64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.81.3.150600.12.36.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.81.3.150600.12.36.3.x86_64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-vdso-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-devel-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-docs-6.4.0-150600.23.81.1.noarch",
"openSUSE Leap 15.6:kernel-docs-html-6.4.0-150600.23.81.1.noarch",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-vdso-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-macros-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.s390x",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.x86_64",
"openSUSE Leap 15.6:kernel-source-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-source-vanilla-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.ppc64le",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.s390x",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.x86_64",
"openSUSE Leap 15.6:kernel-zfcpdump-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kselftests-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-17T10:52:47Z",
"details": "moderate"
}
],
"title": "CVE-2025-39944"
},
{
"cve": "CVE-2025-39980",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-39980"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnexthop: Forbid FDB status change while nexthop is in a group\n\nThe kernel forbids the creation of non-FDB nexthop groups with FDB\nnexthops:\n\n # ip nexthop add id 1 via 192.0.2.1 fdb\n # ip nexthop add id 2 group 1\n Error: Non FDB nexthop group cannot have fdb nexthops.\n\nAnd vice versa:\n\n # ip nexthop add id 3 via 192.0.2.2 dev dummy1\n # ip nexthop add id 4 group 3 fdb\n Error: FDB nexthop group can only have fdb nexthops.\n\nHowever, as long as no routes are pointing to a non-FDB nexthop group,\nthe kernel allows changing the type of a nexthop from FDB to non-FDB and\nvice versa:\n\n # ip nexthop add id 5 via 192.0.2.2 dev dummy1\n # ip nexthop add id 6 group 5\n # ip nexthop replace id 5 via 192.0.2.2 fdb\n # echo $?\n 0\n\nThis configuration is invalid and can result in a NPD [1] since FDB\nnexthops are not associated with a nexthop device:\n\n # ip route add 198.51.100.1/32 nhid 6\n # ping 198.51.100.1\n\nFix by preventing nexthop FDB status change while the nexthop is in a\ngroup:\n\n # ip nexthop add id 7 via 192.0.2.2 dev dummy1\n # ip nexthop add id 8 group 7\n # ip nexthop replace id 7 via 192.0.2.2 fdb\n Error: Cannot change nexthop FDB status while in a group.\n\n[1]\nBUG: kernel NULL pointer dereference, address: 00000000000003c0\n[...]\nOops: Oops: 0000 [#1] SMP\nCPU: 6 UID: 0 PID: 367 Comm: ping Not tainted 6.17.0-rc6-virtme-gb65678cacc03 #1 PREEMPT(voluntary)\nHardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.17.0-4.fc41 04/01/2014\nRIP: 0010:fib_lookup_good_nhc+0x1e/0x80\n[...]\nCall Trace:\n \u003cTASK\u003e\n fib_table_lookup+0x541/0x650\n ip_route_output_key_hash_rcu+0x2ea/0x970\n ip_route_output_key_hash+0x55/0x80\n __ip4_datagram_connect+0x250/0x330\n udp_connect+0x2b/0x60\n __sys_connect+0x9c/0xd0\n __x64_sys_connect+0x18/0x20\n do_syscall_64+0xa4/0x2a0\n entry_SYSCALL_64_after_hwframe+0x4b/0x53",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_81-default-1-150600.13.3.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_81-default-1-150600.13.3.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_81-default-1-150600.13.3.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-64kb-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-64kb-devel-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-devel-6.4.0-150600.23.81.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-macros-6.4.0-150600.23.81.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-zfcpdump-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-docs-6.4.0-150600.23.81.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-source-6.4.0-150600.23.81.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP6:kernel-default-extra-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:dlm-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:dtb-allwinner-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-altera-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-amazon-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-amd-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-amlogic-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-apm-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-apple-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-arm-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-broadcom-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-cavium-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-exynos-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-freescale-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-hisilicon-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-lg-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-marvell-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-mediatek-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-nvidia-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-qcom-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-renesas-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-rockchip-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-socionext-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-sprd-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-xilinx-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-64kb-devel-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-64kb-extra-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-64kb-optional-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-debug-vdso-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.aarch64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.x86_64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.81.3.150600.12.36.3.aarch64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.81.3.150600.12.36.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.81.3.150600.12.36.3.x86_64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-vdso-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-devel-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-docs-6.4.0-150600.23.81.1.noarch",
"openSUSE Leap 15.6:kernel-docs-html-6.4.0-150600.23.81.1.noarch",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-vdso-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-macros-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.s390x",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.x86_64",
"openSUSE Leap 15.6:kernel-source-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-source-vanilla-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.ppc64le",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.s390x",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.x86_64",
"openSUSE Leap 15.6:kernel-zfcpdump-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kselftests-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-39980",
"url": "https://www.suse.com/security/cve/CVE-2025-39980"
},
{
"category": "external",
"summary": "SUSE Bug 1252063 for CVE-2025-39980",
"url": "https://bugzilla.suse.com/1252063"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_81-default-1-150600.13.3.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_81-default-1-150600.13.3.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_81-default-1-150600.13.3.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-64kb-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-64kb-devel-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-devel-6.4.0-150600.23.81.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-macros-6.4.0-150600.23.81.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-zfcpdump-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-docs-6.4.0-150600.23.81.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-source-6.4.0-150600.23.81.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP6:kernel-default-extra-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:dlm-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:dtb-allwinner-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-altera-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-amazon-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-amd-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-amlogic-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-apm-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-apple-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-arm-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-broadcom-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-cavium-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-exynos-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-freescale-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-hisilicon-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-lg-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-marvell-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-mediatek-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-nvidia-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-qcom-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-renesas-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-rockchip-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-socionext-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-sprd-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-xilinx-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-64kb-devel-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-64kb-extra-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-64kb-optional-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-debug-vdso-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.aarch64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.x86_64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.81.3.150600.12.36.3.aarch64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.81.3.150600.12.36.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.81.3.150600.12.36.3.x86_64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-vdso-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-devel-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-docs-6.4.0-150600.23.81.1.noarch",
"openSUSE Leap 15.6:kernel-docs-html-6.4.0-150600.23.81.1.noarch",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-vdso-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-macros-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.s390x",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.x86_64",
"openSUSE Leap 15.6:kernel-source-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-source-vanilla-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.ppc64le",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.s390x",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.x86_64",
"openSUSE Leap 15.6:kernel-zfcpdump-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kselftests-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_81-default-1-150600.13.3.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_81-default-1-150600.13.3.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_81-default-1-150600.13.3.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-64kb-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-64kb-devel-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-devel-6.4.0-150600.23.81.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-macros-6.4.0-150600.23.81.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-zfcpdump-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-docs-6.4.0-150600.23.81.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-source-6.4.0-150600.23.81.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP6:kernel-default-extra-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:dlm-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:dtb-allwinner-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-altera-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-amazon-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-amd-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-amlogic-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-apm-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-apple-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-arm-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-broadcom-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-cavium-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-exynos-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-freescale-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-hisilicon-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-lg-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-marvell-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-mediatek-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-nvidia-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-qcom-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-renesas-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-rockchip-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-socionext-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-sprd-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-xilinx-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-64kb-devel-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-64kb-extra-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-64kb-optional-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-debug-vdso-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.aarch64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.x86_64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.81.3.150600.12.36.3.aarch64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.81.3.150600.12.36.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.81.3.150600.12.36.3.x86_64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-vdso-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-devel-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-docs-6.4.0-150600.23.81.1.noarch",
"openSUSE Leap 15.6:kernel-docs-html-6.4.0-150600.23.81.1.noarch",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-vdso-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-macros-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.s390x",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.x86_64",
"openSUSE Leap 15.6:kernel-source-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-source-vanilla-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.ppc64le",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.s390x",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.x86_64",
"openSUSE Leap 15.6:kernel-zfcpdump-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kselftests-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-17T10:52:47Z",
"details": "moderate"
}
],
"title": "CVE-2025-39980"
},
{
"cve": "CVE-2025-40001",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40001"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nscsi: mvsas: Fix use-after-free bugs in mvs_work_queue\n\nDuring the detaching of Marvell\u0027s SAS/SATA controller, the original code\ncalls cancel_delayed_work() in mvs_free() to cancel the delayed work\nitem mwq-\u003ework_q. However, if mwq-\u003ework_q is already running, the\ncancel_delayed_work() may fail to cancel it. This can lead to\nuse-after-free scenarios where mvs_free() frees the mvs_info while\nmvs_work_queue() is still executing and attempts to access the\nalready-freed mvs_info.\n\nA typical race condition is illustrated below:\n\nCPU 0 (remove) | CPU 1 (delayed work callback)\nmvs_pci_remove() |\n mvs_free() | mvs_work_queue()\n cancel_delayed_work() |\n kfree(mvi) |\n | mvi-\u003e // UAF\n\nReplace cancel_delayed_work() with cancel_delayed_work_sync() to ensure\nthat the delayed work item is properly canceled and any executing\ndelayed work item completes before the mvs_info is deallocated.\n\nThis bug was found by static analysis.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_81-default-1-150600.13.3.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_81-default-1-150600.13.3.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_81-default-1-150600.13.3.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-64kb-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-64kb-devel-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-devel-6.4.0-150600.23.81.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-macros-6.4.0-150600.23.81.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-zfcpdump-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-docs-6.4.0-150600.23.81.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-source-6.4.0-150600.23.81.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP6:kernel-default-extra-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:dlm-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:dtb-allwinner-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-altera-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-amazon-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-amd-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-amlogic-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-apm-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-apple-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-arm-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-broadcom-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-cavium-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-exynos-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-freescale-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-hisilicon-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-lg-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-marvell-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-mediatek-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-nvidia-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-qcom-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-renesas-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-rockchip-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-socionext-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-sprd-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-xilinx-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-64kb-devel-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-64kb-extra-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-64kb-optional-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-debug-vdso-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.aarch64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.x86_64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.81.3.150600.12.36.3.aarch64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.81.3.150600.12.36.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.81.3.150600.12.36.3.x86_64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-vdso-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-devel-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-docs-6.4.0-150600.23.81.1.noarch",
"openSUSE Leap 15.6:kernel-docs-html-6.4.0-150600.23.81.1.noarch",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-vdso-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-macros-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.s390x",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.x86_64",
"openSUSE Leap 15.6:kernel-source-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-source-vanilla-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.ppc64le",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.s390x",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.x86_64",
"openSUSE Leap 15.6:kernel-zfcpdump-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kselftests-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40001",
"url": "https://www.suse.com/security/cve/CVE-2025-40001"
},
{
"category": "external",
"summary": "SUSE Bug 1252303 for CVE-2025-40001",
"url": "https://bugzilla.suse.com/1252303"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_81-default-1-150600.13.3.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_81-default-1-150600.13.3.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_81-default-1-150600.13.3.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-64kb-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-64kb-devel-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-devel-6.4.0-150600.23.81.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-macros-6.4.0-150600.23.81.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-zfcpdump-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-docs-6.4.0-150600.23.81.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-source-6.4.0-150600.23.81.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP6:kernel-default-extra-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:dlm-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:dtb-allwinner-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-altera-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-amazon-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-amd-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-amlogic-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-apm-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-apple-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-arm-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-broadcom-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-cavium-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-exynos-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-freescale-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-hisilicon-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-lg-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-marvell-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-mediatek-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-nvidia-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-qcom-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-renesas-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-rockchip-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-socionext-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-sprd-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-xilinx-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-64kb-devel-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-64kb-extra-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-64kb-optional-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-debug-vdso-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.aarch64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.x86_64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.81.3.150600.12.36.3.aarch64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.81.3.150600.12.36.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.81.3.150600.12.36.3.x86_64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-vdso-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-devel-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-docs-6.4.0-150600.23.81.1.noarch",
"openSUSE Leap 15.6:kernel-docs-html-6.4.0-150600.23.81.1.noarch",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-vdso-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-macros-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.s390x",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.x86_64",
"openSUSE Leap 15.6:kernel-source-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-source-vanilla-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.ppc64le",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.s390x",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.x86_64",
"openSUSE Leap 15.6:kernel-zfcpdump-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kselftests-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.8,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_81-default-1-150600.13.3.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_81-default-1-150600.13.3.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_81-default-1-150600.13.3.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-64kb-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-64kb-devel-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-devel-6.4.0-150600.23.81.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-macros-6.4.0-150600.23.81.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-zfcpdump-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-docs-6.4.0-150600.23.81.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-source-6.4.0-150600.23.81.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP6:kernel-default-extra-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:dlm-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:dtb-allwinner-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-altera-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-amazon-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-amd-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-amlogic-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-apm-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-apple-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-arm-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-broadcom-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-cavium-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-exynos-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-freescale-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-hisilicon-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-lg-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-marvell-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-mediatek-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-nvidia-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-qcom-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-renesas-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-rockchip-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-socionext-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-sprd-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-xilinx-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-64kb-devel-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-64kb-extra-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-64kb-optional-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-debug-vdso-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.aarch64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.x86_64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.81.3.150600.12.36.3.aarch64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.81.3.150600.12.36.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.81.3.150600.12.36.3.x86_64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-vdso-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-devel-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-docs-6.4.0-150600.23.81.1.noarch",
"openSUSE Leap 15.6:kernel-docs-html-6.4.0-150600.23.81.1.noarch",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-vdso-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-macros-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.s390x",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.x86_64",
"openSUSE Leap 15.6:kernel-source-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-source-vanilla-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.ppc64le",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.s390x",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.x86_64",
"openSUSE Leap 15.6:kernel-zfcpdump-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kselftests-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-17T10:52:47Z",
"details": "moderate"
}
],
"title": "CVE-2025-40001"
},
{
"cve": "CVE-2025-40021",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40021"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\ntracing: dynevent: Add a missing lockdown check on dynevent\n\nSince dynamic_events interface on tracefs is compatible with\nkprobe_events and uprobe_events, it should also check the lockdown\nstatus and reject if it is set.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_81-default-1-150600.13.3.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_81-default-1-150600.13.3.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_81-default-1-150600.13.3.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-64kb-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-64kb-devel-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-devel-6.4.0-150600.23.81.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-macros-6.4.0-150600.23.81.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-zfcpdump-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-docs-6.4.0-150600.23.81.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-source-6.4.0-150600.23.81.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP6:kernel-default-extra-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:dlm-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:dtb-allwinner-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-altera-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-amazon-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-amd-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-amlogic-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-apm-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-apple-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-arm-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-broadcom-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-cavium-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-exynos-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-freescale-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-hisilicon-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-lg-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-marvell-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-mediatek-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-nvidia-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-qcom-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-renesas-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-rockchip-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-socionext-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-sprd-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-xilinx-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-64kb-devel-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-64kb-extra-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-64kb-optional-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-debug-vdso-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.aarch64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.x86_64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.81.3.150600.12.36.3.aarch64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.81.3.150600.12.36.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.81.3.150600.12.36.3.x86_64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-vdso-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-devel-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-docs-6.4.0-150600.23.81.1.noarch",
"openSUSE Leap 15.6:kernel-docs-html-6.4.0-150600.23.81.1.noarch",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-vdso-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-macros-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.s390x",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.x86_64",
"openSUSE Leap 15.6:kernel-source-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-source-vanilla-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.ppc64le",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.s390x",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.x86_64",
"openSUSE Leap 15.6:kernel-zfcpdump-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kselftests-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40021",
"url": "https://www.suse.com/security/cve/CVE-2025-40021"
},
{
"category": "external",
"summary": "SUSE Bug 1252681 for CVE-2025-40021",
"url": "https://bugzilla.suse.com/1252681"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_81-default-1-150600.13.3.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_81-default-1-150600.13.3.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_81-default-1-150600.13.3.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-64kb-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-64kb-devel-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-devel-6.4.0-150600.23.81.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-macros-6.4.0-150600.23.81.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-zfcpdump-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-docs-6.4.0-150600.23.81.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-source-6.4.0-150600.23.81.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP6:kernel-default-extra-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:dlm-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:dtb-allwinner-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-altera-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-amazon-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-amd-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-amlogic-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-apm-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-apple-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-arm-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-broadcom-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-cavium-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-exynos-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-freescale-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-hisilicon-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-lg-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-marvell-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-mediatek-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-nvidia-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-qcom-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-renesas-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-rockchip-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-socionext-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-sprd-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-xilinx-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-64kb-devel-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-64kb-extra-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-64kb-optional-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-debug-vdso-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.aarch64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.x86_64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.81.3.150600.12.36.3.aarch64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.81.3.150600.12.36.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.81.3.150600.12.36.3.x86_64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-vdso-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-devel-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-docs-6.4.0-150600.23.81.1.noarch",
"openSUSE Leap 15.6:kernel-docs-html-6.4.0-150600.23.81.1.noarch",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-vdso-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-macros-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.s390x",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.x86_64",
"openSUSE Leap 15.6:kernel-source-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-source-vanilla-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.ppc64le",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.s390x",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.x86_64",
"openSUSE Leap 15.6:kernel-zfcpdump-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kselftests-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_81-default-1-150600.13.3.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_81-default-1-150600.13.3.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_81-default-1-150600.13.3.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-64kb-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-64kb-devel-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-devel-6.4.0-150600.23.81.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-macros-6.4.0-150600.23.81.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-zfcpdump-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-docs-6.4.0-150600.23.81.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-source-6.4.0-150600.23.81.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP6:kernel-default-extra-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:dlm-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:dtb-allwinner-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-altera-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-amazon-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-amd-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-amlogic-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-apm-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-apple-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-arm-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-broadcom-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-cavium-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-exynos-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-freescale-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-hisilicon-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-lg-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-marvell-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-mediatek-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-nvidia-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-qcom-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-renesas-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-rockchip-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-socionext-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-sprd-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-xilinx-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-64kb-devel-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-64kb-extra-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-64kb-optional-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-debug-vdso-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.aarch64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.x86_64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.81.3.150600.12.36.3.aarch64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.81.3.150600.12.36.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.81.3.150600.12.36.3.x86_64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-vdso-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-devel-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-docs-6.4.0-150600.23.81.1.noarch",
"openSUSE Leap 15.6:kernel-docs-html-6.4.0-150600.23.81.1.noarch",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-vdso-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-macros-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.s390x",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.x86_64",
"openSUSE Leap 15.6:kernel-source-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-source-vanilla-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.ppc64le",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.s390x",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.x86_64",
"openSUSE Leap 15.6:kernel-zfcpdump-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kselftests-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-17T10:52:47Z",
"details": "moderate"
}
],
"title": "CVE-2025-40021"
},
{
"cve": "CVE-2025-40027",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40027"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnet/9p: fix double req put in p9_fd_cancelled\n\nSyzkaller reports a KASAN issue as below:\n\ngeneral protection fault, probably for non-canonical address 0xfbd59c0000000021: 0000 [#1] PREEMPT SMP KASAN NOPTI\nKASAN: maybe wild-memory-access in range [0xdead000000000108-0xdead00000000010f]\nCPU: 0 PID: 5083 Comm: syz-executor.2 Not tainted 6.1.134-syzkaller-00037-g855bd1d7d838 #0\nHardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014\nRIP: 0010:__list_del include/linux/list.h:114 [inline]\nRIP: 0010:__list_del_entry include/linux/list.h:137 [inline]\nRIP: 0010:list_del include/linux/list.h:148 [inline]\nRIP: 0010:p9_fd_cancelled+0xe9/0x200 net/9p/trans_fd.c:734\n\nCall Trace:\n \u003cTASK\u003e\n p9_client_flush+0x351/0x440 net/9p/client.c:614\n p9_client_rpc+0xb6b/0xc70 net/9p/client.c:734\n p9_client_version net/9p/client.c:920 [inline]\n p9_client_create+0xb51/0x1240 net/9p/client.c:1027\n v9fs_session_init+0x1f0/0x18f0 fs/9p/v9fs.c:408\n v9fs_mount+0xba/0xcb0 fs/9p/vfs_super.c:126\n legacy_get_tree+0x108/0x220 fs/fs_context.c:632\n vfs_get_tree+0x8e/0x300 fs/super.c:1573\n do_new_mount fs/namespace.c:3056 [inline]\n path_mount+0x6a6/0x1e90 fs/namespace.c:3386\n do_mount fs/namespace.c:3399 [inline]\n __do_sys_mount fs/namespace.c:3607 [inline]\n __se_sys_mount fs/namespace.c:3584 [inline]\n __x64_sys_mount+0x283/0x300 fs/namespace.c:3584\n do_syscall_x64 arch/x86/entry/common.c:51 [inline]\n do_syscall_64+0x35/0x80 arch/x86/entry/common.c:81\n entry_SYSCALL_64_after_hwframe+0x6e/0xd8\n\nThis happens because of a race condition between:\n\n- The 9p client sending an invalid flush request and later cleaning it up;\n- The 9p client in p9_read_work() canceled all pending requests.\n\n Thread 1 Thread 2\n ...\n p9_client_create()\n ...\n p9_fd_create()\n ...\n p9_conn_create()\n ...\n // start Thread 2\n INIT_WORK(\u0026m-\u003erq, p9_read_work);\n p9_read_work()\n ...\n p9_client_rpc()\n ...\n ...\n p9_conn_cancel()\n ...\n spin_lock(\u0026m-\u003ereq_lock);\n ...\n p9_fd_cancelled()\n ...\n ...\n spin_unlock(\u0026m-\u003ereq_lock);\n // status rewrite\n p9_client_cb(m-\u003eclient, req, REQ_STATUS_ERROR)\n // first remove\n list_del(\u0026req-\u003ereq_list);\n ...\n\n spin_lock(\u0026m-\u003ereq_lock)\n ...\n // second remove\n list_del(\u0026req-\u003ereq_list);\n spin_unlock(\u0026m-\u003ereq_lock)\n ...\n\nCommit 74d6a5d56629 (\"9p/trans_fd: Fix concurrency del of req_list in\np9_fd_cancelled/p9_read_work\") fixes a concurrency issue in the 9p filesystem\nclient where the req_list could be deleted simultaneously by both\np9_read_work and p9_fd_cancelled functions, but for the case where req-\u003estatus\nequals REQ_STATUS_RCVD.\n\nUpdate the check for req-\u003estatus in p9_fd_cancelled to skip processing not\njust received requests, but anything that is not SENT, as whatever\nchanged the state from SENT also removed the request from its list.\n\nFound by Linux Verification Center (linuxtesting.org) with Syzkaller.\n\n[updated the check from status == RECV || status == ERROR to status != SENT]",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_81-default-1-150600.13.3.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_81-default-1-150600.13.3.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_81-default-1-150600.13.3.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-64kb-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-64kb-devel-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-devel-6.4.0-150600.23.81.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-macros-6.4.0-150600.23.81.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-zfcpdump-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-docs-6.4.0-150600.23.81.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-source-6.4.0-150600.23.81.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP6:kernel-default-extra-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:dlm-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:dtb-allwinner-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-altera-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-amazon-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-amd-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-amlogic-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-apm-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-apple-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-arm-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-broadcom-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-cavium-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-exynos-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-freescale-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-hisilicon-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-lg-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-marvell-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-mediatek-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-nvidia-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-qcom-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-renesas-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-rockchip-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-socionext-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-sprd-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-xilinx-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-64kb-devel-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-64kb-extra-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-64kb-optional-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-debug-vdso-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.aarch64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.x86_64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.81.3.150600.12.36.3.aarch64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.81.3.150600.12.36.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.81.3.150600.12.36.3.x86_64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-vdso-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-devel-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-docs-6.4.0-150600.23.81.1.noarch",
"openSUSE Leap 15.6:kernel-docs-html-6.4.0-150600.23.81.1.noarch",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-vdso-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-macros-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.s390x",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.x86_64",
"openSUSE Leap 15.6:kernel-source-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-source-vanilla-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.ppc64le",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.s390x",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.x86_64",
"openSUSE Leap 15.6:kernel-zfcpdump-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kselftests-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40027",
"url": "https://www.suse.com/security/cve/CVE-2025-40027"
},
{
"category": "external",
"summary": "SUSE Bug 1252763 for CVE-2025-40027",
"url": "https://bugzilla.suse.com/1252763"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_81-default-1-150600.13.3.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_81-default-1-150600.13.3.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_81-default-1-150600.13.3.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-64kb-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-64kb-devel-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-devel-6.4.0-150600.23.81.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-macros-6.4.0-150600.23.81.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-zfcpdump-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-docs-6.4.0-150600.23.81.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-source-6.4.0-150600.23.81.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP6:kernel-default-extra-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:dlm-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:dtb-allwinner-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-altera-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-amazon-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-amd-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-amlogic-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-apm-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-apple-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-arm-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-broadcom-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-cavium-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-exynos-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-freescale-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-hisilicon-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-lg-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-marvell-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-mediatek-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-nvidia-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-qcom-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-renesas-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-rockchip-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-socionext-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-sprd-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-xilinx-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-64kb-devel-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-64kb-extra-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-64kb-optional-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-debug-vdso-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.aarch64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.x86_64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.81.3.150600.12.36.3.aarch64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.81.3.150600.12.36.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.81.3.150600.12.36.3.x86_64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-vdso-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-devel-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-docs-6.4.0-150600.23.81.1.noarch",
"openSUSE Leap 15.6:kernel-docs-html-6.4.0-150600.23.81.1.noarch",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-vdso-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-macros-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.s390x",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.x86_64",
"openSUSE Leap 15.6:kernel-source-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-source-vanilla-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.ppc64le",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.s390x",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.x86_64",
"openSUSE Leap 15.6:kernel-zfcpdump-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kselftests-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_81-default-1-150600.13.3.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_81-default-1-150600.13.3.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_81-default-1-150600.13.3.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-64kb-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-64kb-devel-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-devel-6.4.0-150600.23.81.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-macros-6.4.0-150600.23.81.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-zfcpdump-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-docs-6.4.0-150600.23.81.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-source-6.4.0-150600.23.81.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP6:kernel-default-extra-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:dlm-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:dtb-allwinner-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-altera-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-amazon-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-amd-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-amlogic-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-apm-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-apple-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-arm-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-broadcom-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-cavium-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-exynos-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-freescale-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-hisilicon-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-lg-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-marvell-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-mediatek-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-nvidia-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-qcom-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-renesas-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-rockchip-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-socionext-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-sprd-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-xilinx-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-64kb-devel-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-64kb-extra-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-64kb-optional-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-debug-vdso-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.aarch64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.x86_64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.81.3.150600.12.36.3.aarch64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.81.3.150600.12.36.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.81.3.150600.12.36.3.x86_64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-vdso-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-devel-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-docs-6.4.0-150600.23.81.1.noarch",
"openSUSE Leap 15.6:kernel-docs-html-6.4.0-150600.23.81.1.noarch",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-vdso-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-macros-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.s390x",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.x86_64",
"openSUSE Leap 15.6:kernel-source-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-source-vanilla-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.ppc64le",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.s390x",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.x86_64",
"openSUSE Leap 15.6:kernel-zfcpdump-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kselftests-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-17T10:52:47Z",
"details": "moderate"
}
],
"title": "CVE-2025-40027"
},
{
"cve": "CVE-2025-40030",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40030"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\npinctrl: check the return value of pinmux_ops::get_function_name()\n\nWhile the API contract in docs doesn\u0027t specify it explicitly, the\ngeneric implementation of the get_function_name() callback from struct\npinmux_ops - pinmux_generic_get_function_name() - can fail and return\nNULL. This is already checked in pinmux_check_ops() so add a similar\ncheck in pinmux_func_name_to_selector() instead of passing the returned\npointer right down to strcmp() where the NULL can get dereferenced. This\nis normal operation when adding new pinfunctions.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_81-default-1-150600.13.3.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_81-default-1-150600.13.3.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_81-default-1-150600.13.3.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-64kb-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-64kb-devel-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-devel-6.4.0-150600.23.81.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-macros-6.4.0-150600.23.81.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-zfcpdump-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-docs-6.4.0-150600.23.81.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-source-6.4.0-150600.23.81.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP6:kernel-default-extra-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:dlm-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:dtb-allwinner-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-altera-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-amazon-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-amd-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-amlogic-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-apm-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-apple-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-arm-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-broadcom-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-cavium-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-exynos-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-freescale-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-hisilicon-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-lg-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-marvell-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-mediatek-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-nvidia-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-qcom-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-renesas-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-rockchip-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-socionext-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-sprd-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-xilinx-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-64kb-devel-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-64kb-extra-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-64kb-optional-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-debug-vdso-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.aarch64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.x86_64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.81.3.150600.12.36.3.aarch64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.81.3.150600.12.36.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.81.3.150600.12.36.3.x86_64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-vdso-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-devel-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-docs-6.4.0-150600.23.81.1.noarch",
"openSUSE Leap 15.6:kernel-docs-html-6.4.0-150600.23.81.1.noarch",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-vdso-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-macros-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.s390x",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.x86_64",
"openSUSE Leap 15.6:kernel-source-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-source-vanilla-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.ppc64le",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.s390x",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.x86_64",
"openSUSE Leap 15.6:kernel-zfcpdump-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kselftests-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40030",
"url": "https://www.suse.com/security/cve/CVE-2025-40030"
},
{
"category": "external",
"summary": "SUSE Bug 1252773 for CVE-2025-40030",
"url": "https://bugzilla.suse.com/1252773"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_81-default-1-150600.13.3.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_81-default-1-150600.13.3.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_81-default-1-150600.13.3.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-64kb-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-64kb-devel-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-devel-6.4.0-150600.23.81.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-macros-6.4.0-150600.23.81.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-zfcpdump-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-docs-6.4.0-150600.23.81.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-source-6.4.0-150600.23.81.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP6:kernel-default-extra-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:dlm-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:dtb-allwinner-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-altera-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-amazon-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-amd-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-amlogic-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-apm-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-apple-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-arm-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-broadcom-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-cavium-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-exynos-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-freescale-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-hisilicon-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-lg-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-marvell-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-mediatek-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-nvidia-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-qcom-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-renesas-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-rockchip-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-socionext-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-sprd-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-xilinx-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-64kb-devel-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-64kb-extra-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-64kb-optional-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-debug-vdso-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.aarch64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.x86_64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.81.3.150600.12.36.3.aarch64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.81.3.150600.12.36.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.81.3.150600.12.36.3.x86_64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-vdso-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-devel-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-docs-6.4.0-150600.23.81.1.noarch",
"openSUSE Leap 15.6:kernel-docs-html-6.4.0-150600.23.81.1.noarch",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-vdso-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-macros-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.s390x",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.x86_64",
"openSUSE Leap 15.6:kernel-source-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-source-vanilla-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.ppc64le",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.s390x",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.x86_64",
"openSUSE Leap 15.6:kernel-zfcpdump-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kselftests-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_81-default-1-150600.13.3.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_81-default-1-150600.13.3.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_81-default-1-150600.13.3.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-64kb-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-64kb-devel-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-devel-6.4.0-150600.23.81.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-macros-6.4.0-150600.23.81.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-zfcpdump-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-docs-6.4.0-150600.23.81.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-source-6.4.0-150600.23.81.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP6:kernel-default-extra-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:dlm-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:dtb-allwinner-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-altera-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-amazon-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-amd-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-amlogic-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-apm-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-apple-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-arm-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-broadcom-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-cavium-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-exynos-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-freescale-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-hisilicon-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-lg-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-marvell-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-mediatek-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-nvidia-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-qcom-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-renesas-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-rockchip-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-socionext-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-sprd-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-xilinx-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-64kb-devel-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-64kb-extra-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-64kb-optional-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-debug-vdso-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.aarch64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.x86_64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.81.3.150600.12.36.3.aarch64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.81.3.150600.12.36.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.81.3.150600.12.36.3.x86_64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-vdso-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-devel-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-docs-6.4.0-150600.23.81.1.noarch",
"openSUSE Leap 15.6:kernel-docs-html-6.4.0-150600.23.81.1.noarch",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-vdso-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-macros-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.s390x",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.x86_64",
"openSUSE Leap 15.6:kernel-source-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-source-vanilla-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.ppc64le",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.s390x",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.x86_64",
"openSUSE Leap 15.6:kernel-zfcpdump-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kselftests-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-17T10:52:47Z",
"details": "moderate"
}
],
"title": "CVE-2025-40030"
},
{
"cve": "CVE-2025-40038",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40038"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nKVM: SVM: Skip fastpath emulation on VM-Exit if next RIP isn\u0027t valid\n\nSkip the WRMSR and HLT fastpaths in SVM\u0027s VM-Exit handler if the next RIP\nisn\u0027t valid, e.g. because KVM is running with nrips=false. SVM must\ndecode and emulate to skip the instruction if the CPU doesn\u0027t provide the\nnext RIP, and getting the instruction bytes to decode requires reading\nguest memory. Reading guest memory through the emulator can fault, i.e.\ncan sleep, which is disallowed since the fastpath handlers run with IRQs\ndisabled.\n\n BUG: sleeping function called from invalid context at ./include/linux/uaccess.h:106\n in_atomic(): 1, irqs_disabled(): 1, non_block: 0, pid: 32611, name: qemu\n preempt_count: 1, expected: 0\n INFO: lockdep is turned off.\n irq event stamp: 30580\n hardirqs last enabled at (30579): [\u003cffffffffc08b2527\u003e] vcpu_run+0x1787/0x1db0 [kvm]\n hardirqs last disabled at (30580): [\u003cffffffffb4f62e32\u003e] __schedule+0x1e2/0xed0\n softirqs last enabled at (30570): [\u003cffffffffb4247a64\u003e] fpu_swap_kvm_fpstate+0x44/0x210\n softirqs last disabled at (30568): [\u003cffffffffb4247a64\u003e] fpu_swap_kvm_fpstate+0x44/0x210\n CPU: 298 UID: 0 PID: 32611 Comm: qemu Tainted: G U 6.16.0-smp--e6c618b51cfe-sleep #782 NONE\n Tainted: [U]=USER\n Hardware name: Google Astoria-Turin/astoria, BIOS 0.20241223.2-0 01/17/2025\n Call Trace:\n \u003cTASK\u003e\n dump_stack_lvl+0x7d/0xb0\n __might_resched+0x271/0x290\n __might_fault+0x28/0x80\n kvm_vcpu_read_guest_page+0x8d/0xc0 [kvm]\n kvm_fetch_guest_virt+0x92/0xc0 [kvm]\n __do_insn_fetch_bytes+0xf3/0x1e0 [kvm]\n x86_decode_insn+0xd1/0x1010 [kvm]\n x86_emulate_instruction+0x105/0x810 [kvm]\n __svm_skip_emulated_instruction+0xc4/0x140 [kvm_amd]\n handle_fastpath_invd+0xc4/0x1a0 [kvm]\n vcpu_run+0x11a1/0x1db0 [kvm]\n kvm_arch_vcpu_ioctl_run+0x5cc/0x730 [kvm]\n kvm_vcpu_ioctl+0x578/0x6a0 [kvm]\n __se_sys_ioctl+0x6d/0xb0\n do_syscall_64+0x8a/0x2c0\n entry_SYSCALL_64_after_hwframe+0x4b/0x53\n RIP: 0033:0x7f479d57a94b\n \u003c/TASK\u003e\n\nNote, this is essentially a reapply of commit 5c30e8101e8d (\"KVM: SVM:\nSkip WRMSR fastpath on VM-Exit if next RIP isn\u0027t valid\"), but with\ndifferent justification (KVM now grabs SRCU when skipping the instruction\nfor other reasons).",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_81-default-1-150600.13.3.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_81-default-1-150600.13.3.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_81-default-1-150600.13.3.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-64kb-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-64kb-devel-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-devel-6.4.0-150600.23.81.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-macros-6.4.0-150600.23.81.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-zfcpdump-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-docs-6.4.0-150600.23.81.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-source-6.4.0-150600.23.81.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP6:kernel-default-extra-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:dlm-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:dtb-allwinner-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-altera-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-amazon-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-amd-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-amlogic-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-apm-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-apple-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-arm-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-broadcom-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-cavium-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-exynos-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-freescale-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-hisilicon-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-lg-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-marvell-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-mediatek-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-nvidia-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-qcom-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-renesas-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-rockchip-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-socionext-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-sprd-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-xilinx-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-64kb-devel-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-64kb-extra-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-64kb-optional-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-debug-vdso-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.aarch64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.x86_64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.81.3.150600.12.36.3.aarch64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.81.3.150600.12.36.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.81.3.150600.12.36.3.x86_64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-vdso-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-devel-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-docs-6.4.0-150600.23.81.1.noarch",
"openSUSE Leap 15.6:kernel-docs-html-6.4.0-150600.23.81.1.noarch",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-vdso-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-macros-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.s390x",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.x86_64",
"openSUSE Leap 15.6:kernel-source-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-source-vanilla-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.ppc64le",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.s390x",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.x86_64",
"openSUSE Leap 15.6:kernel-zfcpdump-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kselftests-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40038",
"url": "https://www.suse.com/security/cve/CVE-2025-40038"
},
{
"category": "external",
"summary": "SUSE Bug 1252817 for CVE-2025-40038",
"url": "https://bugzilla.suse.com/1252817"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_81-default-1-150600.13.3.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_81-default-1-150600.13.3.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_81-default-1-150600.13.3.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-64kb-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-64kb-devel-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-devel-6.4.0-150600.23.81.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-macros-6.4.0-150600.23.81.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-zfcpdump-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-docs-6.4.0-150600.23.81.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-source-6.4.0-150600.23.81.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP6:kernel-default-extra-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:dlm-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:dtb-allwinner-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-altera-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-amazon-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-amd-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-amlogic-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-apm-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-apple-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-arm-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-broadcom-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-cavium-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-exynos-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-freescale-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-hisilicon-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-lg-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-marvell-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-mediatek-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-nvidia-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-qcom-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-renesas-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-rockchip-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-socionext-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-sprd-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-xilinx-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-64kb-devel-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-64kb-extra-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-64kb-optional-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-debug-vdso-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.aarch64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.x86_64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.81.3.150600.12.36.3.aarch64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.81.3.150600.12.36.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.81.3.150600.12.36.3.x86_64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-vdso-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-devel-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-docs-6.4.0-150600.23.81.1.noarch",
"openSUSE Leap 15.6:kernel-docs-html-6.4.0-150600.23.81.1.noarch",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-vdso-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-macros-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.s390x",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.x86_64",
"openSUSE Leap 15.6:kernel-source-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-source-vanilla-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.ppc64le",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.s390x",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.x86_64",
"openSUSE Leap 15.6:kernel-zfcpdump-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kselftests-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_81-default-1-150600.13.3.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_81-default-1-150600.13.3.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_81-default-1-150600.13.3.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-64kb-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-64kb-devel-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-devel-6.4.0-150600.23.81.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-macros-6.4.0-150600.23.81.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-zfcpdump-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-docs-6.4.0-150600.23.81.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-source-6.4.0-150600.23.81.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP6:kernel-default-extra-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:dlm-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:dtb-allwinner-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-altera-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-amazon-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-amd-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-amlogic-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-apm-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-apple-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-arm-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-broadcom-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-cavium-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-exynos-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-freescale-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-hisilicon-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-lg-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-marvell-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-mediatek-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-nvidia-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-qcom-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-renesas-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-rockchip-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-socionext-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-sprd-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-xilinx-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-64kb-devel-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-64kb-extra-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-64kb-optional-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-debug-vdso-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.aarch64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.x86_64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.81.3.150600.12.36.3.aarch64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.81.3.150600.12.36.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.81.3.150600.12.36.3.x86_64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-vdso-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-devel-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-docs-6.4.0-150600.23.81.1.noarch",
"openSUSE Leap 15.6:kernel-docs-html-6.4.0-150600.23.81.1.noarch",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-vdso-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-macros-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.s390x",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.x86_64",
"openSUSE Leap 15.6:kernel-source-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-source-vanilla-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.ppc64le",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.s390x",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.x86_64",
"openSUSE Leap 15.6:kernel-zfcpdump-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kselftests-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-17T10:52:47Z",
"details": "moderate"
}
],
"title": "CVE-2025-40038"
},
{
"cve": "CVE-2025-40040",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40040"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nmm/ksm: fix flag-dropping behavior in ksm_madvise\n\nsyzkaller discovered the following crash: (kernel BUG)\n\n[ 44.607039] ------------[ cut here ]------------\n[ 44.607422] kernel BUG at mm/userfaultfd.c:2067!\n[ 44.608148] Oops: invalid opcode: 0000 [#1] SMP DEBUG_PAGEALLOC KASAN NOPTI\n[ 44.608814] CPU: 1 UID: 0 PID: 2475 Comm: reproducer Not tainted 6.16.0-rc6 #1 PREEMPT(none)\n[ 44.609635] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.16.3-0-ga6ed6b701f0a-prebuilt.qemu.org 04/01/2014\n[ 44.610695] RIP: 0010:userfaultfd_release_all+0x3a8/0x460\n\n\u003csnip other registers, drop unreliable trace\u003e\n\n[ 44.617726] Call Trace:\n[ 44.617926] \u003cTASK\u003e\n[ 44.619284] userfaultfd_release+0xef/0x1b0\n[ 44.620976] __fput+0x3f9/0xb60\n[ 44.621240] fput_close_sync+0x110/0x210\n[ 44.622222] __x64_sys_close+0x8f/0x120\n[ 44.622530] do_syscall_64+0x5b/0x2f0\n[ 44.622840] entry_SYSCALL_64_after_hwframe+0x76/0x7e\n[ 44.623244] RIP: 0033:0x7f365bb3f227\n\nKernel panics because it detects UFFD inconsistency during\nuserfaultfd_release_all(). Specifically, a VMA which has a valid pointer\nto vma-\u003evm_userfaultfd_ctx, but no UFFD flags in vma-\u003evm_flags.\n\nThe inconsistency is caused in ksm_madvise(): when user calls madvise()\nwith MADV_UNMEARGEABLE on a VMA that is registered for UFFD in MINOR mode,\nit accidentally clears all flags stored in the upper 32 bits of\nvma-\u003evm_flags.\n\nAssuming x86_64 kernel build, unsigned long is 64-bit and unsigned int and\nint are 32-bit wide. This setup causes the following mishap during the \u0026=\n~VM_MERGEABLE assignment.\n\nVM_MERGEABLE is a 32-bit constant of type unsigned int, 0x8000\u00270000. \nAfter ~ is applied, it becomes 0x7fff\u0027ffff unsigned int, which is then\npromoted to unsigned long before the \u0026 operation. This promotion fills\nupper 32 bits with leading 0s, as we\u0027re doing unsigned conversion (and\neven for a signed conversion, this wouldn\u0027t help as the leading bit is 0).\n\u0026 operation thus ends up AND-ing vm_flags with 0x0000\u00270000\u00277fff\u0027ffff\ninstead of intended 0xffff\u0027ffff\u00277fff\u0027ffff and hence accidentally clears\nthe upper 32-bits of its value.\n\nFix it by changing `VM_MERGEABLE` constant to unsigned long, using the\nBIT() macro.\n\nNote: other VM_* flags are not affected: This only happens to the\nVM_MERGEABLE flag, as the other VM_* flags are all constants of type int\nand after ~ operation, they end up with leading 1 and are thus converted\nto unsigned long with leading 1s.\n\nNote 2:\nAfter commit 31defc3b01d9 (\"userfaultfd: remove (VM_)BUG_ON()s\"), this is\nno longer a kernel BUG, but a WARNING at the same place:\n\n[ 45.595973] WARNING: CPU: 1 PID: 2474 at mm/userfaultfd.c:2067\n\nbut the root-cause (flag-drop) remains the same.\n\n[akpm@linux-foundation.org: rust bindgen wasn\u0027t able to handle BIT(), from Miguel]",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_81-default-1-150600.13.3.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_81-default-1-150600.13.3.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_81-default-1-150600.13.3.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-64kb-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-64kb-devel-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-devel-6.4.0-150600.23.81.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-macros-6.4.0-150600.23.81.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-zfcpdump-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-docs-6.4.0-150600.23.81.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-source-6.4.0-150600.23.81.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP6:kernel-default-extra-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:dlm-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:dtb-allwinner-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-altera-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-amazon-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-amd-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-amlogic-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-apm-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-apple-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-arm-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-broadcom-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-cavium-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-exynos-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-freescale-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-hisilicon-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-lg-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-marvell-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-mediatek-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-nvidia-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-qcom-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-renesas-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-rockchip-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-socionext-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-sprd-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-xilinx-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-64kb-devel-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-64kb-extra-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-64kb-optional-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-debug-vdso-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.aarch64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.x86_64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.81.3.150600.12.36.3.aarch64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.81.3.150600.12.36.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.81.3.150600.12.36.3.x86_64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-vdso-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-devel-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-docs-6.4.0-150600.23.81.1.noarch",
"openSUSE Leap 15.6:kernel-docs-html-6.4.0-150600.23.81.1.noarch",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-vdso-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-macros-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.s390x",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.x86_64",
"openSUSE Leap 15.6:kernel-source-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-source-vanilla-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.ppc64le",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.s390x",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.x86_64",
"openSUSE Leap 15.6:kernel-zfcpdump-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kselftests-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40040",
"url": "https://www.suse.com/security/cve/CVE-2025-40040"
},
{
"category": "external",
"summary": "SUSE Bug 1252780 for CVE-2025-40040",
"url": "https://bugzilla.suse.com/1252780"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_81-default-1-150600.13.3.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_81-default-1-150600.13.3.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_81-default-1-150600.13.3.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-64kb-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-64kb-devel-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-devel-6.4.0-150600.23.81.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-macros-6.4.0-150600.23.81.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-zfcpdump-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-docs-6.4.0-150600.23.81.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-source-6.4.0-150600.23.81.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP6:kernel-default-extra-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:dlm-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:dtb-allwinner-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-altera-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-amazon-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-amd-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-amlogic-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-apm-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-apple-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-arm-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-broadcom-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-cavium-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-exynos-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-freescale-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-hisilicon-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-lg-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-marvell-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-mediatek-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-nvidia-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-qcom-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-renesas-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-rockchip-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-socionext-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-sprd-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-xilinx-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-64kb-devel-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-64kb-extra-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-64kb-optional-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-debug-vdso-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.aarch64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.x86_64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.81.3.150600.12.36.3.aarch64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.81.3.150600.12.36.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.81.3.150600.12.36.3.x86_64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-vdso-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-devel-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-docs-6.4.0-150600.23.81.1.noarch",
"openSUSE Leap 15.6:kernel-docs-html-6.4.0-150600.23.81.1.noarch",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-vdso-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-macros-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.s390x",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.x86_64",
"openSUSE Leap 15.6:kernel-source-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-source-vanilla-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.ppc64le",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.s390x",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.x86_64",
"openSUSE Leap 15.6:kernel-zfcpdump-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kselftests-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_81-default-1-150600.13.3.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_81-default-1-150600.13.3.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_81-default-1-150600.13.3.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-64kb-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-64kb-devel-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-devel-6.4.0-150600.23.81.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-macros-6.4.0-150600.23.81.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-zfcpdump-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-docs-6.4.0-150600.23.81.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-source-6.4.0-150600.23.81.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP6:kernel-default-extra-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:dlm-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:dtb-allwinner-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-altera-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-amazon-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-amd-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-amlogic-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-apm-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-apple-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-arm-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-broadcom-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-cavium-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-exynos-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-freescale-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-hisilicon-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-lg-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-marvell-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-mediatek-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-nvidia-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-qcom-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-renesas-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-rockchip-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-socionext-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-sprd-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-xilinx-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-64kb-devel-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-64kb-extra-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-64kb-optional-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-debug-vdso-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.aarch64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.x86_64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.81.3.150600.12.36.3.aarch64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.81.3.150600.12.36.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.81.3.150600.12.36.3.x86_64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-vdso-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-devel-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-docs-6.4.0-150600.23.81.1.noarch",
"openSUSE Leap 15.6:kernel-docs-html-6.4.0-150600.23.81.1.noarch",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-vdso-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-macros-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.s390x",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.x86_64",
"openSUSE Leap 15.6:kernel-source-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-source-vanilla-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.ppc64le",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.s390x",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.x86_64",
"openSUSE Leap 15.6:kernel-zfcpdump-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kselftests-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-17T10:52:47Z",
"details": "moderate"
}
],
"title": "CVE-2025-40040"
},
{
"cve": "CVE-2025-40048",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40048"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nuio_hv_generic: Let userspace take care of interrupt mask\n\nRemove the logic to set interrupt mask by default in uio_hv_generic\ndriver as the interrupt mask value is supposed to be controlled\ncompletely by the user space. If the mask bit gets changed\nby the driver, concurrently with user mode operating on the ring,\nthe mask bit may be set when it is supposed to be clear, and the\nuser-mode driver will miss an interrupt which will cause a hang.\n\nFor eg- when the driver sets inbound ring buffer interrupt mask to 1,\nthe host does not interrupt the guest on the UIO VMBus channel.\nHowever, setting the mask does not prevent the host from putting a\nmessage in the inbound ring buffer. So let\u0027s assume that happens,\nthe host puts a message into the ring buffer but does not interrupt.\n\nSubsequently, the user space code in the guest sets the inbound ring\nbuffer interrupt mask to 0, saying \"Hey, I\u0027m ready for interrupts\".\nUser space code then calls pread() to wait for an interrupt.\nThen one of two things happens:\n\n* The host never sends another message. So the pread() waits forever.\n* The host does send another message. But because there\u0027s already a\n message in the ring buffer, it doesn\u0027t generate an interrupt.\n This is the correct behavior, because the host should only send an\n interrupt when the inbound ring buffer transitions from empty to\n not-empty. Adding an additional message to a ring buffer that is not\n empty is not supposed to generate an interrupt on the guest.\n Since the guest is waiting in pread() and not removing messages from\n the ring buffer, the pread() waits forever.\n\nThis could be easily reproduced in hv_fcopy_uio_daemon if we delay\nsetting interrupt mask to 0.\n\nSimilarly if hv_uio_channel_cb() sets the interrupt_mask to 1,\nthere\u0027s a race condition. Once user space empties the inbound ring\nbuffer, but before user space sets interrupt_mask to 0, the host could\nput another message in the ring buffer but it wouldn\u0027t interrupt.\nThen the next pread() would hang.\n\nFix these by removing all instances where interrupt_mask is changed,\nwhile keeping the one in set_event() unchanged to enable userspace\ncontrol the interrupt mask by writing 0/1 to /dev/uioX.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_81-default-1-150600.13.3.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_81-default-1-150600.13.3.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_81-default-1-150600.13.3.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-64kb-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-64kb-devel-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-devel-6.4.0-150600.23.81.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-macros-6.4.0-150600.23.81.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-zfcpdump-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-docs-6.4.0-150600.23.81.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-source-6.4.0-150600.23.81.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP6:kernel-default-extra-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:dlm-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:dtb-allwinner-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-altera-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-amazon-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-amd-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-amlogic-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-apm-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-apple-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-arm-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-broadcom-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-cavium-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-exynos-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-freescale-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-hisilicon-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-lg-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-marvell-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-mediatek-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-nvidia-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-qcom-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-renesas-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-rockchip-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-socionext-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-sprd-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-xilinx-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-64kb-devel-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-64kb-extra-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-64kb-optional-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-debug-vdso-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.aarch64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.x86_64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.81.3.150600.12.36.3.aarch64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.81.3.150600.12.36.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.81.3.150600.12.36.3.x86_64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-vdso-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-devel-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-docs-6.4.0-150600.23.81.1.noarch",
"openSUSE Leap 15.6:kernel-docs-html-6.4.0-150600.23.81.1.noarch",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-vdso-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-macros-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.s390x",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.x86_64",
"openSUSE Leap 15.6:kernel-source-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-source-vanilla-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.ppc64le",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.s390x",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.x86_64",
"openSUSE Leap 15.6:kernel-zfcpdump-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kselftests-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40048",
"url": "https://www.suse.com/security/cve/CVE-2025-40048"
},
{
"category": "external",
"summary": "SUSE Bug 1252862 for CVE-2025-40048",
"url": "https://bugzilla.suse.com/1252862"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_81-default-1-150600.13.3.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_81-default-1-150600.13.3.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_81-default-1-150600.13.3.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-64kb-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-64kb-devel-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-devel-6.4.0-150600.23.81.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-macros-6.4.0-150600.23.81.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-zfcpdump-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-docs-6.4.0-150600.23.81.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-source-6.4.0-150600.23.81.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP6:kernel-default-extra-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:dlm-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:dtb-allwinner-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-altera-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-amazon-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-amd-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-amlogic-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-apm-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-apple-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-arm-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-broadcom-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-cavium-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-exynos-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-freescale-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-hisilicon-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-lg-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-marvell-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-mediatek-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-nvidia-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-qcom-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-renesas-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-rockchip-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-socionext-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-sprd-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-xilinx-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-64kb-devel-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-64kb-extra-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-64kb-optional-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-debug-vdso-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.aarch64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.x86_64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.81.3.150600.12.36.3.aarch64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.81.3.150600.12.36.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.81.3.150600.12.36.3.x86_64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-vdso-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-devel-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-docs-6.4.0-150600.23.81.1.noarch",
"openSUSE Leap 15.6:kernel-docs-html-6.4.0-150600.23.81.1.noarch",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-vdso-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-macros-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.s390x",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.x86_64",
"openSUSE Leap 15.6:kernel-source-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-source-vanilla-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.ppc64le",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.s390x",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.x86_64",
"openSUSE Leap 15.6:kernel-zfcpdump-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kselftests-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_81-default-1-150600.13.3.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_81-default-1-150600.13.3.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_81-default-1-150600.13.3.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-64kb-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-64kb-devel-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-devel-6.4.0-150600.23.81.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-macros-6.4.0-150600.23.81.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-zfcpdump-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-docs-6.4.0-150600.23.81.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-source-6.4.0-150600.23.81.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP6:kernel-default-extra-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:dlm-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:dtb-allwinner-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-altera-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-amazon-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-amd-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-amlogic-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-apm-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-apple-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-arm-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-broadcom-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-cavium-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-exynos-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-freescale-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-hisilicon-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-lg-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-marvell-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-mediatek-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-nvidia-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-qcom-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-renesas-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-rockchip-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-socionext-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-sprd-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-xilinx-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-64kb-devel-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-64kb-extra-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-64kb-optional-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-debug-vdso-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.aarch64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.x86_64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.81.3.150600.12.36.3.aarch64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.81.3.150600.12.36.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.81.3.150600.12.36.3.x86_64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-vdso-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-devel-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-docs-6.4.0-150600.23.81.1.noarch",
"openSUSE Leap 15.6:kernel-docs-html-6.4.0-150600.23.81.1.noarch",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-vdso-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-macros-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.s390x",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.x86_64",
"openSUSE Leap 15.6:kernel-source-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-source-vanilla-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.ppc64le",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.s390x",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.x86_64",
"openSUSE Leap 15.6:kernel-zfcpdump-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kselftests-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-17T10:52:47Z",
"details": "moderate"
}
],
"title": "CVE-2025-40048"
},
{
"cve": "CVE-2025-40055",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40055"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nocfs2: fix double free in user_cluster_connect()\n\nuser_cluster_disconnect() frees \"conn-\u003ecc_private\" which is \"lc\" but then\nthe error handling frees \"lc\" a second time. Set \"lc\" to NULL on this\npath to avoid a double free.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_81-default-1-150600.13.3.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_81-default-1-150600.13.3.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_81-default-1-150600.13.3.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-64kb-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-64kb-devel-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-devel-6.4.0-150600.23.81.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-macros-6.4.0-150600.23.81.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-zfcpdump-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-docs-6.4.0-150600.23.81.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-source-6.4.0-150600.23.81.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP6:kernel-default-extra-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:dlm-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:dtb-allwinner-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-altera-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-amazon-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-amd-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-amlogic-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-apm-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-apple-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-arm-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-broadcom-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-cavium-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-exynos-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-freescale-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-hisilicon-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-lg-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-marvell-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-mediatek-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-nvidia-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-qcom-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-renesas-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-rockchip-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-socionext-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-sprd-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-xilinx-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-64kb-devel-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-64kb-extra-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-64kb-optional-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-debug-vdso-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.aarch64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.x86_64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.81.3.150600.12.36.3.aarch64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.81.3.150600.12.36.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.81.3.150600.12.36.3.x86_64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-vdso-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-devel-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-docs-6.4.0-150600.23.81.1.noarch",
"openSUSE Leap 15.6:kernel-docs-html-6.4.0-150600.23.81.1.noarch",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-vdso-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-macros-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.s390x",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.x86_64",
"openSUSE Leap 15.6:kernel-source-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-source-vanilla-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.ppc64le",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.s390x",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.x86_64",
"openSUSE Leap 15.6:kernel-zfcpdump-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kselftests-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40055",
"url": "https://www.suse.com/security/cve/CVE-2025-40055"
},
{
"category": "external",
"summary": "SUSE Bug 1252821 for CVE-2025-40055",
"url": "https://bugzilla.suse.com/1252821"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_81-default-1-150600.13.3.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_81-default-1-150600.13.3.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_81-default-1-150600.13.3.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-64kb-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-64kb-devel-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-devel-6.4.0-150600.23.81.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-macros-6.4.0-150600.23.81.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-zfcpdump-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-docs-6.4.0-150600.23.81.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-source-6.4.0-150600.23.81.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP6:kernel-default-extra-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:dlm-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:dtb-allwinner-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-altera-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-amazon-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-amd-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-amlogic-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-apm-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-apple-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-arm-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-broadcom-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-cavium-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-exynos-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-freescale-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-hisilicon-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-lg-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-marvell-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-mediatek-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-nvidia-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-qcom-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-renesas-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-rockchip-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-socionext-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-sprd-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-xilinx-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-64kb-devel-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-64kb-extra-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-64kb-optional-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-debug-vdso-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.aarch64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.x86_64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.81.3.150600.12.36.3.aarch64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.81.3.150600.12.36.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.81.3.150600.12.36.3.x86_64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-vdso-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-devel-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-docs-6.4.0-150600.23.81.1.noarch",
"openSUSE Leap 15.6:kernel-docs-html-6.4.0-150600.23.81.1.noarch",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-vdso-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-macros-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.s390x",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.x86_64",
"openSUSE Leap 15.6:kernel-source-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-source-vanilla-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.ppc64le",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.s390x",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.x86_64",
"openSUSE Leap 15.6:kernel-zfcpdump-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kselftests-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_81-default-1-150600.13.3.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_81-default-1-150600.13.3.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_81-default-1-150600.13.3.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-64kb-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-64kb-devel-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-devel-6.4.0-150600.23.81.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-macros-6.4.0-150600.23.81.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-zfcpdump-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-docs-6.4.0-150600.23.81.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-source-6.4.0-150600.23.81.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP6:kernel-default-extra-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:dlm-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:dtb-allwinner-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-altera-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-amazon-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-amd-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-amlogic-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-apm-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-apple-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-arm-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-broadcom-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-cavium-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-exynos-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-freescale-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-hisilicon-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-lg-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-marvell-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-mediatek-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-nvidia-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-qcom-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-renesas-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-rockchip-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-socionext-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-sprd-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-xilinx-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-64kb-devel-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-64kb-extra-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-64kb-optional-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-debug-vdso-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.aarch64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.x86_64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.81.3.150600.12.36.3.aarch64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.81.3.150600.12.36.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.81.3.150600.12.36.3.x86_64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-vdso-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-devel-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-docs-6.4.0-150600.23.81.1.noarch",
"openSUSE Leap 15.6:kernel-docs-html-6.4.0-150600.23.81.1.noarch",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-vdso-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-macros-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.s390x",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.x86_64",
"openSUSE Leap 15.6:kernel-source-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-source-vanilla-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.ppc64le",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.s390x",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.x86_64",
"openSUSE Leap 15.6:kernel-zfcpdump-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kselftests-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-17T10:52:47Z",
"details": "moderate"
}
],
"title": "CVE-2025-40055"
},
{
"cve": "CVE-2025-40059",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40059"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\ncoresight: Fix incorrect handling for return value of devm_kzalloc\n\nThe return value of devm_kzalloc could be an null pointer,\nuse \"!desc.pdata\" to fix incorrect handling return value\nof devm_kzalloc.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_81-default-1-150600.13.3.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_81-default-1-150600.13.3.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_81-default-1-150600.13.3.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-64kb-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-64kb-devel-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-devel-6.4.0-150600.23.81.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-macros-6.4.0-150600.23.81.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-zfcpdump-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-docs-6.4.0-150600.23.81.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-source-6.4.0-150600.23.81.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP6:kernel-default-extra-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:dlm-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:dtb-allwinner-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-altera-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-amazon-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-amd-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-amlogic-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-apm-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-apple-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-arm-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-broadcom-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-cavium-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-exynos-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-freescale-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-hisilicon-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-lg-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-marvell-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-mediatek-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-nvidia-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-qcom-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-renesas-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-rockchip-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-socionext-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-sprd-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-xilinx-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-64kb-devel-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-64kb-extra-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-64kb-optional-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-debug-vdso-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.aarch64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.x86_64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.81.3.150600.12.36.3.aarch64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.81.3.150600.12.36.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.81.3.150600.12.36.3.x86_64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-vdso-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-devel-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-docs-6.4.0-150600.23.81.1.noarch",
"openSUSE Leap 15.6:kernel-docs-html-6.4.0-150600.23.81.1.noarch",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-vdso-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-macros-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.s390x",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.x86_64",
"openSUSE Leap 15.6:kernel-source-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-source-vanilla-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.ppc64le",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.s390x",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.x86_64",
"openSUSE Leap 15.6:kernel-zfcpdump-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kselftests-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40059",
"url": "https://www.suse.com/security/cve/CVE-2025-40059"
},
{
"category": "external",
"summary": "SUSE Bug 1252809 for CVE-2025-40059",
"url": "https://bugzilla.suse.com/1252809"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_81-default-1-150600.13.3.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_81-default-1-150600.13.3.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_81-default-1-150600.13.3.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-64kb-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-64kb-devel-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-devel-6.4.0-150600.23.81.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-macros-6.4.0-150600.23.81.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-zfcpdump-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-docs-6.4.0-150600.23.81.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-source-6.4.0-150600.23.81.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP6:kernel-default-extra-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:dlm-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:dtb-allwinner-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-altera-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-amazon-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-amd-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-amlogic-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-apm-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-apple-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-arm-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-broadcom-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-cavium-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-exynos-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-freescale-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-hisilicon-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-lg-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-marvell-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-mediatek-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-nvidia-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-qcom-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-renesas-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-rockchip-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-socionext-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-sprd-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-xilinx-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-64kb-devel-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-64kb-extra-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-64kb-optional-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-debug-vdso-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.aarch64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.x86_64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.81.3.150600.12.36.3.aarch64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.81.3.150600.12.36.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.81.3.150600.12.36.3.x86_64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-vdso-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-devel-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-docs-6.4.0-150600.23.81.1.noarch",
"openSUSE Leap 15.6:kernel-docs-html-6.4.0-150600.23.81.1.noarch",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-vdso-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-macros-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.s390x",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.x86_64",
"openSUSE Leap 15.6:kernel-source-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-source-vanilla-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.ppc64le",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.s390x",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.x86_64",
"openSUSE Leap 15.6:kernel-zfcpdump-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kselftests-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_81-default-1-150600.13.3.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_81-default-1-150600.13.3.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_81-default-1-150600.13.3.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-64kb-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-64kb-devel-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-devel-6.4.0-150600.23.81.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-macros-6.4.0-150600.23.81.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-zfcpdump-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-docs-6.4.0-150600.23.81.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-source-6.4.0-150600.23.81.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP6:kernel-default-extra-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:dlm-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:dtb-allwinner-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-altera-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-amazon-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-amd-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-amlogic-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-apm-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-apple-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-arm-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-broadcom-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-cavium-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-exynos-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-freescale-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-hisilicon-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-lg-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-marvell-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-mediatek-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-nvidia-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-qcom-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-renesas-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-rockchip-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-socionext-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-sprd-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-xilinx-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-64kb-devel-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-64kb-extra-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-64kb-optional-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-debug-vdso-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.aarch64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.x86_64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.81.3.150600.12.36.3.aarch64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.81.3.150600.12.36.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.81.3.150600.12.36.3.x86_64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-vdso-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-devel-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-docs-6.4.0-150600.23.81.1.noarch",
"openSUSE Leap 15.6:kernel-docs-html-6.4.0-150600.23.81.1.noarch",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-vdso-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-macros-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.s390x",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.x86_64",
"openSUSE Leap 15.6:kernel-source-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-source-vanilla-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.ppc64le",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.s390x",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.x86_64",
"openSUSE Leap 15.6:kernel-zfcpdump-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kselftests-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-17T10:52:47Z",
"details": "moderate"
}
],
"title": "CVE-2025-40059"
},
{
"cve": "CVE-2025-40064",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40064"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nsmc: Fix use-after-free in __pnet_find_base_ndev().\n\nsyzbot reported use-after-free of net_device in __pnet_find_base_ndev(),\nwhich was called during connect(). [0]\n\nsmc_pnet_find_ism_resource() fetches sk_dst_get(sk)-\u003edev and passes\ndown to pnet_find_base_ndev(), where RTNL is held. Then, UAF happened\nat __pnet_find_base_ndev() when the dev is first used.\n\nThis means dev had already been freed before acquiring RTNL in\npnet_find_base_ndev().\n\nWhile dev is going away, dst-\u003edev could be swapped with blackhole_netdev,\nand the dev\u0027s refcnt by dst will be released.\n\nWe must hold dev\u0027s refcnt before calling smc_pnet_find_ism_resource().\n\nAlso, smc_pnet_find_roce_resource() has the same problem.\n\nLet\u0027s use __sk_dst_get() and dst_dev_rcu() in the two functions.\n\n[0]:\nBUG: KASAN: use-after-free in __pnet_find_base_ndev+0x1b1/0x1c0 net/smc/smc_pnet.c:926\nRead of size 1 at addr ffff888036bac33a by task syz.0.3632/18609\n\nCPU: 1 UID: 0 PID: 18609 Comm: syz.0.3632 Not tainted syzkaller #0 PREEMPT(full)\nHardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/18/2025\nCall Trace:\n \u003cTASK\u003e\n dump_stack_lvl+0x189/0x250 lib/dump_stack.c:120\n print_address_description mm/kasan/report.c:378 [inline]\n print_report+0xca/0x240 mm/kasan/report.c:482\n kasan_report+0x118/0x150 mm/kasan/report.c:595\n __pnet_find_base_ndev+0x1b1/0x1c0 net/smc/smc_pnet.c:926\n pnet_find_base_ndev net/smc/smc_pnet.c:946 [inline]\n smc_pnet_find_ism_by_pnetid net/smc/smc_pnet.c:1103 [inline]\n smc_pnet_find_ism_resource+0xef/0x390 net/smc/smc_pnet.c:1154\n smc_find_ism_device net/smc/af_smc.c:1030 [inline]\n smc_find_proposal_devices net/smc/af_smc.c:1115 [inline]\n __smc_connect+0x372/0x1890 net/smc/af_smc.c:1545\n smc_connect+0x877/0xd90 net/smc/af_smc.c:1715\n __sys_connect_file net/socket.c:2086 [inline]\n __sys_connect+0x313/0x440 net/socket.c:2105\n __do_sys_connect net/socket.c:2111 [inline]\n __se_sys_connect net/socket.c:2108 [inline]\n __x64_sys_connect+0x7a/0x90 net/socket.c:2108\n do_syscall_x64 arch/x86/entry/syscall_64.c:63 [inline]\n do_syscall_64+0xfa/0x3b0 arch/x86/entry/syscall_64.c:94\n entry_SYSCALL_64_after_hwframe+0x77/0x7f\nRIP: 0033:0x7f47cbf8eba9\nCode: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 \u003c48\u003e 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48\nRSP: 002b:00007f47ccdb1038 EFLAGS: 00000246 ORIG_RAX: 000000000000002a\nRAX: ffffffffffffffda RBX: 00007f47cc1d5fa0 RCX: 00007f47cbf8eba9\nRDX: 0000000000000010 RSI: 0000200000000280 RDI: 000000000000000b\nRBP: 00007f47cc011e19 R08: 0000000000000000 R09: 0000000000000000\nR10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000\nR13: 00007f47cc1d6038 R14: 00007f47cc1d5fa0 R15: 00007ffc512f8aa8\n \u003c/TASK\u003e\n\nThe buggy address belongs to the physical page:\npage: refcount:0 mapcount:0 mapping:0000000000000000 index:0xffff888036bacd00 pfn:0x36bac\nflags: 0xfff00000000000(node=0|zone=1|lastcpupid=0x7ff)\nraw: 00fff00000000000 ffffea0001243d08 ffff8880b863fdc0 0000000000000000\nraw: ffff888036bacd00 0000000000000000 00000000ffffffff 0000000000000000\npage dumped because: kasan: bad access detected\npage_owner tracks the page as freed\npage last allocated via order 2, migratetype Unmovable, gfp_mask 0x446dc0(GFP_KERNEL_ACCOUNT|__GFP_ZERO|__GFP_NOWARN|__GFP_RETRY_MAYFAIL|__GFP_COMP), pid 16741, tgid 16741 (syz-executor), ts 343313197788, free_ts 380670750466\n set_page_owner include/linux/page_owner.h:32 [inline]\n post_alloc_hook+0x240/0x2a0 mm/page_alloc.c:1851\n prep_new_page mm/page_alloc.c:1859 [inline]\n get_page_from_freelist+0x21e4/0x22c0 mm/page_alloc.c:3858\n __alloc_frozen_pages_noprof+0x181/0x370 mm/page_alloc.c:5148\n alloc_pages_mpol+0x232/0x4a0 mm/mempolicy.c:2416\n ___kmalloc_large_node+0x5f/0x1b0 mm/slub.c:4317\n __kmalloc_large_node_noprof+0x18/0x90 mm/slub.c:4348\n __do_kmalloc_node mm/slub.c:4364 [inline]\n __kvmalloc_node\n---truncated---",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_81-default-1-150600.13.3.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_81-default-1-150600.13.3.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_81-default-1-150600.13.3.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-64kb-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-64kb-devel-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-devel-6.4.0-150600.23.81.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-macros-6.4.0-150600.23.81.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-zfcpdump-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-docs-6.4.0-150600.23.81.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-source-6.4.0-150600.23.81.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP6:kernel-default-extra-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:dlm-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:dtb-allwinner-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-altera-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-amazon-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-amd-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-amlogic-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-apm-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-apple-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-arm-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-broadcom-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-cavium-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-exynos-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-freescale-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-hisilicon-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-lg-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-marvell-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-mediatek-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-nvidia-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-qcom-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-renesas-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-rockchip-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-socionext-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-sprd-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-xilinx-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-64kb-devel-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-64kb-extra-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-64kb-optional-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-debug-vdso-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.aarch64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.x86_64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.81.3.150600.12.36.3.aarch64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.81.3.150600.12.36.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.81.3.150600.12.36.3.x86_64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-vdso-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-devel-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-docs-6.4.0-150600.23.81.1.noarch",
"openSUSE Leap 15.6:kernel-docs-html-6.4.0-150600.23.81.1.noarch",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-vdso-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-macros-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.s390x",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.x86_64",
"openSUSE Leap 15.6:kernel-source-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-source-vanilla-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.ppc64le",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.s390x",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.x86_64",
"openSUSE Leap 15.6:kernel-zfcpdump-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kselftests-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40064",
"url": "https://www.suse.com/security/cve/CVE-2025-40064"
},
{
"category": "external",
"summary": "SUSE Bug 1252845 for CVE-2025-40064",
"url": "https://bugzilla.suse.com/1252845"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_81-default-1-150600.13.3.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_81-default-1-150600.13.3.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_81-default-1-150600.13.3.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-64kb-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-64kb-devel-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-devel-6.4.0-150600.23.81.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-macros-6.4.0-150600.23.81.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-zfcpdump-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-docs-6.4.0-150600.23.81.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-source-6.4.0-150600.23.81.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP6:kernel-default-extra-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:dlm-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:dtb-allwinner-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-altera-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-amazon-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-amd-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-amlogic-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-apm-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-apple-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-arm-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-broadcom-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-cavium-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-exynos-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-freescale-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-hisilicon-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-lg-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-marvell-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-mediatek-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-nvidia-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-qcom-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-renesas-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-rockchip-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-socionext-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-sprd-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-xilinx-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-64kb-devel-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-64kb-extra-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-64kb-optional-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-debug-vdso-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.aarch64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.x86_64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.81.3.150600.12.36.3.aarch64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.81.3.150600.12.36.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.81.3.150600.12.36.3.x86_64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-vdso-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-devel-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-docs-6.4.0-150600.23.81.1.noarch",
"openSUSE Leap 15.6:kernel-docs-html-6.4.0-150600.23.81.1.noarch",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-vdso-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-macros-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.s390x",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.x86_64",
"openSUSE Leap 15.6:kernel-source-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-source-vanilla-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.ppc64le",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.s390x",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.x86_64",
"openSUSE Leap 15.6:kernel-zfcpdump-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kselftests-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_81-default-1-150600.13.3.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_81-default-1-150600.13.3.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_81-default-1-150600.13.3.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-64kb-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-64kb-devel-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-devel-6.4.0-150600.23.81.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-macros-6.4.0-150600.23.81.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-zfcpdump-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-docs-6.4.0-150600.23.81.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-source-6.4.0-150600.23.81.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP6:kernel-default-extra-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:dlm-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:dtb-allwinner-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-altera-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-amazon-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-amd-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-amlogic-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-apm-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-apple-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-arm-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-broadcom-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-cavium-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-exynos-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-freescale-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-hisilicon-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-lg-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-marvell-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-mediatek-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-nvidia-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-qcom-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-renesas-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-rockchip-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-socionext-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-sprd-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-xilinx-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-64kb-devel-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-64kb-extra-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-64kb-optional-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-debug-vdso-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.aarch64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.x86_64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.81.3.150600.12.36.3.aarch64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.81.3.150600.12.36.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.81.3.150600.12.36.3.x86_64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-vdso-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-devel-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-docs-6.4.0-150600.23.81.1.noarch",
"openSUSE Leap 15.6:kernel-docs-html-6.4.0-150600.23.81.1.noarch",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-vdso-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-macros-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.s390x",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.x86_64",
"openSUSE Leap 15.6:kernel-source-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-source-vanilla-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.ppc64le",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.s390x",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.x86_64",
"openSUSE Leap 15.6:kernel-zfcpdump-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kselftests-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-17T10:52:47Z",
"details": "moderate"
}
],
"title": "CVE-2025-40064"
},
{
"cve": "CVE-2025-40070",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40070"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\npps: fix warning in pps_register_cdev when register device fail\n\nSimilar to previous commit 2a934fdb01db (\"media: v4l2-dev: fix error\nhandling in __video_register_device()\"), the release hook should be set\nbefore device_register(). Otherwise, when device_register() return error\nand put_device() try to callback the release function, the below warning\nmay happen.\n\n ------------[ cut here ]------------\n WARNING: CPU: 1 PID: 4760 at drivers/base/core.c:2567 device_release+0x1bd/0x240 drivers/base/core.c:2567\n Modules linked in:\n CPU: 1 UID: 0 PID: 4760 Comm: syz.4.914 Not tainted 6.17.0-rc3+ #1 NONE\n RIP: 0010:device_release+0x1bd/0x240 drivers/base/core.c:2567\n Call Trace:\n \u003cTASK\u003e\n kobject_cleanup+0x136/0x410 lib/kobject.c:689\n kobject_release lib/kobject.c:720 [inline]\n kref_put include/linux/kref.h:65 [inline]\n kobject_put+0xe9/0x130 lib/kobject.c:737\n put_device+0x24/0x30 drivers/base/core.c:3797\n pps_register_cdev+0x2da/0x370 drivers/pps/pps.c:402\n pps_register_source+0x2f6/0x480 drivers/pps/kapi.c:108\n pps_tty_open+0x190/0x310 drivers/pps/clients/pps-ldisc.c:57\n tty_ldisc_open+0xa7/0x120 drivers/tty/tty_ldisc.c:432\n tty_set_ldisc+0x333/0x780 drivers/tty/tty_ldisc.c:563\n tiocsetd drivers/tty/tty_io.c:2429 [inline]\n tty_ioctl+0x5d1/0x1700 drivers/tty/tty_io.c:2728\n vfs_ioctl fs/ioctl.c:51 [inline]\n __do_sys_ioctl fs/ioctl.c:598 [inline]\n __se_sys_ioctl fs/ioctl.c:584 [inline]\n __x64_sys_ioctl+0x194/0x210 fs/ioctl.c:584\n do_syscall_x64 arch/x86/entry/syscall_64.c:63 [inline]\n do_syscall_64+0x5f/0x2a0 arch/x86/entry/syscall_64.c:94\n entry_SYSCALL_64_after_hwframe+0x76/0x7e\n \u003c/TASK\u003e\n\nBefore commit c79a39dc8d06 (\"pps: Fix a use-after-free\"),\npps_register_cdev() call device_create() to create pps-\u003edev, which will\ninit dev-\u003erelease to device_create_release(). Now the comment is outdated,\njust remove it.\n\nThanks for the reminder from Calvin Owens, \u0027kfree_pps\u0027 should be removed\nin pps_register_source() to avoid a double free in the failure case.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_81-default-1-150600.13.3.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_81-default-1-150600.13.3.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_81-default-1-150600.13.3.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-64kb-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-64kb-devel-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-devel-6.4.0-150600.23.81.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-macros-6.4.0-150600.23.81.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-zfcpdump-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-docs-6.4.0-150600.23.81.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-source-6.4.0-150600.23.81.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP6:kernel-default-extra-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:dlm-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:dtb-allwinner-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-altera-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-amazon-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-amd-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-amlogic-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-apm-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-apple-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-arm-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-broadcom-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-cavium-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-exynos-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-freescale-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-hisilicon-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-lg-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-marvell-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-mediatek-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-nvidia-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-qcom-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-renesas-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-rockchip-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-socionext-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-sprd-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-xilinx-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-64kb-devel-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-64kb-extra-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-64kb-optional-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-debug-vdso-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.aarch64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.x86_64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.81.3.150600.12.36.3.aarch64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.81.3.150600.12.36.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.81.3.150600.12.36.3.x86_64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-vdso-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-devel-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-docs-6.4.0-150600.23.81.1.noarch",
"openSUSE Leap 15.6:kernel-docs-html-6.4.0-150600.23.81.1.noarch",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-vdso-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-macros-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.s390x",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.x86_64",
"openSUSE Leap 15.6:kernel-source-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-source-vanilla-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.ppc64le",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.s390x",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.x86_64",
"openSUSE Leap 15.6:kernel-zfcpdump-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kselftests-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40070",
"url": "https://www.suse.com/security/cve/CVE-2025-40070"
},
{
"category": "external",
"summary": "SUSE Bug 1252836 for CVE-2025-40070",
"url": "https://bugzilla.suse.com/1252836"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_81-default-1-150600.13.3.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_81-default-1-150600.13.3.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_81-default-1-150600.13.3.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-64kb-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-64kb-devel-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-devel-6.4.0-150600.23.81.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-macros-6.4.0-150600.23.81.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-zfcpdump-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-docs-6.4.0-150600.23.81.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-source-6.4.0-150600.23.81.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP6:kernel-default-extra-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:dlm-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:dtb-allwinner-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-altera-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-amazon-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-amd-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-amlogic-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-apm-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-apple-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-arm-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-broadcom-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-cavium-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-exynos-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-freescale-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-hisilicon-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-lg-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-marvell-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-mediatek-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-nvidia-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-qcom-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-renesas-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-rockchip-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-socionext-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-sprd-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-xilinx-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-64kb-devel-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-64kb-extra-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-64kb-optional-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-debug-vdso-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.aarch64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.x86_64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.81.3.150600.12.36.3.aarch64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.81.3.150600.12.36.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.81.3.150600.12.36.3.x86_64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-vdso-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-devel-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-docs-6.4.0-150600.23.81.1.noarch",
"openSUSE Leap 15.6:kernel-docs-html-6.4.0-150600.23.81.1.noarch",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-vdso-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-macros-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.s390x",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.x86_64",
"openSUSE Leap 15.6:kernel-source-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-source-vanilla-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.ppc64le",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.s390x",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.x86_64",
"openSUSE Leap 15.6:kernel-zfcpdump-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kselftests-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_81-default-1-150600.13.3.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_81-default-1-150600.13.3.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_81-default-1-150600.13.3.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-64kb-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-64kb-devel-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-devel-6.4.0-150600.23.81.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-macros-6.4.0-150600.23.81.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-zfcpdump-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-docs-6.4.0-150600.23.81.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-source-6.4.0-150600.23.81.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP6:kernel-default-extra-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:dlm-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:dtb-allwinner-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-altera-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-amazon-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-amd-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-amlogic-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-apm-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-apple-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-arm-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-broadcom-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-cavium-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-exynos-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-freescale-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-hisilicon-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-lg-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-marvell-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-mediatek-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-nvidia-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-qcom-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-renesas-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-rockchip-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-socionext-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-sprd-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-xilinx-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-64kb-devel-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-64kb-extra-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-64kb-optional-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-debug-vdso-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.aarch64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.x86_64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.81.3.150600.12.36.3.aarch64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.81.3.150600.12.36.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.81.3.150600.12.36.3.x86_64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-vdso-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-devel-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-docs-6.4.0-150600.23.81.1.noarch",
"openSUSE Leap 15.6:kernel-docs-html-6.4.0-150600.23.81.1.noarch",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-vdso-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-macros-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.s390x",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.x86_64",
"openSUSE Leap 15.6:kernel-source-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-source-vanilla-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.ppc64le",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.s390x",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.x86_64",
"openSUSE Leap 15.6:kernel-zfcpdump-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kselftests-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-17T10:52:47Z",
"details": "moderate"
}
],
"title": "CVE-2025-40070"
},
{
"cve": "CVE-2025-40074",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40074"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nipv4: start using dst_dev_rcu()\n\nChange icmpv4_xrlim_allow(), ip_defrag() to prevent possible UAF.\n\nChange ipmr_prepare_xmit(), ipmr_queue_fwd_xmit(), ip_mr_output(),\nipv4_neigh_lookup() to use lockdep enabled dst_dev_rcu().",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_81-default-1-150600.13.3.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_81-default-1-150600.13.3.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_81-default-1-150600.13.3.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-64kb-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-64kb-devel-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-devel-6.4.0-150600.23.81.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-macros-6.4.0-150600.23.81.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-zfcpdump-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-docs-6.4.0-150600.23.81.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-source-6.4.0-150600.23.81.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP6:kernel-default-extra-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:dlm-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:dtb-allwinner-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-altera-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-amazon-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-amd-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-amlogic-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-apm-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-apple-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-arm-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-broadcom-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-cavium-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-exynos-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-freescale-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-hisilicon-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-lg-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-marvell-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-mediatek-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-nvidia-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-qcom-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-renesas-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-rockchip-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-socionext-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-sprd-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-xilinx-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-64kb-devel-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-64kb-extra-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-64kb-optional-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-debug-vdso-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.aarch64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.x86_64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.81.3.150600.12.36.3.aarch64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.81.3.150600.12.36.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.81.3.150600.12.36.3.x86_64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-vdso-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-devel-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-docs-6.4.0-150600.23.81.1.noarch",
"openSUSE Leap 15.6:kernel-docs-html-6.4.0-150600.23.81.1.noarch",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-vdso-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-macros-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.s390x",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.x86_64",
"openSUSE Leap 15.6:kernel-source-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-source-vanilla-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.ppc64le",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.s390x",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.x86_64",
"openSUSE Leap 15.6:kernel-zfcpdump-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kselftests-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40074",
"url": "https://www.suse.com/security/cve/CVE-2025-40074"
},
{
"category": "external",
"summary": "SUSE Bug 1252794 for CVE-2025-40074",
"url": "https://bugzilla.suse.com/1252794"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_81-default-1-150600.13.3.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_81-default-1-150600.13.3.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_81-default-1-150600.13.3.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-64kb-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-64kb-devel-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-devel-6.4.0-150600.23.81.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-macros-6.4.0-150600.23.81.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-zfcpdump-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-docs-6.4.0-150600.23.81.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-source-6.4.0-150600.23.81.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP6:kernel-default-extra-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:dlm-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:dtb-allwinner-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-altera-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-amazon-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-amd-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-amlogic-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-apm-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-apple-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-arm-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-broadcom-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-cavium-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-exynos-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-freescale-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-hisilicon-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-lg-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-marvell-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-mediatek-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-nvidia-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-qcom-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-renesas-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-rockchip-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-socionext-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-sprd-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-xilinx-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-64kb-devel-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-64kb-extra-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-64kb-optional-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-debug-vdso-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.aarch64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.x86_64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.81.3.150600.12.36.3.aarch64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.81.3.150600.12.36.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.81.3.150600.12.36.3.x86_64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-vdso-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-devel-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-docs-6.4.0-150600.23.81.1.noarch",
"openSUSE Leap 15.6:kernel-docs-html-6.4.0-150600.23.81.1.noarch",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-vdso-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-macros-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.s390x",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.x86_64",
"openSUSE Leap 15.6:kernel-source-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-source-vanilla-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.ppc64le",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.s390x",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.x86_64",
"openSUSE Leap 15.6:kernel-zfcpdump-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kselftests-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_81-default-1-150600.13.3.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_81-default-1-150600.13.3.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_81-default-1-150600.13.3.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-64kb-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-64kb-devel-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-devel-6.4.0-150600.23.81.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-macros-6.4.0-150600.23.81.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-zfcpdump-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-docs-6.4.0-150600.23.81.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-source-6.4.0-150600.23.81.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP6:kernel-default-extra-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:dlm-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:dtb-allwinner-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-altera-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-amazon-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-amd-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-amlogic-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-apm-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-apple-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-arm-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-broadcom-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-cavium-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-exynos-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-freescale-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-hisilicon-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-lg-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-marvell-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-mediatek-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-nvidia-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-qcom-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-renesas-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-rockchip-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-socionext-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-sprd-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-xilinx-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-64kb-devel-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-64kb-extra-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-64kb-optional-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-debug-vdso-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.aarch64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.x86_64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.81.3.150600.12.36.3.aarch64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.81.3.150600.12.36.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.81.3.150600.12.36.3.x86_64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-vdso-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-devel-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-docs-6.4.0-150600.23.81.1.noarch",
"openSUSE Leap 15.6:kernel-docs-html-6.4.0-150600.23.81.1.noarch",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-vdso-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-macros-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.s390x",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.x86_64",
"openSUSE Leap 15.6:kernel-source-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-source-vanilla-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.ppc64le",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.s390x",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.x86_64",
"openSUSE Leap 15.6:kernel-zfcpdump-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kselftests-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-17T10:52:47Z",
"details": "moderate"
}
],
"title": "CVE-2025-40074"
},
{
"cve": "CVE-2025-40075",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40075"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\ntcp_metrics: use dst_dev_net_rcu()\n\nReplace three dst_dev() with a lockdep enabled helper.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_81-default-1-150600.13.3.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_81-default-1-150600.13.3.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_81-default-1-150600.13.3.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-64kb-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-64kb-devel-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-devel-6.4.0-150600.23.81.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-macros-6.4.0-150600.23.81.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-zfcpdump-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-docs-6.4.0-150600.23.81.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-source-6.4.0-150600.23.81.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP6:kernel-default-extra-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:dlm-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:dtb-allwinner-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-altera-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-amazon-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-amd-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-amlogic-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-apm-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-apple-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-arm-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-broadcom-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-cavium-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-exynos-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-freescale-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-hisilicon-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-lg-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-marvell-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-mediatek-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-nvidia-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-qcom-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-renesas-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-rockchip-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-socionext-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-sprd-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-xilinx-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-64kb-devel-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-64kb-extra-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-64kb-optional-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-debug-vdso-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.aarch64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.x86_64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.81.3.150600.12.36.3.aarch64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.81.3.150600.12.36.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.81.3.150600.12.36.3.x86_64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-vdso-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-devel-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-docs-6.4.0-150600.23.81.1.noarch",
"openSUSE Leap 15.6:kernel-docs-html-6.4.0-150600.23.81.1.noarch",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-vdso-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-macros-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.s390x",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.x86_64",
"openSUSE Leap 15.6:kernel-source-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-source-vanilla-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.ppc64le",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.s390x",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.x86_64",
"openSUSE Leap 15.6:kernel-zfcpdump-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kselftests-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40075",
"url": "https://www.suse.com/security/cve/CVE-2025-40075"
},
{
"category": "external",
"summary": "SUSE Bug 1252795 for CVE-2025-40075",
"url": "https://bugzilla.suse.com/1252795"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_81-default-1-150600.13.3.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_81-default-1-150600.13.3.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_81-default-1-150600.13.3.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-64kb-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-64kb-devel-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-devel-6.4.0-150600.23.81.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-macros-6.4.0-150600.23.81.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-zfcpdump-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-docs-6.4.0-150600.23.81.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-source-6.4.0-150600.23.81.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP6:kernel-default-extra-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:dlm-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:dtb-allwinner-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-altera-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-amazon-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-amd-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-amlogic-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-apm-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-apple-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-arm-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-broadcom-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-cavium-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-exynos-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-freescale-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-hisilicon-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-lg-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-marvell-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-mediatek-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-nvidia-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-qcom-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-renesas-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-rockchip-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-socionext-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-sprd-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-xilinx-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-64kb-devel-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-64kb-extra-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-64kb-optional-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-debug-vdso-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.aarch64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.x86_64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.81.3.150600.12.36.3.aarch64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.81.3.150600.12.36.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.81.3.150600.12.36.3.x86_64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-vdso-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-devel-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-docs-6.4.0-150600.23.81.1.noarch",
"openSUSE Leap 15.6:kernel-docs-html-6.4.0-150600.23.81.1.noarch",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-vdso-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-macros-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.s390x",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.x86_64",
"openSUSE Leap 15.6:kernel-source-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-source-vanilla-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.ppc64le",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.s390x",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.x86_64",
"openSUSE Leap 15.6:kernel-zfcpdump-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kselftests-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_81-default-1-150600.13.3.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_81-default-1-150600.13.3.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_81-default-1-150600.13.3.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-64kb-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-64kb-devel-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-devel-6.4.0-150600.23.81.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-macros-6.4.0-150600.23.81.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-zfcpdump-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-docs-6.4.0-150600.23.81.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-source-6.4.0-150600.23.81.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP6:kernel-default-extra-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:dlm-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:dtb-allwinner-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-altera-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-amazon-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-amd-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-amlogic-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-apm-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-apple-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-arm-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-broadcom-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-cavium-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-exynos-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-freescale-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-hisilicon-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-lg-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-marvell-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-mediatek-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-nvidia-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-qcom-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-renesas-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-rockchip-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-socionext-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-sprd-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-xilinx-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-64kb-devel-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-64kb-extra-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-64kb-optional-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-debug-vdso-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.aarch64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.x86_64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.81.3.150600.12.36.3.aarch64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.81.3.150600.12.36.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.81.3.150600.12.36.3.x86_64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-vdso-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-devel-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-docs-6.4.0-150600.23.81.1.noarch",
"openSUSE Leap 15.6:kernel-docs-html-6.4.0-150600.23.81.1.noarch",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-vdso-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-macros-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.s390x",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.x86_64",
"openSUSE Leap 15.6:kernel-source-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-source-vanilla-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.ppc64le",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.s390x",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.x86_64",
"openSUSE Leap 15.6:kernel-zfcpdump-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kselftests-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-17T10:52:47Z",
"details": "moderate"
}
],
"title": "CVE-2025-40075"
},
{
"cve": "CVE-2025-40083",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40083"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnet/sched: sch_qfq: Fix null-deref in agg_dequeue\n\nTo prevent a potential crash in agg_dequeue (net/sched/sch_qfq.c)\nwhen cl-\u003eqdisc-\u003eops-\u003epeek(cl-\u003eqdisc) returns NULL, we check the return\nvalue before using it, similar to the existing approach in sch_hfsc.c.\n\nTo avoid code duplication, the following changes are made:\n\n1. Changed qdisc_warn_nonwc(include/net/pkt_sched.h) into a static\ninline function.\n\n2. Moved qdisc_peek_len from net/sched/sch_hfsc.c to\ninclude/net/pkt_sched.h so that sch_qfq can reuse it.\n\n3. Applied qdisc_peek_len in agg_dequeue to avoid crashing.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_81-default-1-150600.13.3.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_81-default-1-150600.13.3.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_81-default-1-150600.13.3.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-64kb-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-64kb-devel-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-devel-6.4.0-150600.23.81.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-macros-6.4.0-150600.23.81.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-zfcpdump-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-docs-6.4.0-150600.23.81.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-source-6.4.0-150600.23.81.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP6:kernel-default-extra-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:dlm-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:dtb-allwinner-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-altera-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-amazon-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-amd-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-amlogic-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-apm-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-apple-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-arm-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-broadcom-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-cavium-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-exynos-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-freescale-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-hisilicon-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-lg-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-marvell-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-mediatek-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-nvidia-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-qcom-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-renesas-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-rockchip-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-socionext-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-sprd-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-xilinx-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-64kb-devel-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-64kb-extra-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-64kb-optional-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-debug-vdso-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.aarch64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.x86_64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.81.3.150600.12.36.3.aarch64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.81.3.150600.12.36.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.81.3.150600.12.36.3.x86_64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-vdso-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-devel-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-docs-6.4.0-150600.23.81.1.noarch",
"openSUSE Leap 15.6:kernel-docs-html-6.4.0-150600.23.81.1.noarch",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-vdso-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-macros-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.s390x",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.x86_64",
"openSUSE Leap 15.6:kernel-source-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-source-vanilla-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.ppc64le",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.s390x",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.x86_64",
"openSUSE Leap 15.6:kernel-zfcpdump-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kselftests-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40083",
"url": "https://www.suse.com/security/cve/CVE-2025-40083"
},
{
"category": "external",
"summary": "SUSE Bug 1252912 for CVE-2025-40083",
"url": "https://bugzilla.suse.com/1252912"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_81-default-1-150600.13.3.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_81-default-1-150600.13.3.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_81-default-1-150600.13.3.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-64kb-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-64kb-devel-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-devel-6.4.0-150600.23.81.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-macros-6.4.0-150600.23.81.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-zfcpdump-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-docs-6.4.0-150600.23.81.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-source-6.4.0-150600.23.81.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP6:kernel-default-extra-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:dlm-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:dtb-allwinner-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-altera-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-amazon-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-amd-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-amlogic-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-apm-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-apple-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-arm-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-broadcom-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-cavium-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-exynos-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-freescale-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-hisilicon-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-lg-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-marvell-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-mediatek-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-nvidia-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-qcom-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-renesas-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-rockchip-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-socionext-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-sprd-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-xilinx-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-64kb-devel-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-64kb-extra-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-64kb-optional-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-debug-vdso-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.aarch64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.x86_64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.81.3.150600.12.36.3.aarch64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.81.3.150600.12.36.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.81.3.150600.12.36.3.x86_64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-vdso-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-devel-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-docs-6.4.0-150600.23.81.1.noarch",
"openSUSE Leap 15.6:kernel-docs-html-6.4.0-150600.23.81.1.noarch",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-vdso-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-macros-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.s390x",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.x86_64",
"openSUSE Leap 15.6:kernel-source-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-source-vanilla-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.ppc64le",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.s390x",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.x86_64",
"openSUSE Leap 15.6:kernel-zfcpdump-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kselftests-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_81-default-1-150600.13.3.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_81-default-1-150600.13.3.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_81-default-1-150600.13.3.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-64kb-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-64kb-devel-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-devel-6.4.0-150600.23.81.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-macros-6.4.0-150600.23.81.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-zfcpdump-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-docs-6.4.0-150600.23.81.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-source-6.4.0-150600.23.81.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP6:kernel-default-extra-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:dlm-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:dtb-allwinner-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-altera-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-amazon-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-amd-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-amlogic-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-apm-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-apple-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-arm-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-broadcom-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-cavium-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-exynos-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-freescale-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-hisilicon-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-lg-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-marvell-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-mediatek-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-nvidia-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-qcom-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-renesas-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-rockchip-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-socionext-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-sprd-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-xilinx-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-64kb-devel-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-64kb-extra-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-64kb-optional-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-debug-vdso-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.aarch64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.x86_64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.81.3.150600.12.36.3.aarch64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.81.3.150600.12.36.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.81.3.150600.12.36.3.x86_64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-vdso-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-devel-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-docs-6.4.0-150600.23.81.1.noarch",
"openSUSE Leap 15.6:kernel-docs-html-6.4.0-150600.23.81.1.noarch",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-vdso-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-macros-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.s390x",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.x86_64",
"openSUSE Leap 15.6:kernel-source-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-source-vanilla-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.ppc64le",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.s390x",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.x86_64",
"openSUSE Leap 15.6:kernel-zfcpdump-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kselftests-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-17T10:52:47Z",
"details": "moderate"
}
],
"title": "CVE-2025-40083"
},
{
"cve": "CVE-2025-40098",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40098"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nALSA: hda: cs35l41: Fix NULL pointer dereference in cs35l41_get_acpi_mute_state()\n\nReturn value of a function acpi_evaluate_dsm() is dereferenced without\nchecking for NULL, but it is usually checked for this function.\n\nacpi_evaluate_dsm() may return NULL, when acpi_evaluate_object() returns\nacpi_status other than ACPI_SUCCESS, so add a check to prevent the crach.\n\nFound by Linux Verification Center (linuxtesting.org) with SVACE.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_81-default-1-150600.13.3.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_81-default-1-150600.13.3.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_81-default-1-150600.13.3.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-64kb-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-64kb-devel-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-devel-6.4.0-150600.23.81.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-macros-6.4.0-150600.23.81.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-zfcpdump-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-docs-6.4.0-150600.23.81.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-source-6.4.0-150600.23.81.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP6:kernel-default-extra-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:dlm-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:dtb-allwinner-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-altera-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-amazon-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-amd-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-amlogic-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-apm-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-apple-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-arm-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-broadcom-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-cavium-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-exynos-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-freescale-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-hisilicon-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-lg-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-marvell-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-mediatek-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-nvidia-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-qcom-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-renesas-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-rockchip-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-socionext-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-sprd-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-xilinx-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-64kb-devel-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-64kb-extra-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-64kb-optional-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-debug-vdso-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.aarch64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.x86_64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.81.3.150600.12.36.3.aarch64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.81.3.150600.12.36.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.81.3.150600.12.36.3.x86_64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-vdso-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-devel-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-docs-6.4.0-150600.23.81.1.noarch",
"openSUSE Leap 15.6:kernel-docs-html-6.4.0-150600.23.81.1.noarch",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-vdso-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-macros-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.s390x",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.x86_64",
"openSUSE Leap 15.6:kernel-source-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-source-vanilla-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.ppc64le",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.s390x",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.x86_64",
"openSUSE Leap 15.6:kernel-zfcpdump-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kselftests-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40098",
"url": "https://www.suse.com/security/cve/CVE-2025-40098"
},
{
"category": "external",
"summary": "SUSE Bug 1252917 for CVE-2025-40098",
"url": "https://bugzilla.suse.com/1252917"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_81-default-1-150600.13.3.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_81-default-1-150600.13.3.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_81-default-1-150600.13.3.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-64kb-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-64kb-devel-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-devel-6.4.0-150600.23.81.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-macros-6.4.0-150600.23.81.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-zfcpdump-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-docs-6.4.0-150600.23.81.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-source-6.4.0-150600.23.81.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP6:kernel-default-extra-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:dlm-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:dtb-allwinner-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-altera-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-amazon-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-amd-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-amlogic-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-apm-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-apple-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-arm-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-broadcom-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-cavium-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-exynos-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-freescale-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-hisilicon-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-lg-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-marvell-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-mediatek-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-nvidia-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-qcom-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-renesas-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-rockchip-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-socionext-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-sprd-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-xilinx-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-64kb-devel-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-64kb-extra-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-64kb-optional-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-debug-vdso-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.aarch64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.x86_64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.81.3.150600.12.36.3.aarch64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.81.3.150600.12.36.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.81.3.150600.12.36.3.x86_64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-vdso-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-devel-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-docs-6.4.0-150600.23.81.1.noarch",
"openSUSE Leap 15.6:kernel-docs-html-6.4.0-150600.23.81.1.noarch",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-vdso-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-macros-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.s390x",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.x86_64",
"openSUSE Leap 15.6:kernel-source-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-source-vanilla-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.ppc64le",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.s390x",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.x86_64",
"openSUSE Leap 15.6:kernel-zfcpdump-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kselftests-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_81-default-1-150600.13.3.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_81-default-1-150600.13.3.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_81-default-1-150600.13.3.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-64kb-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-64kb-devel-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-devel-6.4.0-150600.23.81.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-macros-6.4.0-150600.23.81.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-zfcpdump-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-docs-6.4.0-150600.23.81.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-source-6.4.0-150600.23.81.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP6:kernel-default-extra-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:dlm-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:dtb-allwinner-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-altera-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-amazon-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-amd-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-amlogic-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-apm-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-apple-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-arm-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-broadcom-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-cavium-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-exynos-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-freescale-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-hisilicon-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-lg-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-marvell-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-mediatek-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-nvidia-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-qcom-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-renesas-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-rockchip-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-socionext-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-sprd-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-xilinx-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-64kb-devel-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-64kb-extra-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-64kb-optional-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-debug-vdso-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.aarch64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.x86_64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.81.3.150600.12.36.3.aarch64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.81.3.150600.12.36.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.81.3.150600.12.36.3.x86_64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-vdso-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-devel-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-docs-6.4.0-150600.23.81.1.noarch",
"openSUSE Leap 15.6:kernel-docs-html-6.4.0-150600.23.81.1.noarch",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-vdso-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-macros-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.s390x",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.x86_64",
"openSUSE Leap 15.6:kernel-source-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-source-vanilla-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.ppc64le",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.s390x",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.x86_64",
"openSUSE Leap 15.6:kernel-zfcpdump-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kselftests-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-17T10:52:47Z",
"details": "moderate"
}
],
"title": "CVE-2025-40098"
},
{
"cve": "CVE-2025-40105",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40105"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nvfs: Don\u0027t leak disconnected dentries on umount\n\nWhen user calls open_by_handle_at() on some inode that is not cached, we\nwill create disconnected dentry for it. If such dentry is a directory,\nexportfs_decode_fh_raw() will then try to connect this dentry to the\ndentry tree through reconnect_path(). It may happen for various reasons\n(such as corrupted fs or race with rename) that the call to\nlookup_one_unlocked() in reconnect_one() will fail to find the dentry we\nare trying to reconnect and instead create a new dentry under the\nparent. Now this dentry will not be marked as disconnected although the\nparent still may well be disconnected (at least in case this\ninconsistency happened because the fs is corrupted and .. doesn\u0027t point\nto the real parent directory). This creates inconsistency in\ndisconnected flags but AFAICS it was mostly harmless. At least until\ncommit f1ee616214cb (\"VFS: don\u0027t keep disconnected dentries on d_anon\")\nwhich removed adding of most disconnected dentries to sb-\u003es_anon list.\nThus after this commit cleanup of disconnected dentries implicitely\nrelies on the fact that dput() will immediately reclaim such dentries.\nHowever when some leaf dentry isn\u0027t marked as disconnected, as in the\nscenario described above, the reclaim doesn\u0027t happen and the dentries\nare \"leaked\". Memory reclaim can eventually reclaim them but otherwise\nthey stay in memory and if umount comes first, we hit infamous \"Busy\ninodes after unmount\" bug. Make sure all dentries created under a\ndisconnected parent are marked as disconnected as well.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_81-default-1-150600.13.3.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_81-default-1-150600.13.3.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_81-default-1-150600.13.3.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-64kb-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-64kb-devel-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-devel-6.4.0-150600.23.81.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-macros-6.4.0-150600.23.81.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-zfcpdump-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-docs-6.4.0-150600.23.81.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-source-6.4.0-150600.23.81.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP6:kernel-default-extra-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:dlm-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:dtb-allwinner-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-altera-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-amazon-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-amd-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-amlogic-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-apm-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-apple-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-arm-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-broadcom-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-cavium-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-exynos-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-freescale-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-hisilicon-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-lg-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-marvell-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-mediatek-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-nvidia-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-qcom-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-renesas-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-rockchip-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-socionext-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-sprd-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-xilinx-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-64kb-devel-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-64kb-extra-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-64kb-optional-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-debug-vdso-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.aarch64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.x86_64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.81.3.150600.12.36.3.aarch64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.81.3.150600.12.36.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.81.3.150600.12.36.3.x86_64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-vdso-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-devel-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-docs-6.4.0-150600.23.81.1.noarch",
"openSUSE Leap 15.6:kernel-docs-html-6.4.0-150600.23.81.1.noarch",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-vdso-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-macros-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.s390x",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.x86_64",
"openSUSE Leap 15.6:kernel-source-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-source-vanilla-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.ppc64le",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.s390x",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.x86_64",
"openSUSE Leap 15.6:kernel-zfcpdump-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kselftests-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40105",
"url": "https://www.suse.com/security/cve/CVE-2025-40105"
},
{
"category": "external",
"summary": "SUSE Bug 1252928 for CVE-2025-40105",
"url": "https://bugzilla.suse.com/1252928"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_81-default-1-150600.13.3.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_81-default-1-150600.13.3.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_81-default-1-150600.13.3.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-64kb-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-64kb-devel-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-devel-6.4.0-150600.23.81.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-macros-6.4.0-150600.23.81.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-zfcpdump-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-docs-6.4.0-150600.23.81.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-source-6.4.0-150600.23.81.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP6:kernel-default-extra-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:dlm-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:dtb-allwinner-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-altera-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-amazon-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-amd-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-amlogic-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-apm-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-apple-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-arm-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-broadcom-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-cavium-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-exynos-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-freescale-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-hisilicon-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-lg-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-marvell-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-mediatek-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-nvidia-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-qcom-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-renesas-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-rockchip-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-socionext-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-sprd-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-xilinx-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-64kb-devel-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-64kb-extra-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-64kb-optional-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-debug-vdso-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.aarch64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.x86_64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.81.3.150600.12.36.3.aarch64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.81.3.150600.12.36.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.81.3.150600.12.36.3.x86_64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-vdso-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-devel-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-docs-6.4.0-150600.23.81.1.noarch",
"openSUSE Leap 15.6:kernel-docs-html-6.4.0-150600.23.81.1.noarch",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-vdso-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-macros-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.s390x",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.x86_64",
"openSUSE Leap 15.6:kernel-source-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-source-vanilla-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.ppc64le",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.s390x",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.x86_64",
"openSUSE Leap 15.6:kernel-zfcpdump-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kselftests-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.3,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_81-default-1-150600.13.3.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_81-default-1-150600.13.3.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_81-default-1-150600.13.3.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-64kb-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-64kb-devel-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-devel-6.4.0-150600.23.81.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-macros-6.4.0-150600.23.81.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-zfcpdump-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-docs-6.4.0-150600.23.81.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-source-6.4.0-150600.23.81.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP6:kernel-default-extra-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:dlm-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:dtb-allwinner-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-altera-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-amazon-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-amd-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-amlogic-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-apm-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-apple-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-arm-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-broadcom-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-cavium-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-exynos-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-freescale-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-hisilicon-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-lg-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-marvell-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-mediatek-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-nvidia-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-qcom-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-renesas-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-rockchip-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-socionext-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-sprd-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-xilinx-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-64kb-devel-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-64kb-extra-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-64kb-optional-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-debug-vdso-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.aarch64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.x86_64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.81.3.150600.12.36.3.aarch64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.81.3.150600.12.36.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.81.3.150600.12.36.3.x86_64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-vdso-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-devel-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-docs-6.4.0-150600.23.81.1.noarch",
"openSUSE Leap 15.6:kernel-docs-html-6.4.0-150600.23.81.1.noarch",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-vdso-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-macros-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.s390x",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.x86_64",
"openSUSE Leap 15.6:kernel-source-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-source-vanilla-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.ppc64le",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.s390x",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.x86_64",
"openSUSE Leap 15.6:kernel-zfcpdump-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kselftests-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-17T10:52:47Z",
"details": "low"
}
],
"title": "CVE-2025-40105"
},
{
"cve": "CVE-2025-40107",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40107"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\ncan: hi311x: fix null pointer dereference when resuming from sleep before interface was enabled\n\nThis issue is similar to the vulnerability in the `mcp251x` driver,\nwhich was fixed in commit 03c427147b2d (\"can: mcp251x: fix resume from\nsleep before interface was brought up\").\n\nIn the `hi311x` driver, when the device resumes from sleep, the driver\nschedules `priv-\u003erestart_work`. However, if the network interface was\nnot previously enabled, the `priv-\u003ewq` (workqueue) is not allocated and\ninitialized, leading to a null pointer dereference.\n\nTo fix this, we move the allocation and initialization of the workqueue\nfrom the `hi3110_open` function to the `hi3110_can_probe` function.\nThis ensures that the workqueue is properly initialized before it is\nused during device resume. And added logic to destroy the workqueue\nin the error handling paths of `hi3110_can_probe` and in the\n`hi3110_can_remove` function to prevent resource leaks.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_81-default-1-150600.13.3.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_81-default-1-150600.13.3.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_81-default-1-150600.13.3.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-64kb-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-64kb-devel-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-devel-6.4.0-150600.23.81.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-macros-6.4.0-150600.23.81.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-zfcpdump-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-docs-6.4.0-150600.23.81.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-source-6.4.0-150600.23.81.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP6:kernel-default-extra-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:dlm-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:dtb-allwinner-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-altera-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-amazon-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-amd-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-amlogic-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-apm-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-apple-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-arm-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-broadcom-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-cavium-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-exynos-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-freescale-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-hisilicon-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-lg-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-marvell-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-mediatek-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-nvidia-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-qcom-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-renesas-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-rockchip-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-socionext-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-sprd-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-xilinx-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-64kb-devel-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-64kb-extra-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-64kb-optional-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-debug-vdso-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.aarch64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.x86_64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.81.3.150600.12.36.3.aarch64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.81.3.150600.12.36.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.81.3.150600.12.36.3.x86_64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-vdso-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-devel-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-docs-6.4.0-150600.23.81.1.noarch",
"openSUSE Leap 15.6:kernel-docs-html-6.4.0-150600.23.81.1.noarch",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-vdso-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-macros-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.s390x",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.x86_64",
"openSUSE Leap 15.6:kernel-source-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-source-vanilla-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.ppc64le",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.s390x",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.x86_64",
"openSUSE Leap 15.6:kernel-zfcpdump-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kselftests-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40107",
"url": "https://www.suse.com/security/cve/CVE-2025-40107"
},
{
"category": "external",
"summary": "SUSE Bug 1253018 for CVE-2025-40107",
"url": "https://bugzilla.suse.com/1253018"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_81-default-1-150600.13.3.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_81-default-1-150600.13.3.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_81-default-1-150600.13.3.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-64kb-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-64kb-devel-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-devel-6.4.0-150600.23.81.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-macros-6.4.0-150600.23.81.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-zfcpdump-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-docs-6.4.0-150600.23.81.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-source-6.4.0-150600.23.81.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP6:kernel-default-extra-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:dlm-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:dtb-allwinner-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-altera-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-amazon-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-amd-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-amlogic-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-apm-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-apple-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-arm-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-broadcom-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-cavium-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-exynos-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-freescale-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-hisilicon-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-lg-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-marvell-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-mediatek-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-nvidia-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-qcom-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-renesas-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-rockchip-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-socionext-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-sprd-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-xilinx-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-64kb-devel-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-64kb-extra-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-64kb-optional-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-debug-vdso-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.aarch64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.x86_64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.81.3.150600.12.36.3.aarch64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.81.3.150600.12.36.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.81.3.150600.12.36.3.x86_64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-vdso-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-devel-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-docs-6.4.0-150600.23.81.1.noarch",
"openSUSE Leap 15.6:kernel-docs-html-6.4.0-150600.23.81.1.noarch",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-vdso-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-macros-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.s390x",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.x86_64",
"openSUSE Leap 15.6:kernel-source-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-source-vanilla-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.ppc64le",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.s390x",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.x86_64",
"openSUSE Leap 15.6:kernel-zfcpdump-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kselftests-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_81-default-1-150600.13.3.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_81-default-1-150600.13.3.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_81-default-1-150600.13.3.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-64kb-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-64kb-devel-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-devel-6.4.0-150600.23.81.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-macros-6.4.0-150600.23.81.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-zfcpdump-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-docs-6.4.0-150600.23.81.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-source-6.4.0-150600.23.81.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP6:kernel-default-extra-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:dlm-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:dtb-allwinner-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-altera-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-amazon-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-amd-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-amlogic-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-apm-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-apple-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-arm-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-broadcom-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-cavium-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-exynos-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-freescale-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-hisilicon-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-lg-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-marvell-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-mediatek-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-nvidia-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-qcom-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-renesas-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-rockchip-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-socionext-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-sprd-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-xilinx-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-64kb-devel-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-64kb-extra-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-64kb-optional-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-debug-vdso-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.aarch64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.x86_64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.81.3.150600.12.36.3.aarch64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.81.3.150600.12.36.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.81.3.150600.12.36.3.x86_64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-vdso-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-devel-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-docs-6.4.0-150600.23.81.1.noarch",
"openSUSE Leap 15.6:kernel-docs-html-6.4.0-150600.23.81.1.noarch",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-vdso-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-macros-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.s390x",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.x86_64",
"openSUSE Leap 15.6:kernel-source-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-source-vanilla-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.ppc64le",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.s390x",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.x86_64",
"openSUSE Leap 15.6:kernel-zfcpdump-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kselftests-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-17T10:52:47Z",
"details": "moderate"
}
],
"title": "CVE-2025-40107"
},
{
"cve": "CVE-2025-40109",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40109"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\ncrypto: rng - Ensure set_ent is always present\n\nEnsure that set_ent is always set since only drbg provides it.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_81-default-1-150600.13.3.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_81-default-1-150600.13.3.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_81-default-1-150600.13.3.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-64kb-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-64kb-devel-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-devel-6.4.0-150600.23.81.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-macros-6.4.0-150600.23.81.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-zfcpdump-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-docs-6.4.0-150600.23.81.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-source-6.4.0-150600.23.81.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP6:kernel-default-extra-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:dlm-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:dtb-allwinner-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-altera-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-amazon-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-amd-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-amlogic-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-apm-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-apple-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-arm-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-broadcom-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-cavium-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-exynos-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-freescale-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-hisilicon-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-lg-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-marvell-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-mediatek-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-nvidia-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-qcom-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-renesas-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-rockchip-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-socionext-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-sprd-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-xilinx-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-64kb-devel-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-64kb-extra-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-64kb-optional-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-debug-vdso-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.aarch64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.x86_64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.81.3.150600.12.36.3.aarch64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.81.3.150600.12.36.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.81.3.150600.12.36.3.x86_64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-vdso-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-devel-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-docs-6.4.0-150600.23.81.1.noarch",
"openSUSE Leap 15.6:kernel-docs-html-6.4.0-150600.23.81.1.noarch",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-vdso-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-macros-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.s390x",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.x86_64",
"openSUSE Leap 15.6:kernel-source-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-source-vanilla-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.ppc64le",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.s390x",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.x86_64",
"openSUSE Leap 15.6:kernel-zfcpdump-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kselftests-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40109",
"url": "https://www.suse.com/security/cve/CVE-2025-40109"
},
{
"category": "external",
"summary": "SUSE Bug 1253176 for CVE-2025-40109",
"url": "https://bugzilla.suse.com/1253176"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_81-default-1-150600.13.3.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_81-default-1-150600.13.3.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_81-default-1-150600.13.3.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-64kb-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-64kb-devel-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-devel-6.4.0-150600.23.81.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-macros-6.4.0-150600.23.81.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-zfcpdump-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-docs-6.4.0-150600.23.81.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-source-6.4.0-150600.23.81.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP6:kernel-default-extra-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:dlm-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:dtb-allwinner-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-altera-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-amazon-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-amd-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-amlogic-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-apm-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-apple-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-arm-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-broadcom-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-cavium-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-exynos-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-freescale-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-hisilicon-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-lg-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-marvell-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-mediatek-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-nvidia-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-qcom-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-renesas-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-rockchip-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-socionext-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-sprd-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-xilinx-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-64kb-devel-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-64kb-extra-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-64kb-optional-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-debug-vdso-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.aarch64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.x86_64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.81.3.150600.12.36.3.aarch64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.81.3.150600.12.36.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.81.3.150600.12.36.3.x86_64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-vdso-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-devel-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-docs-6.4.0-150600.23.81.1.noarch",
"openSUSE Leap 15.6:kernel-docs-html-6.4.0-150600.23.81.1.noarch",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-vdso-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-macros-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.s390x",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.x86_64",
"openSUSE Leap 15.6:kernel-source-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-source-vanilla-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.ppc64le",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.s390x",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.x86_64",
"openSUSE Leap 15.6:kernel-zfcpdump-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kselftests-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_81-default-1-150600.13.3.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_81-default-1-150600.13.3.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_81-default-1-150600.13.3.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-64kb-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-64kb-devel-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-devel-6.4.0-150600.23.81.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-macros-6.4.0-150600.23.81.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-zfcpdump-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-docs-6.4.0-150600.23.81.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-source-6.4.0-150600.23.81.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP6:kernel-default-extra-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:dlm-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:dtb-allwinner-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-altera-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-amazon-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-amd-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-amlogic-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-apm-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-apple-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-arm-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-broadcom-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-cavium-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-exynos-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-freescale-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-hisilicon-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-lg-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-marvell-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-mediatek-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-nvidia-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-qcom-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-renesas-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-rockchip-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-socionext-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-sprd-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-xilinx-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-64kb-devel-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-64kb-extra-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-64kb-optional-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-debug-vdso-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.aarch64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.x86_64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.81.3.150600.12.36.3.aarch64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.81.3.150600.12.36.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.81.3.150600.12.36.3.x86_64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-vdso-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-devel-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-docs-6.4.0-150600.23.81.1.noarch",
"openSUSE Leap 15.6:kernel-docs-html-6.4.0-150600.23.81.1.noarch",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-vdso-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-macros-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.s390x",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.x86_64",
"openSUSE Leap 15.6:kernel-source-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-source-vanilla-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.ppc64le",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.s390x",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.x86_64",
"openSUSE Leap 15.6:kernel-zfcpdump-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kselftests-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-17T10:52:47Z",
"details": "moderate"
}
],
"title": "CVE-2025-40109"
},
{
"cve": "CVE-2025-40110",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40110"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\ndrm/vmwgfx: Fix a null-ptr access in the cursor snooper\n\nCheck that the resource which is converted to a surface exists before\ntrying to use the cursor snooper on it.\n\nvmw_cmd_res_check allows explicit invalid (SVGA3D_INVALID_ID) identifiers\nbecause some svga commands accept SVGA3D_INVALID_ID to mean \"no surface\",\nunfortunately functions that accept the actual surfaces as objects might\n(and in case of the cursor snooper, do not) be able to handle null\nobjects. Make sure that we validate not only the identifier (via the\nvmw_cmd_res_check) but also check that the actual resource exists before\ntrying to do something with it.\n\nFixes unchecked null-ptr reference in the snooping code.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_81-default-1-150600.13.3.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_81-default-1-150600.13.3.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_81-default-1-150600.13.3.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-64kb-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-64kb-devel-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-devel-6.4.0-150600.23.81.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-macros-6.4.0-150600.23.81.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-zfcpdump-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-docs-6.4.0-150600.23.81.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-source-6.4.0-150600.23.81.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP6:kernel-default-extra-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:dlm-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:dtb-allwinner-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-altera-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-amazon-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-amd-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-amlogic-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-apm-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-apple-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-arm-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-broadcom-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-cavium-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-exynos-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-freescale-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-hisilicon-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-lg-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-marvell-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-mediatek-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-nvidia-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-qcom-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-renesas-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-rockchip-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-socionext-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-sprd-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-xilinx-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-64kb-devel-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-64kb-extra-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-64kb-optional-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-debug-vdso-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.aarch64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.x86_64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.81.3.150600.12.36.3.aarch64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.81.3.150600.12.36.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.81.3.150600.12.36.3.x86_64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-vdso-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-devel-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-docs-6.4.0-150600.23.81.1.noarch",
"openSUSE Leap 15.6:kernel-docs-html-6.4.0-150600.23.81.1.noarch",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-vdso-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-macros-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.s390x",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.x86_64",
"openSUSE Leap 15.6:kernel-source-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-source-vanilla-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.ppc64le",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.s390x",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.x86_64",
"openSUSE Leap 15.6:kernel-zfcpdump-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kselftests-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40110",
"url": "https://www.suse.com/security/cve/CVE-2025-40110"
},
{
"category": "external",
"summary": "SUSE Bug 1253275 for CVE-2025-40110",
"url": "https://bugzilla.suse.com/1253275"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_81-default-1-150600.13.3.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_81-default-1-150600.13.3.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_81-default-1-150600.13.3.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-64kb-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-64kb-devel-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-devel-6.4.0-150600.23.81.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-macros-6.4.0-150600.23.81.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-zfcpdump-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-docs-6.4.0-150600.23.81.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-source-6.4.0-150600.23.81.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP6:kernel-default-extra-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:dlm-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:dtb-allwinner-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-altera-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-amazon-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-amd-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-amlogic-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-apm-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-apple-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-arm-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-broadcom-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-cavium-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-exynos-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-freescale-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-hisilicon-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-lg-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-marvell-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-mediatek-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-nvidia-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-qcom-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-renesas-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-rockchip-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-socionext-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-sprd-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-xilinx-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-64kb-devel-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-64kb-extra-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-64kb-optional-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-debug-vdso-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.aarch64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.x86_64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.81.3.150600.12.36.3.aarch64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.81.3.150600.12.36.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.81.3.150600.12.36.3.x86_64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-vdso-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-devel-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-docs-6.4.0-150600.23.81.1.noarch",
"openSUSE Leap 15.6:kernel-docs-html-6.4.0-150600.23.81.1.noarch",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-vdso-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-macros-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.s390x",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.x86_64",
"openSUSE Leap 15.6:kernel-source-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-source-vanilla-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.ppc64le",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.s390x",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.x86_64",
"openSUSE Leap 15.6:kernel-zfcpdump-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kselftests-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.1,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_81-default-1-150600.13.3.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_81-default-1-150600.13.3.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_81-default-1-150600.13.3.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-64kb-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-64kb-devel-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-devel-6.4.0-150600.23.81.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-macros-6.4.0-150600.23.81.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-zfcpdump-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-docs-6.4.0-150600.23.81.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-source-6.4.0-150600.23.81.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP6:kernel-default-extra-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:dlm-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:dtb-allwinner-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-altera-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-amazon-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-amd-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-amlogic-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-apm-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-apple-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-arm-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-broadcom-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-cavium-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-exynos-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-freescale-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-hisilicon-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-lg-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-marvell-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-mediatek-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-nvidia-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-qcom-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-renesas-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-rockchip-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-socionext-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-sprd-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-xilinx-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-64kb-devel-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-64kb-extra-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-64kb-optional-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-debug-vdso-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.aarch64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.x86_64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.81.3.150600.12.36.3.aarch64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.81.3.150600.12.36.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.81.3.150600.12.36.3.x86_64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-vdso-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-devel-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-docs-6.4.0-150600.23.81.1.noarch",
"openSUSE Leap 15.6:kernel-docs-html-6.4.0-150600.23.81.1.noarch",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-vdso-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-macros-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.s390x",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.x86_64",
"openSUSE Leap 15.6:kernel-source-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-source-vanilla-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.ppc64le",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.s390x",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.x86_64",
"openSUSE Leap 15.6:kernel-zfcpdump-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kselftests-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-17T10:52:47Z",
"details": "moderate"
}
],
"title": "CVE-2025-40110"
},
{
"cve": "CVE-2025-40111",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40111"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\ndrm/vmwgfx: Fix Use-after-free in validation\n\nNodes stored in the validation duplicates hashtable come from an arena\nallocator that is cleared at the end of vmw_execbuf_process. All nodes\nare expected to be cleared in vmw_validation_drop_ht but this node escaped\nbecause its resource was destroyed prematurely.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_81-default-1-150600.13.3.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_81-default-1-150600.13.3.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_81-default-1-150600.13.3.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-64kb-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-64kb-devel-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-devel-6.4.0-150600.23.81.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-macros-6.4.0-150600.23.81.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-zfcpdump-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-docs-6.4.0-150600.23.81.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-source-6.4.0-150600.23.81.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP6:kernel-default-extra-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:dlm-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:dtb-allwinner-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-altera-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-amazon-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-amd-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-amlogic-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-apm-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-apple-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-arm-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-broadcom-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-cavium-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-exynos-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-freescale-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-hisilicon-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-lg-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-marvell-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-mediatek-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-nvidia-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-qcom-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-renesas-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-rockchip-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-socionext-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-sprd-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-xilinx-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-64kb-devel-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-64kb-extra-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-64kb-optional-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-debug-vdso-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.aarch64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.x86_64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.81.3.150600.12.36.3.aarch64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.81.3.150600.12.36.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.81.3.150600.12.36.3.x86_64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-vdso-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-devel-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-docs-6.4.0-150600.23.81.1.noarch",
"openSUSE Leap 15.6:kernel-docs-html-6.4.0-150600.23.81.1.noarch",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-vdso-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-macros-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.s390x",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.x86_64",
"openSUSE Leap 15.6:kernel-source-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-source-vanilla-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.ppc64le",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.s390x",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.x86_64",
"openSUSE Leap 15.6:kernel-zfcpdump-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kselftests-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40111",
"url": "https://www.suse.com/security/cve/CVE-2025-40111"
},
{
"category": "external",
"summary": "SUSE Bug 1253362 for CVE-2025-40111",
"url": "https://bugzilla.suse.com/1253362"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_81-default-1-150600.13.3.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_81-default-1-150600.13.3.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_81-default-1-150600.13.3.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-64kb-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-64kb-devel-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-devel-6.4.0-150600.23.81.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-macros-6.4.0-150600.23.81.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-zfcpdump-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-docs-6.4.0-150600.23.81.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-source-6.4.0-150600.23.81.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP6:kernel-default-extra-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:dlm-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:dtb-allwinner-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-altera-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-amazon-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-amd-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-amlogic-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-apm-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-apple-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-arm-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-broadcom-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-cavium-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-exynos-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-freescale-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-hisilicon-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-lg-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-marvell-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-mediatek-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-nvidia-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-qcom-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-renesas-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-rockchip-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-socionext-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-sprd-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-xilinx-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-64kb-devel-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-64kb-extra-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-64kb-optional-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-debug-vdso-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.aarch64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.x86_64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.81.3.150600.12.36.3.aarch64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.81.3.150600.12.36.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.81.3.150600.12.36.3.x86_64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-vdso-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-devel-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-docs-6.4.0-150600.23.81.1.noarch",
"openSUSE Leap 15.6:kernel-docs-html-6.4.0-150600.23.81.1.noarch",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-vdso-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-macros-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.s390x",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.x86_64",
"openSUSE Leap 15.6:kernel-source-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-source-vanilla-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.ppc64le",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.s390x",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.x86_64",
"openSUSE Leap 15.6:kernel-zfcpdump-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kselftests-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.7,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:L/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_81-default-1-150600.13.3.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_81-default-1-150600.13.3.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_81-default-1-150600.13.3.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-64kb-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-64kb-devel-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-devel-6.4.0-150600.23.81.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-macros-6.4.0-150600.23.81.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-zfcpdump-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-docs-6.4.0-150600.23.81.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-source-6.4.0-150600.23.81.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP6:kernel-default-extra-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:dlm-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:dtb-allwinner-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-altera-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-amazon-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-amd-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-amlogic-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-apm-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-apple-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-arm-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-broadcom-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-cavium-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-exynos-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-freescale-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-hisilicon-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-lg-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-marvell-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-mediatek-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-nvidia-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-qcom-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-renesas-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-rockchip-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-socionext-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-sprd-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-xilinx-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-64kb-devel-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-64kb-extra-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-64kb-optional-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-debug-vdso-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.aarch64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.x86_64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.81.3.150600.12.36.3.aarch64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.81.3.150600.12.36.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.81.3.150600.12.36.3.x86_64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-vdso-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-devel-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-docs-6.4.0-150600.23.81.1.noarch",
"openSUSE Leap 15.6:kernel-docs-html-6.4.0-150600.23.81.1.noarch",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-vdso-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-macros-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.s390x",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.x86_64",
"openSUSE Leap 15.6:kernel-source-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-source-vanilla-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.ppc64le",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.s390x",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.x86_64",
"openSUSE Leap 15.6:kernel-zfcpdump-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kselftests-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-17T10:52:47Z",
"details": "moderate"
}
],
"title": "CVE-2025-40111"
},
{
"cve": "CVE-2025-40115",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40115"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nscsi: mpt3sas: Fix crash in transport port remove by using ioc_info()\n\nDuring mpt3sas_transport_port_remove(), messages were logged with\ndev_printk() against \u0026mpt3sas_port-\u003eport-\u003edev. At this point the SAS\ntransport device may already be partially unregistered or freed, leading\nto a crash when accessing its struct device.\n\nUsing ioc_info(), which logs via the PCI device (ioc-\u003epdev-\u003edev),\nguaranteed to remain valid until driver removal.\n\n[83428.295776] Oops: general protection fault, probably for non-canonical address 0x6f702f323a33312d: 0000 [#1] SMP NOPTI\n[83428.295785] CPU: 145 UID: 0 PID: 113296 Comm: rmmod Kdump: loaded Tainted: G OE 6.16.0-rc1+ #1 PREEMPT(voluntary)\n[83428.295792] Tainted: [O]=OOT_MODULE, [E]=UNSIGNED_MODULE\n[83428.295795] Hardware name: Dell Inc. Precision 7875 Tower/, BIOS 89.1.67 02/23/2024\n[83428.295799] RIP: 0010:__dev_printk+0x1f/0x70\n[83428.295805] Code: 90 90 90 90 90 90 90 90 90 90 90 0f 1f 44 00 00 49 89 d1 48 85 f6 74 52 4c 8b 46 50 4d 85 c0 74 1f 48 8b 46 68 48 85 c0 74 22 \u003c48\u003e 8b 08 0f b6 7f 01 48 c7 c2 db e8 42 ad 83 ef 30 e9 7b f8 ff ff\n[83428.295813] RSP: 0018:ff85aeafc3137bb0 EFLAGS: 00010206\n[83428.295817] RAX: 6f702f323a33312d RBX: ff4290ee81292860 RCX: 5000cca25103be32\n[83428.295820] RDX: ff85aeafc3137bb8 RSI: ff4290eeb1966c00 RDI: ffffffffc1560845\n[83428.295823] RBP: ff85aeafc3137c18 R08: 74726f702f303a33 R09: ff85aeafc3137bb8\n[83428.295826] R10: ff85aeafc3137b18 R11: ff4290f5bd60fe68 R12: ff4290ee81290000\n[83428.295830] R13: ff4290ee6e345de0 R14: ff4290ee81290000 R15: ff4290ee6e345e30\n[83428.295833] FS: 00007fd9472a6740(0000) GS:ff4290f5ce96b000(0000) knlGS:0000000000000000\n[83428.295837] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033\n[83428.295840] CR2: 00007f242b4db238 CR3: 00000002372b8006 CR4: 0000000000771ef0\n[83428.295844] PKRU: 55555554\n[83428.295846] Call Trace:\n[83428.295848] \u003cTASK\u003e\n[83428.295850] _dev_printk+0x5c/0x80\n[83428.295857] ? srso_alias_return_thunk+0x5/0xfbef5\n[83428.295863] mpt3sas_transport_port_remove+0x1c7/0x420 [mpt3sas]\n[83428.295882] _scsih_remove_device+0x21b/0x280 [mpt3sas]\n[83428.295894] ? _scsih_expander_node_remove+0x108/0x140 [mpt3sas]\n[83428.295906] ? srso_alias_return_thunk+0x5/0xfbef5\n[83428.295910] mpt3sas_device_remove_by_sas_address.part.0+0x8f/0x110 [mpt3sas]\n[83428.295921] _scsih_expander_node_remove+0x129/0x140 [mpt3sas]\n[83428.295933] _scsih_expander_node_remove+0x6a/0x140 [mpt3sas]\n[83428.295944] scsih_remove+0x3f0/0x4a0 [mpt3sas]\n[83428.295957] pci_device_remove+0x3b/0xb0\n[83428.295962] device_release_driver_internal+0x193/0x200\n[83428.295968] driver_detach+0x44/0x90\n[83428.295971] bus_remove_driver+0x69/0xf0\n[83428.295975] pci_unregister_driver+0x2a/0xb0\n[83428.295979] _mpt3sas_exit+0x1f/0x300 [mpt3sas]\n[83428.295991] __do_sys_delete_module.constprop.0+0x174/0x310\n[83428.295997] ? srso_alias_return_thunk+0x5/0xfbef5\n[83428.296000] ? __x64_sys_getdents64+0x9a/0x110\n[83428.296005] ? srso_alias_return_thunk+0x5/0xfbef5\n[83428.296009] ? syscall_trace_enter+0xf6/0x1b0\n[83428.296014] do_syscall_64+0x7b/0x2c0\n[83428.296019] ? srso_alias_return_thunk+0x5/0xfbef5\n[83428.296023] entry_SYSCALL_64_after_hwframe+0x76/0x7e",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_81-default-1-150600.13.3.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_81-default-1-150600.13.3.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_81-default-1-150600.13.3.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-64kb-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-64kb-devel-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-devel-6.4.0-150600.23.81.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-macros-6.4.0-150600.23.81.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-zfcpdump-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-docs-6.4.0-150600.23.81.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-source-6.4.0-150600.23.81.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP6:kernel-default-extra-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:dlm-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:dtb-allwinner-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-altera-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-amazon-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-amd-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-amlogic-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-apm-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-apple-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-arm-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-broadcom-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-cavium-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-exynos-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-freescale-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-hisilicon-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-lg-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-marvell-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-mediatek-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-nvidia-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-qcom-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-renesas-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-rockchip-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-socionext-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-sprd-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-xilinx-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-64kb-devel-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-64kb-extra-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-64kb-optional-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-debug-vdso-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.aarch64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.x86_64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.81.3.150600.12.36.3.aarch64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.81.3.150600.12.36.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.81.3.150600.12.36.3.x86_64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-vdso-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-devel-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-docs-6.4.0-150600.23.81.1.noarch",
"openSUSE Leap 15.6:kernel-docs-html-6.4.0-150600.23.81.1.noarch",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-vdso-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-macros-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.s390x",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.x86_64",
"openSUSE Leap 15.6:kernel-source-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-source-vanilla-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.ppc64le",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.s390x",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.x86_64",
"openSUSE Leap 15.6:kernel-zfcpdump-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kselftests-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40115",
"url": "https://www.suse.com/security/cve/CVE-2025-40115"
},
{
"category": "external",
"summary": "SUSE Bug 1253318 for CVE-2025-40115",
"url": "https://bugzilla.suse.com/1253318"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_81-default-1-150600.13.3.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_81-default-1-150600.13.3.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_81-default-1-150600.13.3.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-64kb-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-64kb-devel-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-devel-6.4.0-150600.23.81.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-macros-6.4.0-150600.23.81.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-zfcpdump-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-docs-6.4.0-150600.23.81.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-source-6.4.0-150600.23.81.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP6:kernel-default-extra-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:dlm-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:dtb-allwinner-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-altera-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-amazon-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-amd-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-amlogic-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-apm-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-apple-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-arm-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-broadcom-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-cavium-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-exynos-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-freescale-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-hisilicon-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-lg-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-marvell-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-mediatek-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-nvidia-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-qcom-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-renesas-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-rockchip-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-socionext-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-sprd-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-xilinx-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-64kb-devel-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-64kb-extra-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-64kb-optional-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-debug-vdso-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.aarch64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.x86_64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.81.3.150600.12.36.3.aarch64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.81.3.150600.12.36.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.81.3.150600.12.36.3.x86_64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-vdso-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-devel-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-docs-6.4.0-150600.23.81.1.noarch",
"openSUSE Leap 15.6:kernel-docs-html-6.4.0-150600.23.81.1.noarch",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-vdso-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-macros-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.s390x",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.x86_64",
"openSUSE Leap 15.6:kernel-source-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-source-vanilla-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.ppc64le",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.s390x",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.x86_64",
"openSUSE Leap 15.6:kernel-zfcpdump-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kselftests-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_81-default-1-150600.13.3.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_81-default-1-150600.13.3.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_81-default-1-150600.13.3.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-64kb-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-64kb-devel-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-devel-6.4.0-150600.23.81.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-macros-6.4.0-150600.23.81.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-zfcpdump-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-docs-6.4.0-150600.23.81.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-source-6.4.0-150600.23.81.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP6:kernel-default-extra-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:dlm-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:dtb-allwinner-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-altera-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-amazon-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-amd-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-amlogic-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-apm-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-apple-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-arm-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-broadcom-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-cavium-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-exynos-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-freescale-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-hisilicon-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-lg-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-marvell-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-mediatek-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-nvidia-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-qcom-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-renesas-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-rockchip-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-socionext-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-sprd-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-xilinx-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-64kb-devel-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-64kb-extra-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-64kb-optional-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-debug-vdso-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.aarch64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.x86_64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.81.3.150600.12.36.3.aarch64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.81.3.150600.12.36.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.81.3.150600.12.36.3.x86_64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-vdso-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-devel-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-docs-6.4.0-150600.23.81.1.noarch",
"openSUSE Leap 15.6:kernel-docs-html-6.4.0-150600.23.81.1.noarch",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-vdso-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-macros-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.s390x",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.x86_64",
"openSUSE Leap 15.6:kernel-source-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-source-vanilla-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.ppc64le",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.s390x",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.x86_64",
"openSUSE Leap 15.6:kernel-zfcpdump-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kselftests-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-17T10:52:47Z",
"details": "moderate"
}
],
"title": "CVE-2025-40115"
},
{
"cve": "CVE-2025-40116",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40116"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nusb: host: max3421-hcd: Fix error pointer dereference in probe cleanup\n\nThe kthread_run() function returns error pointers so the\nmax3421_hcd-\u003espi_thread pointer can be either error pointers or NULL.\nCheck for both before dereferencing it.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_81-default-1-150600.13.3.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_81-default-1-150600.13.3.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_81-default-1-150600.13.3.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-64kb-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-64kb-devel-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-devel-6.4.0-150600.23.81.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-macros-6.4.0-150600.23.81.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-zfcpdump-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-docs-6.4.0-150600.23.81.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-source-6.4.0-150600.23.81.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP6:kernel-default-extra-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:dlm-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:dtb-allwinner-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-altera-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-amazon-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-amd-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-amlogic-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-apm-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-apple-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-arm-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-broadcom-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-cavium-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-exynos-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-freescale-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-hisilicon-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-lg-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-marvell-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-mediatek-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-nvidia-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-qcom-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-renesas-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-rockchip-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-socionext-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-sprd-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-xilinx-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-64kb-devel-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-64kb-extra-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-64kb-optional-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-debug-vdso-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.aarch64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.x86_64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.81.3.150600.12.36.3.aarch64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.81.3.150600.12.36.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.81.3.150600.12.36.3.x86_64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-vdso-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-devel-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-docs-6.4.0-150600.23.81.1.noarch",
"openSUSE Leap 15.6:kernel-docs-html-6.4.0-150600.23.81.1.noarch",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-vdso-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-macros-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.s390x",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.x86_64",
"openSUSE Leap 15.6:kernel-source-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-source-vanilla-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.ppc64le",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.s390x",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.x86_64",
"openSUSE Leap 15.6:kernel-zfcpdump-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kselftests-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40116",
"url": "https://www.suse.com/security/cve/CVE-2025-40116"
},
{
"category": "external",
"summary": "SUSE Bug 1253324 for CVE-2025-40116",
"url": "https://bugzilla.suse.com/1253324"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_81-default-1-150600.13.3.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_81-default-1-150600.13.3.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_81-default-1-150600.13.3.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-64kb-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-64kb-devel-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-devel-6.4.0-150600.23.81.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-macros-6.4.0-150600.23.81.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-zfcpdump-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-docs-6.4.0-150600.23.81.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-source-6.4.0-150600.23.81.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP6:kernel-default-extra-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:dlm-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:dtb-allwinner-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-altera-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-amazon-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-amd-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-amlogic-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-apm-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-apple-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-arm-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-broadcom-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-cavium-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-exynos-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-freescale-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-hisilicon-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-lg-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-marvell-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-mediatek-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-nvidia-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-qcom-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-renesas-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-rockchip-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-socionext-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-sprd-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-xilinx-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-64kb-devel-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-64kb-extra-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-64kb-optional-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-debug-vdso-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.aarch64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.x86_64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.81.3.150600.12.36.3.aarch64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.81.3.150600.12.36.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.81.3.150600.12.36.3.x86_64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-vdso-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-devel-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-docs-6.4.0-150600.23.81.1.noarch",
"openSUSE Leap 15.6:kernel-docs-html-6.4.0-150600.23.81.1.noarch",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-vdso-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-macros-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.s390x",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.x86_64",
"openSUSE Leap 15.6:kernel-source-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-source-vanilla-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.ppc64le",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.s390x",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.x86_64",
"openSUSE Leap 15.6:kernel-zfcpdump-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kselftests-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_81-default-1-150600.13.3.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_81-default-1-150600.13.3.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_81-default-1-150600.13.3.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-64kb-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-64kb-devel-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-devel-6.4.0-150600.23.81.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-macros-6.4.0-150600.23.81.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-zfcpdump-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-docs-6.4.0-150600.23.81.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-source-6.4.0-150600.23.81.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP6:kernel-default-extra-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:dlm-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:dtb-allwinner-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-altera-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-amazon-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-amd-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-amlogic-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-apm-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-apple-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-arm-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-broadcom-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-cavium-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-exynos-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-freescale-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-hisilicon-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-lg-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-marvell-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-mediatek-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-nvidia-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-qcom-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-renesas-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-rockchip-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-socionext-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-sprd-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-xilinx-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-64kb-devel-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-64kb-extra-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-64kb-optional-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-debug-vdso-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.aarch64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.x86_64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.81.3.150600.12.36.3.aarch64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.81.3.150600.12.36.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.81.3.150600.12.36.3.x86_64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-vdso-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-devel-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-docs-6.4.0-150600.23.81.1.noarch",
"openSUSE Leap 15.6:kernel-docs-html-6.4.0-150600.23.81.1.noarch",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-vdso-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-macros-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.s390x",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.x86_64",
"openSUSE Leap 15.6:kernel-source-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-source-vanilla-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.ppc64le",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.s390x",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.x86_64",
"openSUSE Leap 15.6:kernel-zfcpdump-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kselftests-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-17T10:52:47Z",
"details": "moderate"
}
],
"title": "CVE-2025-40116"
},
{
"cve": "CVE-2025-40118",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40118"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nscsi: pm80xx: Fix array-index-out-of-of-bounds on rmmod\n\nSince commit f7b705c238d1 (\"scsi: pm80xx: Set phy_attached to zero when\ndevice is gone\") UBSAN reports:\n\n UBSAN: array-index-out-of-bounds in drivers/scsi/pm8001/pm8001_sas.c:786:17\n index 28 is out of range for type \u0027pm8001_phy [16]\u0027\n\non rmmod when using an expander.\n\nFor a direct attached device, attached_phy contains the local phy id.\nFor a device behind an expander, attached_phy contains the remote phy\nid, not the local phy id.\n\nI.e. while pm8001_ha will have pm8001_ha-\u003echip-\u003en_phy local phys, for a\ndevice behind an expander, attached_phy can be much larger than\npm8001_ha-\u003echip-\u003en_phy (depending on the amount of phys of the\nexpander).\n\nE.g. on my system pm8001_ha has 8 phys with phy ids 0-7. One of the\nports has an expander connected. The expander has 31 phys with phy ids\n0-30.\n\nThe pm8001_ha-\u003ephy array only contains the phys of the HBA. It does not\ncontain the phys of the expander. Thus, it is wrong to use attached_phy\nto index the pm8001_ha-\u003ephy array for a device behind an expander.\n\nThus, we can only clear phy_attached for devices that are directly\nattached.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_81-default-1-150600.13.3.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_81-default-1-150600.13.3.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_81-default-1-150600.13.3.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-64kb-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-64kb-devel-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-devel-6.4.0-150600.23.81.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-macros-6.4.0-150600.23.81.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-zfcpdump-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-docs-6.4.0-150600.23.81.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-source-6.4.0-150600.23.81.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP6:kernel-default-extra-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:dlm-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:dtb-allwinner-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-altera-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-amazon-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-amd-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-amlogic-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-apm-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-apple-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-arm-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-broadcom-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-cavium-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-exynos-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-freescale-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-hisilicon-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-lg-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-marvell-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-mediatek-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-nvidia-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-qcom-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-renesas-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-rockchip-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-socionext-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-sprd-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-xilinx-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-64kb-devel-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-64kb-extra-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-64kb-optional-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-debug-vdso-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.aarch64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.x86_64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.81.3.150600.12.36.3.aarch64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.81.3.150600.12.36.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.81.3.150600.12.36.3.x86_64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-vdso-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-devel-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-docs-6.4.0-150600.23.81.1.noarch",
"openSUSE Leap 15.6:kernel-docs-html-6.4.0-150600.23.81.1.noarch",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-vdso-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-macros-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.s390x",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.x86_64",
"openSUSE Leap 15.6:kernel-source-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-source-vanilla-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.ppc64le",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.s390x",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.x86_64",
"openSUSE Leap 15.6:kernel-zfcpdump-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kselftests-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40118",
"url": "https://www.suse.com/security/cve/CVE-2025-40118"
},
{
"category": "external",
"summary": "SUSE Bug 1253363 for CVE-2025-40118",
"url": "https://bugzilla.suse.com/1253363"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_81-default-1-150600.13.3.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_81-default-1-150600.13.3.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_81-default-1-150600.13.3.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-64kb-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-64kb-devel-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-devel-6.4.0-150600.23.81.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-macros-6.4.0-150600.23.81.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-zfcpdump-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-docs-6.4.0-150600.23.81.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-source-6.4.0-150600.23.81.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP6:kernel-default-extra-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:dlm-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:dtb-allwinner-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-altera-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-amazon-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-amd-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-amlogic-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-apm-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-apple-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-arm-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-broadcom-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-cavium-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-exynos-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-freescale-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-hisilicon-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-lg-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-marvell-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-mediatek-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-nvidia-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-qcom-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-renesas-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-rockchip-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-socionext-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-sprd-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-xilinx-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-64kb-devel-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-64kb-extra-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-64kb-optional-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-debug-vdso-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.aarch64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.x86_64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.81.3.150600.12.36.3.aarch64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.81.3.150600.12.36.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.81.3.150600.12.36.3.x86_64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-vdso-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-devel-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-docs-6.4.0-150600.23.81.1.noarch",
"openSUSE Leap 15.6:kernel-docs-html-6.4.0-150600.23.81.1.noarch",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-vdso-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-macros-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.s390x",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.x86_64",
"openSUSE Leap 15.6:kernel-source-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-source-vanilla-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.ppc64le",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.s390x",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.x86_64",
"openSUSE Leap 15.6:kernel-zfcpdump-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kselftests-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.1,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_81-default-1-150600.13.3.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_81-default-1-150600.13.3.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_81-default-1-150600.13.3.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-64kb-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-64kb-devel-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-devel-6.4.0-150600.23.81.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-macros-6.4.0-150600.23.81.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-zfcpdump-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-docs-6.4.0-150600.23.81.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-source-6.4.0-150600.23.81.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP6:kernel-default-extra-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:dlm-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:dtb-allwinner-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-altera-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-amazon-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-amd-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-amlogic-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-apm-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-apple-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-arm-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-broadcom-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-cavium-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-exynos-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-freescale-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-hisilicon-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-lg-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-marvell-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-mediatek-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-nvidia-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-qcom-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-renesas-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-rockchip-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-socionext-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-sprd-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-xilinx-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-64kb-devel-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-64kb-extra-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-64kb-optional-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-debug-vdso-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.aarch64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.x86_64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.81.3.150600.12.36.3.aarch64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.81.3.150600.12.36.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.81.3.150600.12.36.3.x86_64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-vdso-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-devel-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-docs-6.4.0-150600.23.81.1.noarch",
"openSUSE Leap 15.6:kernel-docs-html-6.4.0-150600.23.81.1.noarch",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-vdso-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-macros-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.s390x",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.x86_64",
"openSUSE Leap 15.6:kernel-source-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-source-vanilla-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.ppc64le",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.s390x",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.x86_64",
"openSUSE Leap 15.6:kernel-zfcpdump-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kselftests-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-17T10:52:47Z",
"details": "moderate"
}
],
"title": "CVE-2025-40118"
},
{
"cve": "CVE-2025-40120",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40120"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnet: usb: asix: hold PM usage ref to avoid PM/MDIO + RTNL deadlock\n\nPrevent USB runtime PM (autosuspend) for AX88772* in bind.\n\nusbnet enables runtime PM (autosuspend) by default, so disabling it via\nthe usb_driver flag is ineffective. On AX88772B, autosuspend shows no\nmeasurable power saving with current driver (no link partner, admin\nup/down). The ~0.453 W -\u003e ~0.248 W drop on v6.1 comes from phylib powering\nthe PHY off on admin-down, not from USB autosuspend.\n\nThe real hazard is that with runtime PM enabled, ndo_open() (under RTNL)\nmay synchronously trigger autoresume (usb_autopm_get_interface()) into\nasix_resume() while the USB PM lock is held. Resume paths then invoke\nphylink/phylib and MDIO, which also expect RTNL, leading to possible\ndeadlocks or PM lock vs MDIO wake issues.\n\nTo avoid this, keep the device runtime-PM active by taking a usage\nreference in ax88772_bind() and dropping it in unbind(). A non-zero PM\nusage count blocks runtime suspend regardless of userspace policy\n(.../power/control - pm_runtime_allow/forbid), making this approach\nrobust against sysfs overrides.\n\nHolding a runtime-PM usage ref does not affect system-wide suspend;\nsystem sleep/resume callbacks continue to run as before.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_81-default-1-150600.13.3.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_81-default-1-150600.13.3.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_81-default-1-150600.13.3.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-64kb-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-64kb-devel-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-devel-6.4.0-150600.23.81.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-macros-6.4.0-150600.23.81.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-zfcpdump-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-docs-6.4.0-150600.23.81.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-source-6.4.0-150600.23.81.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP6:kernel-default-extra-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:dlm-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:dtb-allwinner-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-altera-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-amazon-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-amd-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-amlogic-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-apm-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-apple-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-arm-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-broadcom-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-cavium-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-exynos-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-freescale-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-hisilicon-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-lg-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-marvell-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-mediatek-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-nvidia-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-qcom-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-renesas-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-rockchip-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-socionext-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-sprd-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-xilinx-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-64kb-devel-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-64kb-extra-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-64kb-optional-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-debug-vdso-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.aarch64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.x86_64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.81.3.150600.12.36.3.aarch64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.81.3.150600.12.36.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.81.3.150600.12.36.3.x86_64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-vdso-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-devel-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-docs-6.4.0-150600.23.81.1.noarch",
"openSUSE Leap 15.6:kernel-docs-html-6.4.0-150600.23.81.1.noarch",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-vdso-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-macros-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.s390x",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.x86_64",
"openSUSE Leap 15.6:kernel-source-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-source-vanilla-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.ppc64le",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.s390x",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.x86_64",
"openSUSE Leap 15.6:kernel-zfcpdump-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kselftests-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40120",
"url": "https://www.suse.com/security/cve/CVE-2025-40120"
},
{
"category": "external",
"summary": "SUSE Bug 1253360 for CVE-2025-40120",
"url": "https://bugzilla.suse.com/1253360"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_81-default-1-150600.13.3.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_81-default-1-150600.13.3.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_81-default-1-150600.13.3.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-64kb-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-64kb-devel-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-devel-6.4.0-150600.23.81.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-macros-6.4.0-150600.23.81.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-zfcpdump-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-docs-6.4.0-150600.23.81.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-source-6.4.0-150600.23.81.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP6:kernel-default-extra-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:dlm-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:dtb-allwinner-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-altera-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-amazon-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-amd-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-amlogic-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-apm-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-apple-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-arm-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-broadcom-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-cavium-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-exynos-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-freescale-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-hisilicon-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-lg-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-marvell-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-mediatek-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-nvidia-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-qcom-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-renesas-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-rockchip-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-socionext-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-sprd-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-xilinx-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-64kb-devel-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-64kb-extra-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-64kb-optional-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-debug-vdso-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.aarch64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.x86_64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.81.3.150600.12.36.3.aarch64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.81.3.150600.12.36.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.81.3.150600.12.36.3.x86_64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-vdso-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-devel-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-docs-6.4.0-150600.23.81.1.noarch",
"openSUSE Leap 15.6:kernel-docs-html-6.4.0-150600.23.81.1.noarch",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-vdso-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-macros-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.s390x",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.x86_64",
"openSUSE Leap 15.6:kernel-source-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-source-vanilla-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.ppc64le",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.s390x",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.x86_64",
"openSUSE Leap 15.6:kernel-zfcpdump-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kselftests-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_81-default-1-150600.13.3.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_81-default-1-150600.13.3.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_81-default-1-150600.13.3.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-64kb-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-64kb-devel-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-devel-6.4.0-150600.23.81.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-macros-6.4.0-150600.23.81.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-zfcpdump-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-docs-6.4.0-150600.23.81.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-source-6.4.0-150600.23.81.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP6:kernel-default-extra-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:dlm-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:dtb-allwinner-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-altera-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-amazon-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-amd-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-amlogic-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-apm-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-apple-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-arm-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-broadcom-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-cavium-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-exynos-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-freescale-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-hisilicon-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-lg-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-marvell-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-mediatek-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-nvidia-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-qcom-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-renesas-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-rockchip-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-socionext-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-sprd-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-xilinx-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-64kb-devel-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-64kb-extra-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-64kb-optional-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-debug-vdso-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.aarch64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.x86_64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.81.3.150600.12.36.3.aarch64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.81.3.150600.12.36.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.81.3.150600.12.36.3.x86_64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-vdso-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-devel-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-docs-6.4.0-150600.23.81.1.noarch",
"openSUSE Leap 15.6:kernel-docs-html-6.4.0-150600.23.81.1.noarch",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-vdso-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-macros-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.s390x",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.x86_64",
"openSUSE Leap 15.6:kernel-source-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-source-vanilla-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.ppc64le",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.s390x",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.x86_64",
"openSUSE Leap 15.6:kernel-zfcpdump-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kselftests-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-17T10:52:47Z",
"details": "moderate"
}
],
"title": "CVE-2025-40120"
},
{
"cve": "CVE-2025-40121",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40121"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nASoC: Intel: bytcr_rt5651: Fix invalid quirk input mapping\n\nWhen an invalid value is passed via quirk option, currently\nbytcr_rt5640 driver just ignores and leaves as is, which may lead to\nunepxected results like OOB access.\n\nThis patch adds the sanity check and corrects the input mapping to the\ncertain default value if an invalid value is passed.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_81-default-1-150600.13.3.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_81-default-1-150600.13.3.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_81-default-1-150600.13.3.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-64kb-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-64kb-devel-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-devel-6.4.0-150600.23.81.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-macros-6.4.0-150600.23.81.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-zfcpdump-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-docs-6.4.0-150600.23.81.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-source-6.4.0-150600.23.81.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP6:kernel-default-extra-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:dlm-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:dtb-allwinner-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-altera-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-amazon-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-amd-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-amlogic-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-apm-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-apple-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-arm-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-broadcom-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-cavium-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-exynos-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-freescale-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-hisilicon-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-lg-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-marvell-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-mediatek-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-nvidia-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-qcom-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-renesas-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-rockchip-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-socionext-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-sprd-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-xilinx-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-64kb-devel-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-64kb-extra-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-64kb-optional-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-debug-vdso-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.aarch64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.x86_64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.81.3.150600.12.36.3.aarch64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.81.3.150600.12.36.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.81.3.150600.12.36.3.x86_64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-vdso-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-devel-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-docs-6.4.0-150600.23.81.1.noarch",
"openSUSE Leap 15.6:kernel-docs-html-6.4.0-150600.23.81.1.noarch",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-vdso-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-macros-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.s390x",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.x86_64",
"openSUSE Leap 15.6:kernel-source-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-source-vanilla-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.ppc64le",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.s390x",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.x86_64",
"openSUSE Leap 15.6:kernel-zfcpdump-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kselftests-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40121",
"url": "https://www.suse.com/security/cve/CVE-2025-40121"
},
{
"category": "external",
"summary": "SUSE Bug 1253367 for CVE-2025-40121",
"url": "https://bugzilla.suse.com/1253367"
},
{
"category": "external",
"summary": "SUSE Bug 1253430 for CVE-2025-40121",
"url": "https://bugzilla.suse.com/1253430"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_81-default-1-150600.13.3.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_81-default-1-150600.13.3.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_81-default-1-150600.13.3.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-64kb-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-64kb-devel-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-devel-6.4.0-150600.23.81.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-macros-6.4.0-150600.23.81.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-zfcpdump-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-docs-6.4.0-150600.23.81.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-source-6.4.0-150600.23.81.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP6:kernel-default-extra-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:dlm-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:dtb-allwinner-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-altera-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-amazon-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-amd-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-amlogic-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-apm-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-apple-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-arm-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-broadcom-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-cavium-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-exynos-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-freescale-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-hisilicon-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-lg-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-marvell-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-mediatek-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-nvidia-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-qcom-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-renesas-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-rockchip-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-socionext-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-sprd-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-xilinx-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-64kb-devel-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-64kb-extra-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-64kb-optional-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-debug-vdso-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.aarch64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.x86_64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.81.3.150600.12.36.3.aarch64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.81.3.150600.12.36.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.81.3.150600.12.36.3.x86_64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-vdso-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-devel-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-docs-6.4.0-150600.23.81.1.noarch",
"openSUSE Leap 15.6:kernel-docs-html-6.4.0-150600.23.81.1.noarch",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-vdso-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-macros-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.s390x",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.x86_64",
"openSUSE Leap 15.6:kernel-source-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-source-vanilla-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.ppc64le",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.s390x",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.x86_64",
"openSUSE Leap 15.6:kernel-zfcpdump-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kselftests-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_81-default-1-150600.13.3.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_81-default-1-150600.13.3.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_81-default-1-150600.13.3.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-64kb-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-64kb-devel-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-devel-6.4.0-150600.23.81.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-macros-6.4.0-150600.23.81.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-zfcpdump-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-docs-6.4.0-150600.23.81.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-source-6.4.0-150600.23.81.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP6:kernel-default-extra-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:dlm-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:dtb-allwinner-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-altera-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-amazon-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-amd-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-amlogic-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-apm-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-apple-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-arm-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-broadcom-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-cavium-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-exynos-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-freescale-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-hisilicon-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-lg-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-marvell-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-mediatek-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-nvidia-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-qcom-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-renesas-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-rockchip-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-socionext-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-sprd-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-xilinx-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-64kb-devel-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-64kb-extra-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-64kb-optional-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-debug-vdso-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.aarch64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.x86_64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.81.3.150600.12.36.3.aarch64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.81.3.150600.12.36.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.81.3.150600.12.36.3.x86_64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-vdso-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-devel-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-docs-6.4.0-150600.23.81.1.noarch",
"openSUSE Leap 15.6:kernel-docs-html-6.4.0-150600.23.81.1.noarch",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-vdso-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-macros-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.s390x",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.x86_64",
"openSUSE Leap 15.6:kernel-source-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-source-vanilla-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.ppc64le",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.s390x",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.x86_64",
"openSUSE Leap 15.6:kernel-zfcpdump-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kselftests-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-17T10:52:47Z",
"details": "moderate"
}
],
"title": "CVE-2025-40121"
},
{
"cve": "CVE-2025-40127",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40127"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nhwrng: ks-sa - fix division by zero in ks_sa_rng_init\n\nFix division by zero in ks_sa_rng_init caused by missing clock\npointer initialization. The clk_get_rate() call is performed on\nan uninitialized clk pointer, resulting in division by zero when\ncalculating delay values.\n\nAdd clock initialization code before using the clock.\n\n\n drivers/char/hw_random/ks-sa-rng.c | 7 +++++++\n 1 file changed, 7 insertions(+)",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_81-default-1-150600.13.3.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_81-default-1-150600.13.3.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_81-default-1-150600.13.3.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-64kb-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-64kb-devel-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-devel-6.4.0-150600.23.81.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-macros-6.4.0-150600.23.81.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-zfcpdump-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-docs-6.4.0-150600.23.81.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-source-6.4.0-150600.23.81.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP6:kernel-default-extra-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:dlm-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:dtb-allwinner-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-altera-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-amazon-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-amd-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-amlogic-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-apm-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-apple-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-arm-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-broadcom-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-cavium-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-exynos-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-freescale-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-hisilicon-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-lg-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-marvell-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-mediatek-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-nvidia-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-qcom-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-renesas-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-rockchip-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-socionext-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-sprd-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-xilinx-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-64kb-devel-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-64kb-extra-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-64kb-optional-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-debug-vdso-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.aarch64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.x86_64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.81.3.150600.12.36.3.aarch64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.81.3.150600.12.36.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.81.3.150600.12.36.3.x86_64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-vdso-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-devel-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-docs-6.4.0-150600.23.81.1.noarch",
"openSUSE Leap 15.6:kernel-docs-html-6.4.0-150600.23.81.1.noarch",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-vdso-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-macros-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.s390x",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.x86_64",
"openSUSE Leap 15.6:kernel-source-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-source-vanilla-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.ppc64le",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.s390x",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.x86_64",
"openSUSE Leap 15.6:kernel-zfcpdump-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kselftests-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40127",
"url": "https://www.suse.com/security/cve/CVE-2025-40127"
},
{
"category": "external",
"summary": "SUSE Bug 1253369 for CVE-2025-40127",
"url": "https://bugzilla.suse.com/1253369"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_81-default-1-150600.13.3.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_81-default-1-150600.13.3.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_81-default-1-150600.13.3.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-64kb-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-64kb-devel-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-devel-6.4.0-150600.23.81.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-macros-6.4.0-150600.23.81.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-zfcpdump-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-docs-6.4.0-150600.23.81.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-source-6.4.0-150600.23.81.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP6:kernel-default-extra-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:dlm-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:dtb-allwinner-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-altera-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-amazon-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-amd-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-amlogic-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-apm-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-apple-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-arm-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-broadcom-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-cavium-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-exynos-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-freescale-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-hisilicon-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-lg-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-marvell-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-mediatek-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-nvidia-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-qcom-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-renesas-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-rockchip-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-socionext-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-sprd-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-xilinx-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-64kb-devel-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-64kb-extra-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-64kb-optional-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-debug-vdso-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.aarch64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.x86_64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.81.3.150600.12.36.3.aarch64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.81.3.150600.12.36.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.81.3.150600.12.36.3.x86_64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-vdso-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-devel-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-docs-6.4.0-150600.23.81.1.noarch",
"openSUSE Leap 15.6:kernel-docs-html-6.4.0-150600.23.81.1.noarch",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-vdso-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-macros-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.s390x",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.x86_64",
"openSUSE Leap 15.6:kernel-source-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-source-vanilla-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.ppc64le",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.s390x",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.x86_64",
"openSUSE Leap 15.6:kernel-zfcpdump-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kselftests-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_81-default-1-150600.13.3.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_81-default-1-150600.13.3.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_81-default-1-150600.13.3.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-64kb-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-64kb-devel-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-devel-6.4.0-150600.23.81.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-macros-6.4.0-150600.23.81.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-zfcpdump-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-docs-6.4.0-150600.23.81.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-source-6.4.0-150600.23.81.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP6:kernel-default-extra-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:dlm-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:dtb-allwinner-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-altera-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-amazon-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-amd-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-amlogic-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-apm-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-apple-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-arm-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-broadcom-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-cavium-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-exynos-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-freescale-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-hisilicon-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-lg-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-marvell-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-mediatek-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-nvidia-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-qcom-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-renesas-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-rockchip-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-socionext-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-sprd-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-xilinx-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-64kb-devel-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-64kb-extra-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-64kb-optional-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-debug-vdso-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.aarch64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.x86_64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.81.3.150600.12.36.3.aarch64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.81.3.150600.12.36.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.81.3.150600.12.36.3.x86_64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-vdso-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-devel-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-docs-6.4.0-150600.23.81.1.noarch",
"openSUSE Leap 15.6:kernel-docs-html-6.4.0-150600.23.81.1.noarch",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-vdso-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-macros-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.s390x",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.x86_64",
"openSUSE Leap 15.6:kernel-source-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-source-vanilla-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.ppc64le",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.s390x",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.x86_64",
"openSUSE Leap 15.6:kernel-zfcpdump-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kselftests-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-17T10:52:47Z",
"details": "moderate"
}
],
"title": "CVE-2025-40127"
},
{
"cve": "CVE-2025-40129",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40129"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nsunrpc: fix null pointer dereference on zero-length checksum\n\nIn xdr_stream_decode_opaque_auth(), zero-length checksum.len causes\nchecksum.data to be set to NULL. This triggers a NPD when accessing\nchecksum.data in gss_krb5_verify_mic_v2(). This patch ensures that\nthe value of checksum.len is not less than XDR_UNIT.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_81-default-1-150600.13.3.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_81-default-1-150600.13.3.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_81-default-1-150600.13.3.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-64kb-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-64kb-devel-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-devel-6.4.0-150600.23.81.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-macros-6.4.0-150600.23.81.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-zfcpdump-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-docs-6.4.0-150600.23.81.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-source-6.4.0-150600.23.81.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP6:kernel-default-extra-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:dlm-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:dtb-allwinner-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-altera-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-amazon-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-amd-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-amlogic-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-apm-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-apple-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-arm-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-broadcom-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-cavium-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-exynos-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-freescale-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-hisilicon-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-lg-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-marvell-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-mediatek-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-nvidia-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-qcom-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-renesas-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-rockchip-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-socionext-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-sprd-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-xilinx-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-64kb-devel-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-64kb-extra-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-64kb-optional-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-debug-vdso-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.aarch64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.x86_64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.81.3.150600.12.36.3.aarch64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.81.3.150600.12.36.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.81.3.150600.12.36.3.x86_64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-vdso-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-devel-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-docs-6.4.0-150600.23.81.1.noarch",
"openSUSE Leap 15.6:kernel-docs-html-6.4.0-150600.23.81.1.noarch",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-vdso-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-macros-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.s390x",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.x86_64",
"openSUSE Leap 15.6:kernel-source-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-source-vanilla-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.ppc64le",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.s390x",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.x86_64",
"openSUSE Leap 15.6:kernel-zfcpdump-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kselftests-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40129",
"url": "https://www.suse.com/security/cve/CVE-2025-40129"
},
{
"category": "external",
"summary": "SUSE Bug 1253472 for CVE-2025-40129",
"url": "https://bugzilla.suse.com/1253472"
},
{
"category": "external",
"summary": "SUSE Bug 1253473 for CVE-2025-40129",
"url": "https://bugzilla.suse.com/1253473"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_81-default-1-150600.13.3.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_81-default-1-150600.13.3.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_81-default-1-150600.13.3.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-64kb-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-64kb-devel-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-devel-6.4.0-150600.23.81.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-macros-6.4.0-150600.23.81.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-zfcpdump-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-docs-6.4.0-150600.23.81.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-source-6.4.0-150600.23.81.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP6:kernel-default-extra-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:dlm-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:dtb-allwinner-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-altera-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-amazon-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-amd-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-amlogic-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-apm-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-apple-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-arm-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-broadcom-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-cavium-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-exynos-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-freescale-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-hisilicon-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-lg-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-marvell-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-mediatek-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-nvidia-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-qcom-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-renesas-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-rockchip-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-socionext-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-sprd-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-xilinx-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-64kb-devel-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-64kb-extra-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-64kb-optional-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-debug-vdso-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.aarch64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.x86_64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.81.3.150600.12.36.3.aarch64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.81.3.150600.12.36.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.81.3.150600.12.36.3.x86_64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-vdso-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-devel-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-docs-6.4.0-150600.23.81.1.noarch",
"openSUSE Leap 15.6:kernel-docs-html-6.4.0-150600.23.81.1.noarch",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-vdso-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-macros-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.s390x",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.x86_64",
"openSUSE Leap 15.6:kernel-source-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-source-vanilla-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.ppc64le",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.s390x",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.x86_64",
"openSUSE Leap 15.6:kernel-zfcpdump-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kselftests-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_81-default-1-150600.13.3.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_81-default-1-150600.13.3.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_81-default-1-150600.13.3.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-64kb-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-64kb-devel-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-devel-6.4.0-150600.23.81.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-macros-6.4.0-150600.23.81.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-zfcpdump-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-docs-6.4.0-150600.23.81.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-source-6.4.0-150600.23.81.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP6:kernel-default-extra-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:dlm-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:dtb-allwinner-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-altera-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-amazon-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-amd-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-amlogic-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-apm-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-apple-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-arm-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-broadcom-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-cavium-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-exynos-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-freescale-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-hisilicon-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-lg-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-marvell-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-mediatek-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-nvidia-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-qcom-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-renesas-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-rockchip-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-socionext-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-sprd-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-xilinx-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-64kb-devel-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-64kb-extra-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-64kb-optional-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-debug-vdso-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.aarch64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.x86_64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.81.3.150600.12.36.3.aarch64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.81.3.150600.12.36.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.81.3.150600.12.36.3.x86_64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-vdso-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-devel-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-docs-6.4.0-150600.23.81.1.noarch",
"openSUSE Leap 15.6:kernel-docs-html-6.4.0-150600.23.81.1.noarch",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-vdso-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-macros-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.s390x",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.x86_64",
"openSUSE Leap 15.6:kernel-source-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-source-vanilla-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.ppc64le",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.s390x",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.x86_64",
"openSUSE Leap 15.6:kernel-zfcpdump-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kselftests-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-17T10:52:47Z",
"details": "important"
}
],
"title": "CVE-2025-40129"
},
{
"cve": "CVE-2025-40139",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40139"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nsmc: Use __sk_dst_get() and dst_dev_rcu() in in smc_clc_prfx_set().\n\nsmc_clc_prfx_set() is called during connect() and not under RCU\nnor RTNL.\n\nUsing sk_dst_get(sk)-\u003edev could trigger UAF.\n\nLet\u0027s use __sk_dst_get() and dev_dst_rcu() under rcu_read_lock()\nafter kernel_getsockname().\n\nNote that the returned value of smc_clc_prfx_set() is not used\nin the caller.\n\nWhile at it, we change the 1st arg of smc_clc_prfx_set[46]_rcu()\nnot to touch dst there.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_81-default-1-150600.13.3.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_81-default-1-150600.13.3.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_81-default-1-150600.13.3.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-64kb-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-64kb-devel-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-devel-6.4.0-150600.23.81.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-macros-6.4.0-150600.23.81.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-zfcpdump-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-docs-6.4.0-150600.23.81.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-source-6.4.0-150600.23.81.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP6:kernel-default-extra-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:dlm-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:dtb-allwinner-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-altera-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-amazon-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-amd-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-amlogic-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-apm-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-apple-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-arm-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-broadcom-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-cavium-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-exynos-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-freescale-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-hisilicon-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-lg-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-marvell-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-mediatek-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-nvidia-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-qcom-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-renesas-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-rockchip-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-socionext-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-sprd-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-xilinx-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-64kb-devel-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-64kb-extra-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-64kb-optional-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-debug-vdso-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.aarch64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.x86_64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.81.3.150600.12.36.3.aarch64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.81.3.150600.12.36.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.81.3.150600.12.36.3.x86_64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-vdso-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-devel-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-docs-6.4.0-150600.23.81.1.noarch",
"openSUSE Leap 15.6:kernel-docs-html-6.4.0-150600.23.81.1.noarch",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-vdso-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-macros-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.s390x",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.x86_64",
"openSUSE Leap 15.6:kernel-source-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-source-vanilla-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.ppc64le",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.s390x",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.x86_64",
"openSUSE Leap 15.6:kernel-zfcpdump-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kselftests-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40139",
"url": "https://www.suse.com/security/cve/CVE-2025-40139"
},
{
"category": "external",
"summary": "SUSE Bug 1253409 for CVE-2025-40139",
"url": "https://bugzilla.suse.com/1253409"
},
{
"category": "external",
"summary": "SUSE Bug 1253411 for CVE-2025-40139",
"url": "https://bugzilla.suse.com/1253411"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_81-default-1-150600.13.3.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_81-default-1-150600.13.3.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_81-default-1-150600.13.3.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-64kb-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-64kb-devel-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-devel-6.4.0-150600.23.81.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-macros-6.4.0-150600.23.81.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-zfcpdump-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-docs-6.4.0-150600.23.81.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-source-6.4.0-150600.23.81.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP6:kernel-default-extra-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:dlm-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:dtb-allwinner-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-altera-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-amazon-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-amd-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-amlogic-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-apm-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-apple-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-arm-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-broadcom-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-cavium-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-exynos-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-freescale-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-hisilicon-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-lg-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-marvell-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-mediatek-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-nvidia-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-qcom-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-renesas-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-rockchip-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-socionext-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-sprd-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-xilinx-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-64kb-devel-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-64kb-extra-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-64kb-optional-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-debug-vdso-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.aarch64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.x86_64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.81.3.150600.12.36.3.aarch64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.81.3.150600.12.36.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.81.3.150600.12.36.3.x86_64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-vdso-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-devel-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-docs-6.4.0-150600.23.81.1.noarch",
"openSUSE Leap 15.6:kernel-docs-html-6.4.0-150600.23.81.1.noarch",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-vdso-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-macros-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.s390x",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.x86_64",
"openSUSE Leap 15.6:kernel-source-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-source-vanilla-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.ppc64le",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.s390x",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.x86_64",
"openSUSE Leap 15.6:kernel-zfcpdump-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kselftests-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_81-default-1-150600.13.3.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_81-default-1-150600.13.3.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_81-default-1-150600.13.3.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-64kb-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-64kb-devel-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-devel-6.4.0-150600.23.81.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-macros-6.4.0-150600.23.81.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-zfcpdump-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-docs-6.4.0-150600.23.81.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-source-6.4.0-150600.23.81.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP6:kernel-default-extra-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:dlm-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:dtb-allwinner-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-altera-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-amazon-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-amd-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-amlogic-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-apm-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-apple-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-arm-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-broadcom-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-cavium-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-exynos-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-freescale-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-hisilicon-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-lg-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-marvell-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-mediatek-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-nvidia-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-qcom-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-renesas-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-rockchip-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-socionext-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-sprd-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-xilinx-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-64kb-devel-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-64kb-extra-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-64kb-optional-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-debug-vdso-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.aarch64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.x86_64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.81.3.150600.12.36.3.aarch64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.81.3.150600.12.36.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.81.3.150600.12.36.3.x86_64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-vdso-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-devel-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-docs-6.4.0-150600.23.81.1.noarch",
"openSUSE Leap 15.6:kernel-docs-html-6.4.0-150600.23.81.1.noarch",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-vdso-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-macros-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.s390x",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.x86_64",
"openSUSE Leap 15.6:kernel-source-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-source-vanilla-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.ppc64le",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.s390x",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.x86_64",
"openSUSE Leap 15.6:kernel-zfcpdump-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kselftests-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-17T10:52:47Z",
"details": "important"
}
],
"title": "CVE-2025-40139"
},
{
"cve": "CVE-2025-40140",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40140"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnet: usb: Remove disruptive netif_wake_queue in rtl8150_set_multicast\n\nsyzbot reported WARNING in rtl8150_start_xmit/usb_submit_urb.\nThis is the sequence of events that leads to the warning:\n\nrtl8150_start_xmit() {\n\tnetif_stop_queue();\n\tusb_submit_urb(dev-\u003etx_urb);\n}\n\nrtl8150_set_multicast() {\n\tnetif_stop_queue();\n\tnetif_wake_queue();\t\t\u003c-- wakes up TX queue before URB is done\n}\n\nrtl8150_start_xmit() {\n\tnetif_stop_queue();\n\tusb_submit_urb(dev-\u003etx_urb);\t\u003c-- double submission\n}\n\nrtl8150_set_multicast being the ndo_set_rx_mode callback should not be\ncalling netif_stop_queue and notif_start_queue as these handle\nTX queue synchronization.\n\nThe net core function dev_set_rx_mode handles the synchronization\nfor rtl8150_set_multicast making it safe to remove these locks.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_81-default-1-150600.13.3.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_81-default-1-150600.13.3.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_81-default-1-150600.13.3.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-64kb-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-64kb-devel-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-devel-6.4.0-150600.23.81.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-macros-6.4.0-150600.23.81.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-zfcpdump-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-docs-6.4.0-150600.23.81.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-source-6.4.0-150600.23.81.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP6:kernel-default-extra-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:dlm-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:dtb-allwinner-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-altera-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-amazon-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-amd-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-amlogic-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-apm-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-apple-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-arm-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-broadcom-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-cavium-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-exynos-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-freescale-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-hisilicon-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-lg-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-marvell-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-mediatek-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-nvidia-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-qcom-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-renesas-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-rockchip-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-socionext-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-sprd-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-xilinx-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-64kb-devel-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-64kb-extra-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-64kb-optional-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-debug-vdso-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.aarch64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.x86_64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.81.3.150600.12.36.3.aarch64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.81.3.150600.12.36.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.81.3.150600.12.36.3.x86_64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-vdso-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-devel-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-docs-6.4.0-150600.23.81.1.noarch",
"openSUSE Leap 15.6:kernel-docs-html-6.4.0-150600.23.81.1.noarch",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-vdso-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-macros-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.s390x",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.x86_64",
"openSUSE Leap 15.6:kernel-source-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-source-vanilla-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.ppc64le",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.s390x",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.x86_64",
"openSUSE Leap 15.6:kernel-zfcpdump-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kselftests-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40140",
"url": "https://www.suse.com/security/cve/CVE-2025-40140"
},
{
"category": "external",
"summary": "SUSE Bug 1253349 for CVE-2025-40140",
"url": "https://bugzilla.suse.com/1253349"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_81-default-1-150600.13.3.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_81-default-1-150600.13.3.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_81-default-1-150600.13.3.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-64kb-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-64kb-devel-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-devel-6.4.0-150600.23.81.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-macros-6.4.0-150600.23.81.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-zfcpdump-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-docs-6.4.0-150600.23.81.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-source-6.4.0-150600.23.81.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP6:kernel-default-extra-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:dlm-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:dtb-allwinner-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-altera-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-amazon-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-amd-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-amlogic-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-apm-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-apple-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-arm-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-broadcom-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-cavium-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-exynos-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-freescale-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-hisilicon-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-lg-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-marvell-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-mediatek-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-nvidia-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-qcom-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-renesas-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-rockchip-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-socionext-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-sprd-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-xilinx-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-64kb-devel-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-64kb-extra-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-64kb-optional-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-debug-vdso-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.aarch64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.x86_64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.81.3.150600.12.36.3.aarch64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.81.3.150600.12.36.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.81.3.150600.12.36.3.x86_64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-vdso-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-devel-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-docs-6.4.0-150600.23.81.1.noarch",
"openSUSE Leap 15.6:kernel-docs-html-6.4.0-150600.23.81.1.noarch",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-vdso-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-macros-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.s390x",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.x86_64",
"openSUSE Leap 15.6:kernel-source-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-source-vanilla-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.ppc64le",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.s390x",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.x86_64",
"openSUSE Leap 15.6:kernel-zfcpdump-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kselftests-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.3,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_81-default-1-150600.13.3.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_81-default-1-150600.13.3.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_81-default-1-150600.13.3.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-64kb-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-64kb-devel-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-devel-6.4.0-150600.23.81.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-macros-6.4.0-150600.23.81.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-zfcpdump-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-docs-6.4.0-150600.23.81.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-source-6.4.0-150600.23.81.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP6:kernel-default-extra-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:dlm-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:dtb-allwinner-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-altera-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-amazon-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-amd-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-amlogic-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-apm-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-apple-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-arm-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-broadcom-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-cavium-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-exynos-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-freescale-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-hisilicon-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-lg-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-marvell-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-mediatek-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-nvidia-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-qcom-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-renesas-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-rockchip-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-socionext-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-sprd-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-xilinx-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-64kb-devel-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-64kb-extra-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-64kb-optional-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-debug-vdso-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.aarch64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.x86_64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.81.3.150600.12.36.3.aarch64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.81.3.150600.12.36.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.81.3.150600.12.36.3.x86_64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-vdso-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-devel-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-docs-6.4.0-150600.23.81.1.noarch",
"openSUSE Leap 15.6:kernel-docs-html-6.4.0-150600.23.81.1.noarch",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-vdso-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-macros-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.s390x",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.x86_64",
"openSUSE Leap 15.6:kernel-source-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-source-vanilla-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.ppc64le",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.s390x",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.x86_64",
"openSUSE Leap 15.6:kernel-zfcpdump-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kselftests-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-17T10:52:47Z",
"details": "low"
}
],
"title": "CVE-2025-40140"
},
{
"cve": "CVE-2025-40141",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40141"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nBluetooth: ISO: Fix possible UAF on iso_conn_free\n\nThis attempt to fix similar issue to sco_conn_free where if the\nconn-\u003esk is not set to NULL may lead to UAF on iso_conn_free.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_81-default-1-150600.13.3.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_81-default-1-150600.13.3.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_81-default-1-150600.13.3.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-64kb-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-64kb-devel-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-devel-6.4.0-150600.23.81.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-macros-6.4.0-150600.23.81.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-zfcpdump-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-docs-6.4.0-150600.23.81.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-source-6.4.0-150600.23.81.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP6:kernel-default-extra-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:dlm-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:dtb-allwinner-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-altera-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-amazon-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-amd-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-amlogic-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-apm-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-apple-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-arm-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-broadcom-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-cavium-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-exynos-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-freescale-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-hisilicon-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-lg-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-marvell-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-mediatek-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-nvidia-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-qcom-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-renesas-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-rockchip-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-socionext-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-sprd-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-xilinx-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-64kb-devel-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-64kb-extra-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-64kb-optional-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-debug-vdso-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.aarch64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.x86_64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.81.3.150600.12.36.3.aarch64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.81.3.150600.12.36.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.81.3.150600.12.36.3.x86_64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-vdso-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-devel-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-docs-6.4.0-150600.23.81.1.noarch",
"openSUSE Leap 15.6:kernel-docs-html-6.4.0-150600.23.81.1.noarch",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-vdso-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-macros-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.s390x",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.x86_64",
"openSUSE Leap 15.6:kernel-source-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-source-vanilla-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.ppc64le",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.s390x",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.x86_64",
"openSUSE Leap 15.6:kernel-zfcpdump-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kselftests-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40141",
"url": "https://www.suse.com/security/cve/CVE-2025-40141"
},
{
"category": "external",
"summary": "SUSE Bug 1253352 for CVE-2025-40141",
"url": "https://bugzilla.suse.com/1253352"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_81-default-1-150600.13.3.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_81-default-1-150600.13.3.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_81-default-1-150600.13.3.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-64kb-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-64kb-devel-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-devel-6.4.0-150600.23.81.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-macros-6.4.0-150600.23.81.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-zfcpdump-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-docs-6.4.0-150600.23.81.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-source-6.4.0-150600.23.81.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP6:kernel-default-extra-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:dlm-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:dtb-allwinner-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-altera-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-amazon-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-amd-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-amlogic-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-apm-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-apple-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-arm-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-broadcom-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-cavium-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-exynos-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-freescale-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-hisilicon-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-lg-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-marvell-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-mediatek-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-nvidia-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-qcom-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-renesas-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-rockchip-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-socionext-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-sprd-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-xilinx-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-64kb-devel-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-64kb-extra-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-64kb-optional-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-debug-vdso-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.aarch64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.x86_64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.81.3.150600.12.36.3.aarch64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.81.3.150600.12.36.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.81.3.150600.12.36.3.x86_64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-vdso-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-devel-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-docs-6.4.0-150600.23.81.1.noarch",
"openSUSE Leap 15.6:kernel-docs-html-6.4.0-150600.23.81.1.noarch",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-vdso-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-macros-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.s390x",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.x86_64",
"openSUSE Leap 15.6:kernel-source-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-source-vanilla-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.ppc64le",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.s390x",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.x86_64",
"openSUSE Leap 15.6:kernel-zfcpdump-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kselftests-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_81-default-1-150600.13.3.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_81-default-1-150600.13.3.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_81-default-1-150600.13.3.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-64kb-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-64kb-devel-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-devel-6.4.0-150600.23.81.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-macros-6.4.0-150600.23.81.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-zfcpdump-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-docs-6.4.0-150600.23.81.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-source-6.4.0-150600.23.81.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP6:kernel-default-extra-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:dlm-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:dtb-allwinner-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-altera-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-amazon-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-amd-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-amlogic-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-apm-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-apple-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-arm-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-broadcom-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-cavium-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-exynos-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-freescale-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-hisilicon-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-lg-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-marvell-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-mediatek-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-nvidia-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-qcom-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-renesas-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-rockchip-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-socionext-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-sprd-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-xilinx-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-64kb-devel-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-64kb-extra-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-64kb-optional-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-debug-vdso-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.aarch64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.x86_64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.81.3.150600.12.36.3.aarch64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.81.3.150600.12.36.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.81.3.150600.12.36.3.x86_64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-vdso-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-devel-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-docs-6.4.0-150600.23.81.1.noarch",
"openSUSE Leap 15.6:kernel-docs-html-6.4.0-150600.23.81.1.noarch",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-vdso-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-macros-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.s390x",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.x86_64",
"openSUSE Leap 15.6:kernel-source-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-source-vanilla-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.ppc64le",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.s390x",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.x86_64",
"openSUSE Leap 15.6:kernel-zfcpdump-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kselftests-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-17T10:52:47Z",
"details": "moderate"
}
],
"title": "CVE-2025-40141"
},
{
"cve": "CVE-2025-40149",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40149"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\ntls: Use __sk_dst_get() and dst_dev_rcu() in get_netdev_for_sock().\n\nget_netdev_for_sock() is called during setsockopt(),\nso not under RCU.\n\nUsing sk_dst_get(sk)-\u003edev could trigger UAF.\n\nLet\u0027s use __sk_dst_get() and dst_dev_rcu().\n\nNote that the only -\u003endo_sk_get_lower_dev() user is\nbond_sk_get_lower_dev(), which uses RCU.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_81-default-1-150600.13.3.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_81-default-1-150600.13.3.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_81-default-1-150600.13.3.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-64kb-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-64kb-devel-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-devel-6.4.0-150600.23.81.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-macros-6.4.0-150600.23.81.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-zfcpdump-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-docs-6.4.0-150600.23.81.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-source-6.4.0-150600.23.81.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP6:kernel-default-extra-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:dlm-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:dtb-allwinner-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-altera-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-amazon-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-amd-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-amlogic-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-apm-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-apple-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-arm-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-broadcom-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-cavium-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-exynos-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-freescale-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-hisilicon-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-lg-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-marvell-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-mediatek-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-nvidia-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-qcom-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-renesas-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-rockchip-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-socionext-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-sprd-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-xilinx-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-64kb-devel-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-64kb-extra-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-64kb-optional-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-debug-vdso-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.aarch64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.x86_64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.81.3.150600.12.36.3.aarch64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.81.3.150600.12.36.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.81.3.150600.12.36.3.x86_64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-vdso-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-devel-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-docs-6.4.0-150600.23.81.1.noarch",
"openSUSE Leap 15.6:kernel-docs-html-6.4.0-150600.23.81.1.noarch",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-vdso-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-macros-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.s390x",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.x86_64",
"openSUSE Leap 15.6:kernel-source-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-source-vanilla-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.ppc64le",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.s390x",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.x86_64",
"openSUSE Leap 15.6:kernel-zfcpdump-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kselftests-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40149",
"url": "https://www.suse.com/security/cve/CVE-2025-40149"
},
{
"category": "external",
"summary": "SUSE Bug 1253355 for CVE-2025-40149",
"url": "https://bugzilla.suse.com/1253355"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_81-default-1-150600.13.3.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_81-default-1-150600.13.3.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_81-default-1-150600.13.3.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-64kb-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-64kb-devel-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-devel-6.4.0-150600.23.81.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-macros-6.4.0-150600.23.81.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-zfcpdump-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-docs-6.4.0-150600.23.81.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-source-6.4.0-150600.23.81.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP6:kernel-default-extra-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:dlm-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:dtb-allwinner-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-altera-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-amazon-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-amd-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-amlogic-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-apm-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-apple-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-arm-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-broadcom-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-cavium-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-exynos-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-freescale-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-hisilicon-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-lg-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-marvell-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-mediatek-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-nvidia-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-qcom-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-renesas-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-rockchip-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-socionext-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-sprd-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-xilinx-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-64kb-devel-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-64kb-extra-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-64kb-optional-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-debug-vdso-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.aarch64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.x86_64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.81.3.150600.12.36.3.aarch64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.81.3.150600.12.36.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.81.3.150600.12.36.3.x86_64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-vdso-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-devel-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-docs-6.4.0-150600.23.81.1.noarch",
"openSUSE Leap 15.6:kernel-docs-html-6.4.0-150600.23.81.1.noarch",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-vdso-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-macros-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.s390x",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.x86_64",
"openSUSE Leap 15.6:kernel-source-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-source-vanilla-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.ppc64le",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.s390x",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.x86_64",
"openSUSE Leap 15.6:kernel-zfcpdump-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kselftests-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_81-default-1-150600.13.3.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_81-default-1-150600.13.3.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_81-default-1-150600.13.3.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-64kb-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-64kb-devel-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-devel-6.4.0-150600.23.81.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-macros-6.4.0-150600.23.81.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-zfcpdump-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-docs-6.4.0-150600.23.81.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-source-6.4.0-150600.23.81.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP6:kernel-default-extra-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:dlm-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:dtb-allwinner-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-altera-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-amazon-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-amd-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-amlogic-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-apm-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-apple-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-arm-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-broadcom-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-cavium-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-exynos-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-freescale-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-hisilicon-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-lg-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-marvell-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-mediatek-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-nvidia-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-qcom-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-renesas-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-rockchip-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-socionext-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-sprd-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-xilinx-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-64kb-devel-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-64kb-extra-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-64kb-optional-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-debug-vdso-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.aarch64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.x86_64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.81.3.150600.12.36.3.aarch64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.81.3.150600.12.36.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.81.3.150600.12.36.3.x86_64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-vdso-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-devel-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-docs-6.4.0-150600.23.81.1.noarch",
"openSUSE Leap 15.6:kernel-docs-html-6.4.0-150600.23.81.1.noarch",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-vdso-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-macros-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.s390x",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.x86_64",
"openSUSE Leap 15.6:kernel-source-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-source-vanilla-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.ppc64le",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.s390x",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.x86_64",
"openSUSE Leap 15.6:kernel-zfcpdump-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kselftests-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-17T10:52:47Z",
"details": "moderate"
}
],
"title": "CVE-2025-40149"
},
{
"cve": "CVE-2025-40154",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40154"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nASoC: Intel: bytcr_rt5640: Fix invalid quirk input mapping\n\nWhen an invalid value is passed via quirk option, currently\nbytcr_rt5640 driver only shows an error message but leaves as is.\nThis may lead to unepxected results like OOB access.\n\nThis patch corrects the input mapping to the certain default value if\nan invalid value is passed.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_81-default-1-150600.13.3.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_81-default-1-150600.13.3.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_81-default-1-150600.13.3.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-64kb-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-64kb-devel-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-devel-6.4.0-150600.23.81.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-macros-6.4.0-150600.23.81.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-zfcpdump-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-docs-6.4.0-150600.23.81.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-source-6.4.0-150600.23.81.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP6:kernel-default-extra-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:dlm-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:dtb-allwinner-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-altera-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-amazon-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-amd-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-amlogic-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-apm-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-apple-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-arm-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-broadcom-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-cavium-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-exynos-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-freescale-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-hisilicon-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-lg-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-marvell-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-mediatek-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-nvidia-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-qcom-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-renesas-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-rockchip-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-socionext-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-sprd-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-xilinx-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-64kb-devel-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-64kb-extra-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-64kb-optional-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-debug-vdso-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.aarch64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.x86_64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.81.3.150600.12.36.3.aarch64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.81.3.150600.12.36.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.81.3.150600.12.36.3.x86_64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-vdso-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-devel-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-docs-6.4.0-150600.23.81.1.noarch",
"openSUSE Leap 15.6:kernel-docs-html-6.4.0-150600.23.81.1.noarch",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-vdso-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-macros-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.s390x",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.x86_64",
"openSUSE Leap 15.6:kernel-source-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-source-vanilla-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.ppc64le",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.s390x",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.x86_64",
"openSUSE Leap 15.6:kernel-zfcpdump-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kselftests-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40154",
"url": "https://www.suse.com/security/cve/CVE-2025-40154"
},
{
"category": "external",
"summary": "SUSE Bug 1253431 for CVE-2025-40154",
"url": "https://bugzilla.suse.com/1253431"
},
{
"category": "external",
"summary": "SUSE Bug 1253432 for CVE-2025-40154",
"url": "https://bugzilla.suse.com/1253432"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_81-default-1-150600.13.3.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_81-default-1-150600.13.3.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_81-default-1-150600.13.3.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-64kb-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-64kb-devel-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-devel-6.4.0-150600.23.81.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-macros-6.4.0-150600.23.81.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-zfcpdump-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-docs-6.4.0-150600.23.81.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-source-6.4.0-150600.23.81.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP6:kernel-default-extra-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:dlm-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:dtb-allwinner-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-altera-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-amazon-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-amd-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-amlogic-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-apm-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-apple-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-arm-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-broadcom-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-cavium-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-exynos-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-freescale-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-hisilicon-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-lg-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-marvell-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-mediatek-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-nvidia-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-qcom-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-renesas-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-rockchip-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-socionext-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-sprd-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-xilinx-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-64kb-devel-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-64kb-extra-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-64kb-optional-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-debug-vdso-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.aarch64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.x86_64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.81.3.150600.12.36.3.aarch64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.81.3.150600.12.36.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.81.3.150600.12.36.3.x86_64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-vdso-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-devel-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-docs-6.4.0-150600.23.81.1.noarch",
"openSUSE Leap 15.6:kernel-docs-html-6.4.0-150600.23.81.1.noarch",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-vdso-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-macros-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.s390x",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.x86_64",
"openSUSE Leap 15.6:kernel-source-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-source-vanilla-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.ppc64le",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.s390x",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.x86_64",
"openSUSE Leap 15.6:kernel-zfcpdump-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kselftests-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_81-default-1-150600.13.3.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_81-default-1-150600.13.3.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_81-default-1-150600.13.3.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-64kb-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-64kb-devel-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-devel-6.4.0-150600.23.81.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-macros-6.4.0-150600.23.81.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-zfcpdump-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-docs-6.4.0-150600.23.81.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-source-6.4.0-150600.23.81.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP6:kernel-default-extra-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:dlm-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:dtb-allwinner-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-altera-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-amazon-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-amd-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-amlogic-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-apm-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-apple-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-arm-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-broadcom-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-cavium-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-exynos-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-freescale-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-hisilicon-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-lg-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-marvell-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-mediatek-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-nvidia-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-qcom-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-renesas-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-rockchip-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-socionext-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-sprd-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-xilinx-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-64kb-devel-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-64kb-extra-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-64kb-optional-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-debug-vdso-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.aarch64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.x86_64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.81.3.150600.12.36.3.aarch64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.81.3.150600.12.36.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.81.3.150600.12.36.3.x86_64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-vdso-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-devel-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-docs-6.4.0-150600.23.81.1.noarch",
"openSUSE Leap 15.6:kernel-docs-html-6.4.0-150600.23.81.1.noarch",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-vdso-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-macros-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.s390x",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.x86_64",
"openSUSE Leap 15.6:kernel-source-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-source-vanilla-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.ppc64le",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.s390x",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.x86_64",
"openSUSE Leap 15.6:kernel-zfcpdump-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kselftests-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-17T10:52:47Z",
"details": "moderate"
}
],
"title": "CVE-2025-40154"
},
{
"cve": "CVE-2025-40156",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40156"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nPM / devfreq: mtk-cci: Fix potential error pointer dereference in probe()\n\nThe drv-\u003esram_reg pointer could be set to ERR_PTR(-EPROBE_DEFER) which\nwould lead to a error pointer dereference. Use IS_ERR_OR_NULL() to check\nthat the pointer is valid.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_81-default-1-150600.13.3.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_81-default-1-150600.13.3.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_81-default-1-150600.13.3.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-64kb-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-64kb-devel-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-devel-6.4.0-150600.23.81.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-macros-6.4.0-150600.23.81.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-zfcpdump-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-docs-6.4.0-150600.23.81.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-source-6.4.0-150600.23.81.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP6:kernel-default-extra-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:dlm-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:dtb-allwinner-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-altera-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-amazon-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-amd-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-amlogic-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-apm-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-apple-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-arm-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-broadcom-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-cavium-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-exynos-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-freescale-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-hisilicon-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-lg-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-marvell-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-mediatek-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-nvidia-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-qcom-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-renesas-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-rockchip-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-socionext-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-sprd-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-xilinx-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-64kb-devel-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-64kb-extra-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-64kb-optional-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-debug-vdso-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.aarch64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.x86_64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.81.3.150600.12.36.3.aarch64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.81.3.150600.12.36.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.81.3.150600.12.36.3.x86_64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-vdso-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-devel-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-docs-6.4.0-150600.23.81.1.noarch",
"openSUSE Leap 15.6:kernel-docs-html-6.4.0-150600.23.81.1.noarch",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-vdso-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-macros-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.s390x",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.x86_64",
"openSUSE Leap 15.6:kernel-source-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-source-vanilla-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.ppc64le",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.s390x",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.x86_64",
"openSUSE Leap 15.6:kernel-zfcpdump-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kselftests-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40156",
"url": "https://www.suse.com/security/cve/CVE-2025-40156"
},
{
"category": "external",
"summary": "SUSE Bug 1253428 for CVE-2025-40156",
"url": "https://bugzilla.suse.com/1253428"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_81-default-1-150600.13.3.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_81-default-1-150600.13.3.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_81-default-1-150600.13.3.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-64kb-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-64kb-devel-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-devel-6.4.0-150600.23.81.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-macros-6.4.0-150600.23.81.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-zfcpdump-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-docs-6.4.0-150600.23.81.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-source-6.4.0-150600.23.81.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP6:kernel-default-extra-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:dlm-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:dtb-allwinner-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-altera-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-amazon-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-amd-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-amlogic-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-apm-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-apple-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-arm-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-broadcom-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-cavium-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-exynos-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-freescale-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-hisilicon-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-lg-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-marvell-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-mediatek-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-nvidia-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-qcom-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-renesas-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-rockchip-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-socionext-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-sprd-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-xilinx-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-64kb-devel-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-64kb-extra-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-64kb-optional-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-debug-vdso-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.aarch64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.x86_64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.81.3.150600.12.36.3.aarch64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.81.3.150600.12.36.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.81.3.150600.12.36.3.x86_64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-vdso-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-devel-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-docs-6.4.0-150600.23.81.1.noarch",
"openSUSE Leap 15.6:kernel-docs-html-6.4.0-150600.23.81.1.noarch",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-vdso-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-macros-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.s390x",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.x86_64",
"openSUSE Leap 15.6:kernel-source-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-source-vanilla-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.ppc64le",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.s390x",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.x86_64",
"openSUSE Leap 15.6:kernel-zfcpdump-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kselftests-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_81-default-1-150600.13.3.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_81-default-1-150600.13.3.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_81-default-1-150600.13.3.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-64kb-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-64kb-devel-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-devel-6.4.0-150600.23.81.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-macros-6.4.0-150600.23.81.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-zfcpdump-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-docs-6.4.0-150600.23.81.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-source-6.4.0-150600.23.81.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP6:kernel-default-extra-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:dlm-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:dtb-allwinner-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-altera-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-amazon-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-amd-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-amlogic-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-apm-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-apple-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-arm-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-broadcom-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-cavium-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-exynos-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-freescale-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-hisilicon-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-lg-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-marvell-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-mediatek-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-nvidia-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-qcom-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-renesas-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-rockchip-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-socionext-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-sprd-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-xilinx-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-64kb-devel-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-64kb-extra-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-64kb-optional-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-debug-vdso-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.aarch64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.x86_64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.81.3.150600.12.36.3.aarch64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.81.3.150600.12.36.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.81.3.150600.12.36.3.x86_64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-vdso-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-devel-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-docs-6.4.0-150600.23.81.1.noarch",
"openSUSE Leap 15.6:kernel-docs-html-6.4.0-150600.23.81.1.noarch",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-vdso-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-macros-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.s390x",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.x86_64",
"openSUSE Leap 15.6:kernel-source-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-source-vanilla-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.ppc64le",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.s390x",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.x86_64",
"openSUSE Leap 15.6:kernel-zfcpdump-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kselftests-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-17T10:52:47Z",
"details": "moderate"
}
],
"title": "CVE-2025-40156"
},
{
"cve": "CVE-2025-40157",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40157"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nEDAC/i10nm: Skip DIMM enumeration on a disabled memory controller\n\nWhen loading the i10nm_edac driver on some Intel Granite Rapids servers,\na call trace may appear as follows:\n\n UBSAN: shift-out-of-bounds in drivers/edac/skx_common.c:453:16\n shift exponent -66 is negative\n ...\n __ubsan_handle_shift_out_of_bounds+0x1e3/0x390\n skx_get_dimm_info.cold+0x47/0xd40 [skx_edac_common]\n i10nm_get_dimm_config+0x23e/0x390 [i10nm_edac]\n skx_register_mci+0x159/0x220 [skx_edac_common]\n i10nm_init+0xcb0/0x1ff0 [i10nm_edac]\n ...\n\nThis occurs because some BIOS may disable a memory controller if there\naren\u0027t any memory DIMMs populated on this memory controller. The DIMMMTR\nregister of this disabled memory controller contains the invalid value\n~0, resulting in the call trace above.\n\nFix this call trace by skipping DIMM enumeration on a disabled memory\ncontroller.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_81-default-1-150600.13.3.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_81-default-1-150600.13.3.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_81-default-1-150600.13.3.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-64kb-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-64kb-devel-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-devel-6.4.0-150600.23.81.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-macros-6.4.0-150600.23.81.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-zfcpdump-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-docs-6.4.0-150600.23.81.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-source-6.4.0-150600.23.81.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP6:kernel-default-extra-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:dlm-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:dtb-allwinner-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-altera-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-amazon-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-amd-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-amlogic-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-apm-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-apple-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-arm-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-broadcom-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-cavium-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-exynos-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-freescale-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-hisilicon-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-lg-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-marvell-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-mediatek-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-nvidia-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-qcom-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-renesas-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-rockchip-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-socionext-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-sprd-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-xilinx-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-64kb-devel-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-64kb-extra-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-64kb-optional-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-debug-vdso-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.aarch64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.x86_64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.81.3.150600.12.36.3.aarch64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.81.3.150600.12.36.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.81.3.150600.12.36.3.x86_64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-vdso-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-devel-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-docs-6.4.0-150600.23.81.1.noarch",
"openSUSE Leap 15.6:kernel-docs-html-6.4.0-150600.23.81.1.noarch",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-vdso-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-macros-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.s390x",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.x86_64",
"openSUSE Leap 15.6:kernel-source-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-source-vanilla-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.ppc64le",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.s390x",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.x86_64",
"openSUSE Leap 15.6:kernel-zfcpdump-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kselftests-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40157",
"url": "https://www.suse.com/security/cve/CVE-2025-40157"
},
{
"category": "external",
"summary": "SUSE Bug 1253423 for CVE-2025-40157",
"url": "https://bugzilla.suse.com/1253423"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_81-default-1-150600.13.3.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_81-default-1-150600.13.3.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_81-default-1-150600.13.3.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-64kb-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-64kb-devel-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-devel-6.4.0-150600.23.81.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-macros-6.4.0-150600.23.81.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-zfcpdump-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-docs-6.4.0-150600.23.81.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-source-6.4.0-150600.23.81.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP6:kernel-default-extra-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:dlm-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:dtb-allwinner-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-altera-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-amazon-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-amd-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-amlogic-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-apm-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-apple-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-arm-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-broadcom-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-cavium-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-exynos-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-freescale-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-hisilicon-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-lg-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-marvell-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-mediatek-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-nvidia-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-qcom-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-renesas-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-rockchip-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-socionext-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-sprd-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-xilinx-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-64kb-devel-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-64kb-extra-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-64kb-optional-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-debug-vdso-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.aarch64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.x86_64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.81.3.150600.12.36.3.aarch64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.81.3.150600.12.36.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.81.3.150600.12.36.3.x86_64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-vdso-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-devel-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-docs-6.4.0-150600.23.81.1.noarch",
"openSUSE Leap 15.6:kernel-docs-html-6.4.0-150600.23.81.1.noarch",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-vdso-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-macros-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.s390x",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.x86_64",
"openSUSE Leap 15.6:kernel-source-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-source-vanilla-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.ppc64le",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.s390x",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.x86_64",
"openSUSE Leap 15.6:kernel-zfcpdump-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kselftests-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.2,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:L/I:L/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_81-default-1-150600.13.3.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_81-default-1-150600.13.3.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_81-default-1-150600.13.3.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-64kb-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-64kb-devel-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-devel-6.4.0-150600.23.81.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-macros-6.4.0-150600.23.81.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-zfcpdump-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-docs-6.4.0-150600.23.81.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-source-6.4.0-150600.23.81.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP6:kernel-default-extra-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:dlm-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:dtb-allwinner-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-altera-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-amazon-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-amd-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-amlogic-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-apm-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-apple-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-arm-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-broadcom-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-cavium-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-exynos-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-freescale-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-hisilicon-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-lg-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-marvell-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-mediatek-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-nvidia-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-qcom-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-renesas-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-rockchip-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-socionext-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-sprd-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-xilinx-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-64kb-devel-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-64kb-extra-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-64kb-optional-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-debug-vdso-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.aarch64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.x86_64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.81.3.150600.12.36.3.aarch64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.81.3.150600.12.36.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.81.3.150600.12.36.3.x86_64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-vdso-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-devel-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-docs-6.4.0-150600.23.81.1.noarch",
"openSUSE Leap 15.6:kernel-docs-html-6.4.0-150600.23.81.1.noarch",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-vdso-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-macros-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.s390x",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.x86_64",
"openSUSE Leap 15.6:kernel-source-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-source-vanilla-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.ppc64le",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.s390x",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.x86_64",
"openSUSE Leap 15.6:kernel-zfcpdump-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kselftests-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-17T10:52:47Z",
"details": "moderate"
}
],
"title": "CVE-2025-40157"
},
{
"cve": "CVE-2025-40159",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40159"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nxsk: Harden userspace-supplied xdp_desc validation\n\nTurned out certain clearly invalid values passed in xdp_desc from\nuserspace can pass xp_{,un}aligned_validate_desc() and then lead\nto UBs or just invalid frames to be queued for xmit.\n\ndesc-\u003elen close to ``U32_MAX`` with a non-zero pool-\u003etx_metadata_len\ncan cause positive integer overflow and wraparound, the same way low\nenough desc-\u003eaddr with a non-zero pool-\u003etx_metadata_len can cause\nnegative integer overflow. Both scenarios can then pass the\nvalidation successfully.\nThis doesn\u0027t happen with valid XSk applications, but can be used\nto perform attacks.\n\nAlways promote desc-\u003elen to ``u64`` first to exclude positive\noverflows of it. Use explicit check_{add,sub}_overflow() when\nvalidating desc-\u003eaddr (which is ``u64`` already).\n\nbloat-o-meter reports a little growth of the code size:\n\nadd/remove: 0/0 grow/shrink: 2/1 up/down: 60/-16 (44)\nFunction old new delta\nxskq_cons_peek_desc 299 330 +31\nxsk_tx_peek_release_desc_batch 973 1002 +29\nxsk_generic_xmit 3148 3132 -16\n\nbut hopefully this doesn\u0027t hurt the performance much.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_81-default-1-150600.13.3.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_81-default-1-150600.13.3.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_81-default-1-150600.13.3.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-64kb-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-64kb-devel-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-devel-6.4.0-150600.23.81.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-macros-6.4.0-150600.23.81.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-zfcpdump-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-docs-6.4.0-150600.23.81.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-source-6.4.0-150600.23.81.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP6:kernel-default-extra-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:dlm-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:dtb-allwinner-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-altera-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-amazon-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-amd-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-amlogic-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-apm-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-apple-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-arm-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-broadcom-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-cavium-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-exynos-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-freescale-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-hisilicon-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-lg-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-marvell-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-mediatek-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-nvidia-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-qcom-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-renesas-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-rockchip-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-socionext-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-sprd-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-xilinx-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-64kb-devel-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-64kb-extra-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-64kb-optional-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-debug-vdso-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.aarch64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.x86_64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.81.3.150600.12.36.3.aarch64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.81.3.150600.12.36.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.81.3.150600.12.36.3.x86_64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-vdso-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-devel-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-docs-6.4.0-150600.23.81.1.noarch",
"openSUSE Leap 15.6:kernel-docs-html-6.4.0-150600.23.81.1.noarch",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-vdso-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-macros-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.s390x",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.x86_64",
"openSUSE Leap 15.6:kernel-source-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-source-vanilla-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.ppc64le",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.s390x",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.x86_64",
"openSUSE Leap 15.6:kernel-zfcpdump-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kselftests-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40159",
"url": "https://www.suse.com/security/cve/CVE-2025-40159"
},
{
"category": "external",
"summary": "SUSE Bug 1253403 for CVE-2025-40159",
"url": "https://bugzilla.suse.com/1253403"
},
{
"category": "external",
"summary": "SUSE Bug 1253404 for CVE-2025-40159",
"url": "https://bugzilla.suse.com/1253404"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_81-default-1-150600.13.3.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_81-default-1-150600.13.3.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_81-default-1-150600.13.3.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-64kb-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-64kb-devel-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-devel-6.4.0-150600.23.81.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-macros-6.4.0-150600.23.81.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-zfcpdump-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-docs-6.4.0-150600.23.81.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-source-6.4.0-150600.23.81.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP6:kernel-default-extra-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:dlm-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:dtb-allwinner-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-altera-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-amazon-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-amd-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-amlogic-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-apm-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-apple-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-arm-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-broadcom-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-cavium-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-exynos-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-freescale-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-hisilicon-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-lg-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-marvell-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-mediatek-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-nvidia-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-qcom-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-renesas-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-rockchip-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-socionext-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-sprd-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-xilinx-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-64kb-devel-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-64kb-extra-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-64kb-optional-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-debug-vdso-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.aarch64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.x86_64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.81.3.150600.12.36.3.aarch64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.81.3.150600.12.36.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.81.3.150600.12.36.3.x86_64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-vdso-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-devel-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-docs-6.4.0-150600.23.81.1.noarch",
"openSUSE Leap 15.6:kernel-docs-html-6.4.0-150600.23.81.1.noarch",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-vdso-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-macros-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.s390x",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.x86_64",
"openSUSE Leap 15.6:kernel-source-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-source-vanilla-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.ppc64le",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.s390x",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.x86_64",
"openSUSE Leap 15.6:kernel-zfcpdump-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kselftests-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_81-default-1-150600.13.3.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_81-default-1-150600.13.3.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_81-default-1-150600.13.3.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-64kb-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-64kb-devel-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-devel-6.4.0-150600.23.81.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-macros-6.4.0-150600.23.81.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-zfcpdump-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-docs-6.4.0-150600.23.81.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-source-6.4.0-150600.23.81.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP6:kernel-default-extra-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:dlm-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:dtb-allwinner-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-altera-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-amazon-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-amd-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-amlogic-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-apm-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-apple-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-arm-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-broadcom-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-cavium-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-exynos-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-freescale-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-hisilicon-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-lg-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-marvell-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-mediatek-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-nvidia-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-qcom-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-renesas-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-rockchip-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-socionext-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-sprd-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-xilinx-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-64kb-devel-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-64kb-extra-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-64kb-optional-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-debug-vdso-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.aarch64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.x86_64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.81.3.150600.12.36.3.aarch64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.81.3.150600.12.36.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.81.3.150600.12.36.3.x86_64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-vdso-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-devel-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-docs-6.4.0-150600.23.81.1.noarch",
"openSUSE Leap 15.6:kernel-docs-html-6.4.0-150600.23.81.1.noarch",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-vdso-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-macros-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.s390x",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.x86_64",
"openSUSE Leap 15.6:kernel-source-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-source-vanilla-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.ppc64le",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.s390x",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.x86_64",
"openSUSE Leap 15.6:kernel-zfcpdump-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kselftests-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-17T10:52:47Z",
"details": "important"
}
],
"title": "CVE-2025-40159"
},
{
"cve": "CVE-2025-40164",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40164"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nusbnet: Fix using smp_processor_id() in preemptible code warnings\n\nSyzbot reported the following warning:\n\nBUG: using smp_processor_id() in preemptible [00000000] code: dhcpcd/2879\ncaller is usbnet_skb_return+0x74/0x490 drivers/net/usb/usbnet.c:331\nCPU: 1 UID: 0 PID: 2879 Comm: dhcpcd Not tainted 6.15.0-rc4-syzkaller-00098-g615dca38c2ea #0 PREEMPT(voluntary)\nCall Trace:\n \u003cTASK\u003e\n __dump_stack lib/dump_stack.c:94 [inline]\n dump_stack_lvl+0x16c/0x1f0 lib/dump_stack.c:120\n check_preemption_disabled+0xd0/0xe0 lib/smp_processor_id.c:49\n usbnet_skb_return+0x74/0x490 drivers/net/usb/usbnet.c:331\n usbnet_resume_rx+0x4b/0x170 drivers/net/usb/usbnet.c:708\n usbnet_change_mtu+0x1be/0x220 drivers/net/usb/usbnet.c:417\n __dev_set_mtu net/core/dev.c:9443 [inline]\n netif_set_mtu_ext+0x369/0x5c0 net/core/dev.c:9496\n netif_set_mtu+0xb0/0x160 net/core/dev.c:9520\n dev_set_mtu+0xae/0x170 net/core/dev_api.c:247\n dev_ifsioc+0xa31/0x18d0 net/core/dev_ioctl.c:572\n dev_ioctl+0x223/0x10e0 net/core/dev_ioctl.c:821\n sock_do_ioctl+0x19d/0x280 net/socket.c:1204\n sock_ioctl+0x42f/0x6a0 net/socket.c:1311\n vfs_ioctl fs/ioctl.c:51 [inline]\n __do_sys_ioctl fs/ioctl.c:906 [inline]\n __se_sys_ioctl fs/ioctl.c:892 [inline]\n __x64_sys_ioctl+0x190/0x200 fs/ioctl.c:892\n do_syscall_x64 arch/x86/entry/syscall_64.c:63 [inline]\n do_syscall_64+0xcd/0x260 arch/x86/entry/syscall_64.c:94\n entry_SYSCALL_64_after_hwframe+0x77/0x7f\n\nFor historical and portability reasons, the netif_rx() is usually\nrun in the softirq or interrupt context, this commit therefore add\nlocal_bh_disable/enable() protection in the usbnet_resume_rx().",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_81-default-1-150600.13.3.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_81-default-1-150600.13.3.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_81-default-1-150600.13.3.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-64kb-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-64kb-devel-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-devel-6.4.0-150600.23.81.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-macros-6.4.0-150600.23.81.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-zfcpdump-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-docs-6.4.0-150600.23.81.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-source-6.4.0-150600.23.81.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP6:kernel-default-extra-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:dlm-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:dtb-allwinner-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-altera-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-amazon-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-amd-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-amlogic-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-apm-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-apple-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-arm-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-broadcom-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-cavium-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-exynos-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-freescale-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-hisilicon-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-lg-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-marvell-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-mediatek-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-nvidia-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-qcom-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-renesas-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-rockchip-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-socionext-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-sprd-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-xilinx-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-64kb-devel-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-64kb-extra-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-64kb-optional-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-debug-vdso-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.aarch64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.x86_64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.81.3.150600.12.36.3.aarch64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.81.3.150600.12.36.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.81.3.150600.12.36.3.x86_64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-vdso-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-devel-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-docs-6.4.0-150600.23.81.1.noarch",
"openSUSE Leap 15.6:kernel-docs-html-6.4.0-150600.23.81.1.noarch",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-vdso-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-macros-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.s390x",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.x86_64",
"openSUSE Leap 15.6:kernel-source-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-source-vanilla-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.ppc64le",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.s390x",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.x86_64",
"openSUSE Leap 15.6:kernel-zfcpdump-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kselftests-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40164",
"url": "https://www.suse.com/security/cve/CVE-2025-40164"
},
{
"category": "external",
"summary": "SUSE Bug 1253407 for CVE-2025-40164",
"url": "https://bugzilla.suse.com/1253407"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_81-default-1-150600.13.3.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_81-default-1-150600.13.3.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_81-default-1-150600.13.3.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-64kb-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-64kb-devel-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-devel-6.4.0-150600.23.81.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-macros-6.4.0-150600.23.81.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-zfcpdump-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-docs-6.4.0-150600.23.81.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-source-6.4.0-150600.23.81.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP6:kernel-default-extra-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:dlm-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:dtb-allwinner-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-altera-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-amazon-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-amd-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-amlogic-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-apm-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-apple-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-arm-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-broadcom-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-cavium-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-exynos-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-freescale-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-hisilicon-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-lg-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-marvell-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-mediatek-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-nvidia-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-qcom-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-renesas-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-rockchip-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-socionext-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-sprd-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-xilinx-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-64kb-devel-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-64kb-extra-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-64kb-optional-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-debug-vdso-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.aarch64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.x86_64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.81.3.150600.12.36.3.aarch64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.81.3.150600.12.36.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.81.3.150600.12.36.3.x86_64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-vdso-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-devel-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-docs-6.4.0-150600.23.81.1.noarch",
"openSUSE Leap 15.6:kernel-docs-html-6.4.0-150600.23.81.1.noarch",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-vdso-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-macros-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.s390x",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.x86_64",
"openSUSE Leap 15.6:kernel-source-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-source-vanilla-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.ppc64le",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.s390x",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.x86_64",
"openSUSE Leap 15.6:kernel-zfcpdump-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kselftests-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.7,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_81-default-1-150600.13.3.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_81-default-1-150600.13.3.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_81-default-1-150600.13.3.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-64kb-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-64kb-devel-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-devel-6.4.0-150600.23.81.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-macros-6.4.0-150600.23.81.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-zfcpdump-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-docs-6.4.0-150600.23.81.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-source-6.4.0-150600.23.81.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP6:kernel-default-extra-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:dlm-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:dtb-allwinner-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-altera-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-amazon-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-amd-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-amlogic-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-apm-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-apple-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-arm-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-broadcom-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-cavium-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-exynos-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-freescale-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-hisilicon-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-lg-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-marvell-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-mediatek-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-nvidia-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-qcom-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-renesas-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-rockchip-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-socionext-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-sprd-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-xilinx-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-64kb-devel-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-64kb-extra-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-64kb-optional-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-debug-vdso-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.aarch64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.x86_64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.81.3.150600.12.36.3.aarch64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.81.3.150600.12.36.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.81.3.150600.12.36.3.x86_64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-vdso-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-devel-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-docs-6.4.0-150600.23.81.1.noarch",
"openSUSE Leap 15.6:kernel-docs-html-6.4.0-150600.23.81.1.noarch",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-vdso-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-macros-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.s390x",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.x86_64",
"openSUSE Leap 15.6:kernel-source-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-source-vanilla-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.ppc64le",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.s390x",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.x86_64",
"openSUSE Leap 15.6:kernel-zfcpdump-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kselftests-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-17T10:52:47Z",
"details": "moderate"
}
],
"title": "CVE-2025-40164"
},
{
"cve": "CVE-2025-40168",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40168"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nsmc: Use __sk_dst_get() and dst_dev_rcu() in smc_clc_prfx_match().\n\nsmc_clc_prfx_match() is called from smc_listen_work() and\nnot under RCU nor RTNL.\n\nUsing sk_dst_get(sk)-\u003edev could trigger UAF.\n\nLet\u0027s use __sk_dst_get() and dst_dev_rcu().\n\nNote that the returned value of smc_clc_prfx_match() is not\nused in the caller.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_81-default-1-150600.13.3.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_81-default-1-150600.13.3.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_81-default-1-150600.13.3.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-64kb-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-64kb-devel-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-devel-6.4.0-150600.23.81.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-macros-6.4.0-150600.23.81.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-zfcpdump-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-docs-6.4.0-150600.23.81.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-source-6.4.0-150600.23.81.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP6:kernel-default-extra-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:dlm-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:dtb-allwinner-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-altera-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-amazon-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-amd-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-amlogic-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-apm-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-apple-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-arm-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-broadcom-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-cavium-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-exynos-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-freescale-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-hisilicon-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-lg-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-marvell-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-mediatek-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-nvidia-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-qcom-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-renesas-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-rockchip-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-socionext-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-sprd-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-xilinx-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-64kb-devel-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-64kb-extra-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-64kb-optional-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-debug-vdso-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.aarch64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.x86_64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.81.3.150600.12.36.3.aarch64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.81.3.150600.12.36.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.81.3.150600.12.36.3.x86_64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-vdso-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-devel-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-docs-6.4.0-150600.23.81.1.noarch",
"openSUSE Leap 15.6:kernel-docs-html-6.4.0-150600.23.81.1.noarch",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-vdso-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-macros-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.s390x",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.x86_64",
"openSUSE Leap 15.6:kernel-source-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-source-vanilla-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.ppc64le",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.s390x",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.x86_64",
"openSUSE Leap 15.6:kernel-zfcpdump-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kselftests-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40168",
"url": "https://www.suse.com/security/cve/CVE-2025-40168"
},
{
"category": "external",
"summary": "SUSE Bug 1253427 for CVE-2025-40168",
"url": "https://bugzilla.suse.com/1253427"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_81-default-1-150600.13.3.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_81-default-1-150600.13.3.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_81-default-1-150600.13.3.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-64kb-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-64kb-devel-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-devel-6.4.0-150600.23.81.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-macros-6.4.0-150600.23.81.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-zfcpdump-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-docs-6.4.0-150600.23.81.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-source-6.4.0-150600.23.81.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP6:kernel-default-extra-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:dlm-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:dtb-allwinner-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-altera-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-amazon-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-amd-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-amlogic-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-apm-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-apple-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-arm-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-broadcom-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-cavium-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-exynos-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-freescale-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-hisilicon-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-lg-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-marvell-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-mediatek-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-nvidia-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-qcom-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-renesas-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-rockchip-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-socionext-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-sprd-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-xilinx-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-64kb-devel-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-64kb-extra-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-64kb-optional-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-debug-vdso-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.aarch64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.x86_64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.81.3.150600.12.36.3.aarch64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.81.3.150600.12.36.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.81.3.150600.12.36.3.x86_64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-vdso-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-devel-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-docs-6.4.0-150600.23.81.1.noarch",
"openSUSE Leap 15.6:kernel-docs-html-6.4.0-150600.23.81.1.noarch",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-vdso-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-macros-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.s390x",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.x86_64",
"openSUSE Leap 15.6:kernel-source-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-source-vanilla-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.ppc64le",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.s390x",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.x86_64",
"openSUSE Leap 15.6:kernel-zfcpdump-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kselftests-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_81-default-1-150600.13.3.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_81-default-1-150600.13.3.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_81-default-1-150600.13.3.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-64kb-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-64kb-devel-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-devel-6.4.0-150600.23.81.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-macros-6.4.0-150600.23.81.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-zfcpdump-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-docs-6.4.0-150600.23.81.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-source-6.4.0-150600.23.81.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP6:kernel-default-extra-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:dlm-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:dtb-allwinner-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-altera-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-amazon-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-amd-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-amlogic-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-apm-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-apple-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-arm-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-broadcom-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-cavium-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-exynos-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-freescale-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-hisilicon-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-lg-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-marvell-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-mediatek-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-nvidia-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-qcom-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-renesas-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-rockchip-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-socionext-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-sprd-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-xilinx-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-64kb-devel-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-64kb-extra-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-64kb-optional-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-debug-vdso-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.aarch64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.x86_64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.81.3.150600.12.36.3.aarch64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.81.3.150600.12.36.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.81.3.150600.12.36.3.x86_64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-vdso-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-devel-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-docs-6.4.0-150600.23.81.1.noarch",
"openSUSE Leap 15.6:kernel-docs-html-6.4.0-150600.23.81.1.noarch",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-vdso-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-macros-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.s390x",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.x86_64",
"openSUSE Leap 15.6:kernel-source-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-source-vanilla-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.ppc64le",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.s390x",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.x86_64",
"openSUSE Leap 15.6:kernel-zfcpdump-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kselftests-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-17T10:52:47Z",
"details": "moderate"
}
],
"title": "CVE-2025-40168"
},
{
"cve": "CVE-2025-40169",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40169"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nbpf: Reject negative offsets for ALU ops\n\nWhen verifying BPF programs, the check_alu_op() function validates\ninstructions with ALU operations. The \u0027offset\u0027 field in these\ninstructions is a signed 16-bit integer.\n\nThe existing check \u0027insn-\u003eoff \u003e 1\u0027 was intended to ensure the offset is\neither 0, or 1 for BPF_MOD/BPF_DIV. However, because \u0027insn-\u003eoff\u0027 is\nsigned, this check incorrectly accepts all negative values (e.g., -1).\n\nThis commit tightens the validation by changing the condition to\n\u0027(insn-\u003eoff != 0 \u0026\u0026 insn-\u003eoff != 1)\u0027. This ensures that any value\nother than the explicitly permitted 0 and 1 is rejected, hardening the\nverifier against malformed BPF programs.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_81-default-1-150600.13.3.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_81-default-1-150600.13.3.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_81-default-1-150600.13.3.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-64kb-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-64kb-devel-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-devel-6.4.0-150600.23.81.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-macros-6.4.0-150600.23.81.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-zfcpdump-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-docs-6.4.0-150600.23.81.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-source-6.4.0-150600.23.81.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP6:kernel-default-extra-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:dlm-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:dtb-allwinner-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-altera-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-amazon-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-amd-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-amlogic-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-apm-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-apple-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-arm-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-broadcom-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-cavium-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-exynos-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-freescale-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-hisilicon-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-lg-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-marvell-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-mediatek-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-nvidia-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-qcom-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-renesas-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-rockchip-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-socionext-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-sprd-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-xilinx-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-64kb-devel-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-64kb-extra-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-64kb-optional-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-debug-vdso-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.aarch64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.x86_64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.81.3.150600.12.36.3.aarch64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.81.3.150600.12.36.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.81.3.150600.12.36.3.x86_64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-vdso-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-devel-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-docs-6.4.0-150600.23.81.1.noarch",
"openSUSE Leap 15.6:kernel-docs-html-6.4.0-150600.23.81.1.noarch",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-vdso-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-macros-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.s390x",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.x86_64",
"openSUSE Leap 15.6:kernel-source-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-source-vanilla-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.ppc64le",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.s390x",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.x86_64",
"openSUSE Leap 15.6:kernel-zfcpdump-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kselftests-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40169",
"url": "https://www.suse.com/security/cve/CVE-2025-40169"
},
{
"category": "external",
"summary": "SUSE Bug 1253416 for CVE-2025-40169",
"url": "https://bugzilla.suse.com/1253416"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_81-default-1-150600.13.3.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_81-default-1-150600.13.3.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_81-default-1-150600.13.3.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-64kb-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-64kb-devel-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-devel-6.4.0-150600.23.81.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-macros-6.4.0-150600.23.81.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-zfcpdump-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-docs-6.4.0-150600.23.81.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-source-6.4.0-150600.23.81.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP6:kernel-default-extra-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:dlm-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:dtb-allwinner-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-altera-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-amazon-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-amd-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-amlogic-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-apm-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-apple-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-arm-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-broadcom-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-cavium-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-exynos-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-freescale-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-hisilicon-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-lg-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-marvell-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-mediatek-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-nvidia-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-qcom-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-renesas-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-rockchip-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-socionext-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-sprd-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-xilinx-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-64kb-devel-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-64kb-extra-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-64kb-optional-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-debug-vdso-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.aarch64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.x86_64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.81.3.150600.12.36.3.aarch64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.81.3.150600.12.36.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.81.3.150600.12.36.3.x86_64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-vdso-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-devel-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-docs-6.4.0-150600.23.81.1.noarch",
"openSUSE Leap 15.6:kernel-docs-html-6.4.0-150600.23.81.1.noarch",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-vdso-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-macros-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.s390x",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.x86_64",
"openSUSE Leap 15.6:kernel-source-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-source-vanilla-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.ppc64le",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.s390x",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.x86_64",
"openSUSE Leap 15.6:kernel-zfcpdump-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kselftests-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.8,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_81-default-1-150600.13.3.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_81-default-1-150600.13.3.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_81-default-1-150600.13.3.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-64kb-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-64kb-devel-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-devel-6.4.0-150600.23.81.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-macros-6.4.0-150600.23.81.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-zfcpdump-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-docs-6.4.0-150600.23.81.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-source-6.4.0-150600.23.81.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP6:kernel-default-extra-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:dlm-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:dtb-allwinner-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-altera-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-amazon-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-amd-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-amlogic-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-apm-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-apple-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-arm-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-broadcom-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-cavium-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-exynos-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-freescale-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-hisilicon-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-lg-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-marvell-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-mediatek-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-nvidia-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-qcom-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-renesas-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-rockchip-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-socionext-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-sprd-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-xilinx-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-64kb-devel-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-64kb-extra-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-64kb-optional-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-debug-vdso-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.aarch64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.x86_64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.81.3.150600.12.36.3.aarch64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.81.3.150600.12.36.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.81.3.150600.12.36.3.x86_64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-vdso-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-devel-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-docs-6.4.0-150600.23.81.1.noarch",
"openSUSE Leap 15.6:kernel-docs-html-6.4.0-150600.23.81.1.noarch",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-vdso-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-macros-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.s390x",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.x86_64",
"openSUSE Leap 15.6:kernel-source-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-source-vanilla-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.ppc64le",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.s390x",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.x86_64",
"openSUSE Leap 15.6:kernel-zfcpdump-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kselftests-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-17T10:52:47Z",
"details": "moderate"
}
],
"title": "CVE-2025-40169"
},
{
"cve": "CVE-2025-40171",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40171"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnvmet-fc: move lsop put work to nvmet_fc_ls_req_op\n\nIt\u0027s possible for more than one async command to be in flight from\n__nvmet_fc_send_ls_req. For each command, a tgtport reference is taken.\n\nIn the current code, only one put work item is queued at a time, which\nresults in a leaked reference.\n\nTo fix this, move the work item to the nvmet_fc_ls_req_op struct, which\nalready tracks all resources related to the command.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_81-default-1-150600.13.3.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_81-default-1-150600.13.3.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_81-default-1-150600.13.3.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-64kb-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-64kb-devel-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-devel-6.4.0-150600.23.81.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-macros-6.4.0-150600.23.81.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-zfcpdump-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-docs-6.4.0-150600.23.81.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-source-6.4.0-150600.23.81.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP6:kernel-default-extra-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:dlm-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:dtb-allwinner-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-altera-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-amazon-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-amd-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-amlogic-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-apm-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-apple-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-arm-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-broadcom-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-cavium-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-exynos-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-freescale-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-hisilicon-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-lg-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-marvell-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-mediatek-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-nvidia-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-qcom-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-renesas-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-rockchip-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-socionext-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-sprd-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-xilinx-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-64kb-devel-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-64kb-extra-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-64kb-optional-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-debug-vdso-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.aarch64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.x86_64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.81.3.150600.12.36.3.aarch64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.81.3.150600.12.36.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.81.3.150600.12.36.3.x86_64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-vdso-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-devel-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-docs-6.4.0-150600.23.81.1.noarch",
"openSUSE Leap 15.6:kernel-docs-html-6.4.0-150600.23.81.1.noarch",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-vdso-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-macros-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.s390x",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.x86_64",
"openSUSE Leap 15.6:kernel-source-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-source-vanilla-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.ppc64le",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.s390x",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.x86_64",
"openSUSE Leap 15.6:kernel-zfcpdump-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kselftests-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40171",
"url": "https://www.suse.com/security/cve/CVE-2025-40171"
},
{
"category": "external",
"summary": "SUSE Bug 1253412 for CVE-2025-40171",
"url": "https://bugzilla.suse.com/1253412"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_81-default-1-150600.13.3.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_81-default-1-150600.13.3.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_81-default-1-150600.13.3.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-64kb-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-64kb-devel-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-devel-6.4.0-150600.23.81.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-macros-6.4.0-150600.23.81.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-zfcpdump-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-docs-6.4.0-150600.23.81.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-source-6.4.0-150600.23.81.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP6:kernel-default-extra-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:dlm-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:dtb-allwinner-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-altera-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-amazon-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-amd-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-amlogic-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-apm-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-apple-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-arm-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-broadcom-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-cavium-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-exynos-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-freescale-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-hisilicon-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-lg-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-marvell-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-mediatek-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-nvidia-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-qcom-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-renesas-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-rockchip-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-socionext-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-sprd-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-xilinx-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-64kb-devel-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-64kb-extra-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-64kb-optional-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-debug-vdso-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.aarch64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.x86_64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.81.3.150600.12.36.3.aarch64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.81.3.150600.12.36.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.81.3.150600.12.36.3.x86_64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-vdso-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-devel-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-docs-6.4.0-150600.23.81.1.noarch",
"openSUSE Leap 15.6:kernel-docs-html-6.4.0-150600.23.81.1.noarch",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-vdso-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-macros-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.s390x",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.x86_64",
"openSUSE Leap 15.6:kernel-source-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-source-vanilla-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.ppc64le",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.s390x",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.x86_64",
"openSUSE Leap 15.6:kernel-zfcpdump-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kselftests-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_81-default-1-150600.13.3.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_81-default-1-150600.13.3.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_81-default-1-150600.13.3.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-64kb-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-64kb-devel-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-devel-6.4.0-150600.23.81.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-macros-6.4.0-150600.23.81.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-zfcpdump-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-docs-6.4.0-150600.23.81.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-source-6.4.0-150600.23.81.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP6:kernel-default-extra-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:dlm-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:dtb-allwinner-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-altera-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-amazon-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-amd-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-amlogic-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-apm-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-apple-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-arm-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-broadcom-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-cavium-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-exynos-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-freescale-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-hisilicon-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-lg-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-marvell-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-mediatek-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-nvidia-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-qcom-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-renesas-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-rockchip-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-socionext-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-sprd-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-xilinx-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-64kb-devel-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-64kb-extra-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-64kb-optional-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-debug-vdso-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.aarch64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.x86_64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.81.3.150600.12.36.3.aarch64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.81.3.150600.12.36.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.81.3.150600.12.36.3.x86_64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-vdso-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-devel-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-docs-6.4.0-150600.23.81.1.noarch",
"openSUSE Leap 15.6:kernel-docs-html-6.4.0-150600.23.81.1.noarch",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-vdso-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-macros-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.s390x",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.x86_64",
"openSUSE Leap 15.6:kernel-source-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-source-vanilla-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.ppc64le",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.s390x",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.x86_64",
"openSUSE Leap 15.6:kernel-zfcpdump-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kselftests-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-17T10:52:47Z",
"details": "moderate"
}
],
"title": "CVE-2025-40171"
},
{
"cve": "CVE-2025-40172",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40172"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\naccel/qaic: Treat remaining == 0 as error in find_and_map_user_pages()\n\nCurrently, if find_and_map_user_pages() takes a DMA xfer request from the\nuser with a length field set to 0, or in a rare case, the host receives\nQAIC_TRANS_DMA_XFER_CONT from the device where resources-\u003exferred_dma_size\nis equal to the requested transaction size, the function will return 0\nbefore allocating an sgt or setting the fields of the dma_xfer struct.\nIn that case, encode_addr_size_pairs() will try to access the sgt which\nwill lead to a general protection fault.\n\nReturn an EINVAL in case the user provides a zero-sized ALP, or the device\nrequests continuation after all of the bytes have been transferred.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_81-default-1-150600.13.3.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_81-default-1-150600.13.3.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_81-default-1-150600.13.3.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-64kb-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-64kb-devel-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-devel-6.4.0-150600.23.81.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-macros-6.4.0-150600.23.81.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-zfcpdump-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-docs-6.4.0-150600.23.81.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-source-6.4.0-150600.23.81.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP6:kernel-default-extra-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:dlm-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:dtb-allwinner-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-altera-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-amazon-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-amd-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-amlogic-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-apm-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-apple-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-arm-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-broadcom-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-cavium-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-exynos-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-freescale-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-hisilicon-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-lg-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-marvell-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-mediatek-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-nvidia-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-qcom-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-renesas-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-rockchip-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-socionext-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-sprd-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-xilinx-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-64kb-devel-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-64kb-extra-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-64kb-optional-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-debug-vdso-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.aarch64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.x86_64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.81.3.150600.12.36.3.aarch64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.81.3.150600.12.36.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.81.3.150600.12.36.3.x86_64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-vdso-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-devel-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-docs-6.4.0-150600.23.81.1.noarch",
"openSUSE Leap 15.6:kernel-docs-html-6.4.0-150600.23.81.1.noarch",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-vdso-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-macros-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.s390x",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.x86_64",
"openSUSE Leap 15.6:kernel-source-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-source-vanilla-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.ppc64le",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.s390x",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.x86_64",
"openSUSE Leap 15.6:kernel-zfcpdump-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kselftests-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40172",
"url": "https://www.suse.com/security/cve/CVE-2025-40172"
},
{
"category": "external",
"summary": "SUSE Bug 1253424 for CVE-2025-40172",
"url": "https://bugzilla.suse.com/1253424"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_81-default-1-150600.13.3.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_81-default-1-150600.13.3.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_81-default-1-150600.13.3.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-64kb-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-64kb-devel-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-devel-6.4.0-150600.23.81.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-macros-6.4.0-150600.23.81.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-zfcpdump-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-docs-6.4.0-150600.23.81.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-source-6.4.0-150600.23.81.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP6:kernel-default-extra-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:dlm-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:dtb-allwinner-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-altera-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-amazon-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-amd-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-amlogic-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-apm-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-apple-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-arm-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-broadcom-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-cavium-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-exynos-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-freescale-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-hisilicon-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-lg-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-marvell-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-mediatek-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-nvidia-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-qcom-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-renesas-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-rockchip-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-socionext-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-sprd-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-xilinx-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-64kb-devel-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-64kb-extra-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-64kb-optional-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-debug-vdso-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.aarch64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.x86_64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.81.3.150600.12.36.3.aarch64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.81.3.150600.12.36.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.81.3.150600.12.36.3.x86_64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-vdso-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-devel-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-docs-6.4.0-150600.23.81.1.noarch",
"openSUSE Leap 15.6:kernel-docs-html-6.4.0-150600.23.81.1.noarch",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-vdso-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-macros-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.s390x",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.x86_64",
"openSUSE Leap 15.6:kernel-source-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-source-vanilla-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.ppc64le",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.s390x",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.x86_64",
"openSUSE Leap 15.6:kernel-zfcpdump-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kselftests-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_81-default-1-150600.13.3.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_81-default-1-150600.13.3.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_81-default-1-150600.13.3.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-64kb-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-64kb-devel-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-devel-6.4.0-150600.23.81.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-macros-6.4.0-150600.23.81.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-zfcpdump-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-docs-6.4.0-150600.23.81.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-source-6.4.0-150600.23.81.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP6:kernel-default-extra-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:dlm-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:dtb-allwinner-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-altera-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-amazon-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-amd-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-amlogic-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-apm-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-apple-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-arm-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-broadcom-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-cavium-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-exynos-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-freescale-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-hisilicon-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-lg-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-marvell-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-mediatek-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-nvidia-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-qcom-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-renesas-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-rockchip-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-socionext-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-sprd-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-xilinx-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-64kb-devel-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-64kb-extra-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-64kb-optional-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-debug-vdso-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.aarch64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.x86_64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.81.3.150600.12.36.3.aarch64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.81.3.150600.12.36.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.81.3.150600.12.36.3.x86_64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-vdso-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-devel-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-docs-6.4.0-150600.23.81.1.noarch",
"openSUSE Leap 15.6:kernel-docs-html-6.4.0-150600.23.81.1.noarch",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-vdso-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-macros-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.s390x",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.x86_64",
"openSUSE Leap 15.6:kernel-source-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-source-vanilla-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.ppc64le",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.s390x",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.x86_64",
"openSUSE Leap 15.6:kernel-zfcpdump-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kselftests-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-17T10:52:47Z",
"details": "moderate"
}
],
"title": "CVE-2025-40172"
},
{
"cve": "CVE-2025-40173",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40173"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnet/ip6_tunnel: Prevent perpetual tunnel growth\n\nSimilarly to ipv4 tunnel, ipv6 version updates dev-\u003eneeded_headroom, too.\nWhile ipv4 tunnel headroom adjustment growth was limited in\ncommit 5ae1e9922bbd (\"net: ip_tunnel: prevent perpetual headroom growth\"),\nipv6 tunnel yet increases the headroom without any ceiling.\n\nReflect ipv4 tunnel headroom adjustment limit on ipv6 version.\n\nCredits to Francesco Ruggeri, who was originally debugging this issue\nand wrote local Arista-specific patch and a reproducer.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_81-default-1-150600.13.3.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_81-default-1-150600.13.3.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_81-default-1-150600.13.3.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-64kb-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-64kb-devel-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-devel-6.4.0-150600.23.81.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-macros-6.4.0-150600.23.81.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-zfcpdump-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-docs-6.4.0-150600.23.81.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-source-6.4.0-150600.23.81.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP6:kernel-default-extra-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:dlm-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:dtb-allwinner-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-altera-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-amazon-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-amd-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-amlogic-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-apm-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-apple-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-arm-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-broadcom-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-cavium-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-exynos-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-freescale-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-hisilicon-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-lg-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-marvell-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-mediatek-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-nvidia-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-qcom-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-renesas-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-rockchip-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-socionext-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-sprd-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-xilinx-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-64kb-devel-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-64kb-extra-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-64kb-optional-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-debug-vdso-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.aarch64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.x86_64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.81.3.150600.12.36.3.aarch64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.81.3.150600.12.36.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.81.3.150600.12.36.3.x86_64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-vdso-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-devel-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-docs-6.4.0-150600.23.81.1.noarch",
"openSUSE Leap 15.6:kernel-docs-html-6.4.0-150600.23.81.1.noarch",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-vdso-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-macros-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.s390x",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.x86_64",
"openSUSE Leap 15.6:kernel-source-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-source-vanilla-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.ppc64le",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.s390x",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.x86_64",
"openSUSE Leap 15.6:kernel-zfcpdump-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kselftests-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40173",
"url": "https://www.suse.com/security/cve/CVE-2025-40173"
},
{
"category": "external",
"summary": "SUSE Bug 1253421 for CVE-2025-40173",
"url": "https://bugzilla.suse.com/1253421"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_81-default-1-150600.13.3.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_81-default-1-150600.13.3.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_81-default-1-150600.13.3.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-64kb-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-64kb-devel-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-devel-6.4.0-150600.23.81.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-macros-6.4.0-150600.23.81.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-zfcpdump-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-docs-6.4.0-150600.23.81.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-source-6.4.0-150600.23.81.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP6:kernel-default-extra-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:dlm-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:dtb-allwinner-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-altera-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-amazon-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-amd-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-amlogic-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-apm-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-apple-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-arm-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-broadcom-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-cavium-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-exynos-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-freescale-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-hisilicon-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-lg-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-marvell-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-mediatek-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-nvidia-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-qcom-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-renesas-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-rockchip-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-socionext-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-sprd-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-xilinx-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-64kb-devel-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-64kb-extra-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-64kb-optional-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-debug-vdso-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.aarch64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.x86_64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.81.3.150600.12.36.3.aarch64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.81.3.150600.12.36.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.81.3.150600.12.36.3.x86_64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-vdso-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-devel-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-docs-6.4.0-150600.23.81.1.noarch",
"openSUSE Leap 15.6:kernel-docs-html-6.4.0-150600.23.81.1.noarch",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-vdso-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-macros-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.s390x",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.x86_64",
"openSUSE Leap 15.6:kernel-source-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-source-vanilla-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.ppc64le",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.s390x",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.x86_64",
"openSUSE Leap 15.6:kernel-zfcpdump-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kselftests-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.7,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_81-default-1-150600.13.3.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_81-default-1-150600.13.3.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_81-default-1-150600.13.3.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-64kb-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-64kb-devel-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-devel-6.4.0-150600.23.81.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-macros-6.4.0-150600.23.81.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-zfcpdump-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-docs-6.4.0-150600.23.81.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-source-6.4.0-150600.23.81.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP6:kernel-default-extra-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:dlm-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:dtb-allwinner-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-altera-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-amazon-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-amd-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-amlogic-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-apm-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-apple-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-arm-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-broadcom-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-cavium-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-exynos-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-freescale-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-hisilicon-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-lg-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-marvell-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-mediatek-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-nvidia-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-qcom-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-renesas-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-rockchip-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-socionext-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-sprd-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-xilinx-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-64kb-devel-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-64kb-extra-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-64kb-optional-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-debug-vdso-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.aarch64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.x86_64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.81.3.150600.12.36.3.aarch64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.81.3.150600.12.36.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.81.3.150600.12.36.3.x86_64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-vdso-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-devel-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-docs-6.4.0-150600.23.81.1.noarch",
"openSUSE Leap 15.6:kernel-docs-html-6.4.0-150600.23.81.1.noarch",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-vdso-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-macros-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.s390x",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.x86_64",
"openSUSE Leap 15.6:kernel-source-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-source-vanilla-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.ppc64le",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.s390x",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.x86_64",
"openSUSE Leap 15.6:kernel-zfcpdump-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kselftests-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-17T10:52:47Z",
"details": "moderate"
}
],
"title": "CVE-2025-40173"
},
{
"cve": "CVE-2025-40176",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40176"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\ntls: wait for pending async decryptions if tls_strp_msg_hold fails\n\nAsync decryption calls tls_strp_msg_hold to create a clone of the\ninput skb to hold references to the memory it uses. If we fail to\nallocate that clone, proceeding with async decryption can lead to\nvarious issues (UAF on the skb, writing into userspace memory after\nthe recv() call has returned).\n\nIn this case, wait for all pending decryption requests.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_81-default-1-150600.13.3.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_81-default-1-150600.13.3.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_81-default-1-150600.13.3.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-64kb-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-64kb-devel-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-devel-6.4.0-150600.23.81.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-macros-6.4.0-150600.23.81.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-zfcpdump-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-docs-6.4.0-150600.23.81.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-source-6.4.0-150600.23.81.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP6:kernel-default-extra-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:dlm-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:dtb-allwinner-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-altera-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-amazon-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-amd-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-amlogic-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-apm-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-apple-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-arm-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-broadcom-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-cavium-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-exynos-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-freescale-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-hisilicon-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-lg-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-marvell-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-mediatek-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-nvidia-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-qcom-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-renesas-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-rockchip-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-socionext-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-sprd-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-xilinx-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-64kb-devel-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-64kb-extra-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-64kb-optional-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-debug-vdso-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.aarch64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.x86_64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.81.3.150600.12.36.3.aarch64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.81.3.150600.12.36.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.81.3.150600.12.36.3.x86_64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-vdso-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-devel-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-docs-6.4.0-150600.23.81.1.noarch",
"openSUSE Leap 15.6:kernel-docs-html-6.4.0-150600.23.81.1.noarch",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-vdso-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-macros-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.s390x",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.x86_64",
"openSUSE Leap 15.6:kernel-source-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-source-vanilla-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.ppc64le",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.s390x",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.x86_64",
"openSUSE Leap 15.6:kernel-zfcpdump-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kselftests-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40176",
"url": "https://www.suse.com/security/cve/CVE-2025-40176"
},
{
"category": "external",
"summary": "SUSE Bug 1253425 for CVE-2025-40176",
"url": "https://bugzilla.suse.com/1253425"
},
{
"category": "external",
"summary": "SUSE Bug 1254100 for CVE-2025-40176",
"url": "https://bugzilla.suse.com/1254100"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_81-default-1-150600.13.3.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_81-default-1-150600.13.3.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_81-default-1-150600.13.3.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-64kb-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-64kb-devel-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-devel-6.4.0-150600.23.81.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-macros-6.4.0-150600.23.81.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-zfcpdump-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-docs-6.4.0-150600.23.81.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-source-6.4.0-150600.23.81.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP6:kernel-default-extra-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:dlm-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:dtb-allwinner-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-altera-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-amazon-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-amd-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-amlogic-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-apm-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-apple-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-arm-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-broadcom-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-cavium-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-exynos-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-freescale-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-hisilicon-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-lg-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-marvell-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-mediatek-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-nvidia-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-qcom-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-renesas-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-rockchip-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-socionext-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-sprd-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-xilinx-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-64kb-devel-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-64kb-extra-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-64kb-optional-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-debug-vdso-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.aarch64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.x86_64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.81.3.150600.12.36.3.aarch64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.81.3.150600.12.36.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.81.3.150600.12.36.3.x86_64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-vdso-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-devel-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-docs-6.4.0-150600.23.81.1.noarch",
"openSUSE Leap 15.6:kernel-docs-html-6.4.0-150600.23.81.1.noarch",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-vdso-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-macros-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.s390x",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.x86_64",
"openSUSE Leap 15.6:kernel-source-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-source-vanilla-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.ppc64le",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.s390x",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.x86_64",
"openSUSE Leap 15.6:kernel-zfcpdump-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kselftests-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_81-default-1-150600.13.3.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_81-default-1-150600.13.3.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_81-default-1-150600.13.3.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-64kb-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-64kb-devel-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-devel-6.4.0-150600.23.81.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-macros-6.4.0-150600.23.81.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-zfcpdump-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-docs-6.4.0-150600.23.81.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-source-6.4.0-150600.23.81.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP6:kernel-default-extra-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:dlm-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:dtb-allwinner-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-altera-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-amazon-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-amd-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-amlogic-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-apm-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-apple-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-arm-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-broadcom-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-cavium-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-exynos-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-freescale-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-hisilicon-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-lg-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-marvell-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-mediatek-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-nvidia-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-qcom-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-renesas-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-rockchip-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-socionext-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-sprd-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-xilinx-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-64kb-devel-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-64kb-extra-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-64kb-optional-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-debug-vdso-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.aarch64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.x86_64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.81.3.150600.12.36.3.aarch64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.81.3.150600.12.36.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.81.3.150600.12.36.3.x86_64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-vdso-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-devel-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-docs-6.4.0-150600.23.81.1.noarch",
"openSUSE Leap 15.6:kernel-docs-html-6.4.0-150600.23.81.1.noarch",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-vdso-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-macros-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.s390x",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.x86_64",
"openSUSE Leap 15.6:kernel-source-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-source-vanilla-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.ppc64le",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.s390x",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.x86_64",
"openSUSE Leap 15.6:kernel-zfcpdump-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kselftests-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-17T10:52:47Z",
"details": "important"
}
],
"title": "CVE-2025-40176"
},
{
"cve": "CVE-2025-40180",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40180"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nmailbox: zynqmp-ipi: Fix out-of-bounds access in mailbox cleanup loop\n\nThe cleanup loop was starting at the wrong array index, causing\nout-of-bounds access.\nStart the loop at the correct index for zero-indexed arrays to prevent\naccessing memory beyond the allocated array bounds.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_81-default-1-150600.13.3.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_81-default-1-150600.13.3.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_81-default-1-150600.13.3.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-64kb-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-64kb-devel-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-devel-6.4.0-150600.23.81.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-macros-6.4.0-150600.23.81.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-zfcpdump-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-docs-6.4.0-150600.23.81.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-source-6.4.0-150600.23.81.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP6:kernel-default-extra-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:dlm-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:dtb-allwinner-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-altera-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-amazon-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-amd-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-amlogic-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-apm-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-apple-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-arm-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-broadcom-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-cavium-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-exynos-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-freescale-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-hisilicon-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-lg-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-marvell-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-mediatek-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-nvidia-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-qcom-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-renesas-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-rockchip-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-socionext-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-sprd-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-xilinx-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-64kb-devel-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-64kb-extra-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-64kb-optional-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-debug-vdso-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.aarch64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.x86_64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.81.3.150600.12.36.3.aarch64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.81.3.150600.12.36.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.81.3.150600.12.36.3.x86_64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-vdso-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-devel-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-docs-6.4.0-150600.23.81.1.noarch",
"openSUSE Leap 15.6:kernel-docs-html-6.4.0-150600.23.81.1.noarch",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-vdso-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-macros-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.s390x",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.x86_64",
"openSUSE Leap 15.6:kernel-source-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-source-vanilla-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.ppc64le",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.s390x",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.x86_64",
"openSUSE Leap 15.6:kernel-zfcpdump-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kselftests-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40180",
"url": "https://www.suse.com/security/cve/CVE-2025-40180"
},
{
"category": "external",
"summary": "SUSE Bug 1253440 for CVE-2025-40180",
"url": "https://bugzilla.suse.com/1253440"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_81-default-1-150600.13.3.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_81-default-1-150600.13.3.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_81-default-1-150600.13.3.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-64kb-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-64kb-devel-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-devel-6.4.0-150600.23.81.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-macros-6.4.0-150600.23.81.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-zfcpdump-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-docs-6.4.0-150600.23.81.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-source-6.4.0-150600.23.81.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP6:kernel-default-extra-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:dlm-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:dtb-allwinner-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-altera-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-amazon-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-amd-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-amlogic-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-apm-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-apple-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-arm-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-broadcom-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-cavium-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-exynos-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-freescale-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-hisilicon-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-lg-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-marvell-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-mediatek-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-nvidia-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-qcom-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-renesas-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-rockchip-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-socionext-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-sprd-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-xilinx-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-64kb-devel-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-64kb-extra-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-64kb-optional-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-debug-vdso-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.aarch64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.x86_64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.81.3.150600.12.36.3.aarch64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.81.3.150600.12.36.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.81.3.150600.12.36.3.x86_64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-vdso-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-devel-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-docs-6.4.0-150600.23.81.1.noarch",
"openSUSE Leap 15.6:kernel-docs-html-6.4.0-150600.23.81.1.noarch",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-vdso-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-macros-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.s390x",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.x86_64",
"openSUSE Leap 15.6:kernel-source-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-source-vanilla-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.ppc64le",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.s390x",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.x86_64",
"openSUSE Leap 15.6:kernel-zfcpdump-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kselftests-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_81-default-1-150600.13.3.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_81-default-1-150600.13.3.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_81-default-1-150600.13.3.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-64kb-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-64kb-devel-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-devel-6.4.0-150600.23.81.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-macros-6.4.0-150600.23.81.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-zfcpdump-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-docs-6.4.0-150600.23.81.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-source-6.4.0-150600.23.81.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP6:kernel-default-extra-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:dlm-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:dtb-allwinner-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-altera-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-amazon-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-amd-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-amlogic-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-apm-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-apple-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-arm-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-broadcom-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-cavium-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-exynos-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-freescale-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-hisilicon-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-lg-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-marvell-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-mediatek-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-nvidia-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-qcom-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-renesas-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-rockchip-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-socionext-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-sprd-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-xilinx-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-64kb-devel-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-64kb-extra-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-64kb-optional-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-debug-vdso-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.aarch64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.x86_64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.81.3.150600.12.36.3.aarch64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.81.3.150600.12.36.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.81.3.150600.12.36.3.x86_64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-vdso-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-devel-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-docs-6.4.0-150600.23.81.1.noarch",
"openSUSE Leap 15.6:kernel-docs-html-6.4.0-150600.23.81.1.noarch",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-vdso-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-macros-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.s390x",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.x86_64",
"openSUSE Leap 15.6:kernel-source-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-source-vanilla-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.ppc64le",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.s390x",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.x86_64",
"openSUSE Leap 15.6:kernel-zfcpdump-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kselftests-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-17T10:52:47Z",
"details": "moderate"
}
],
"title": "CVE-2025-40180"
},
{
"cve": "CVE-2025-40183",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40183"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nbpf: Fix metadata_dst leak __bpf_redirect_neigh_v{4,6}\n\nCilium has a BPF egress gateway feature which forces outgoing K8s Pod\ntraffic to pass through dedicated egress gateways which then SNAT the\ntraffic in order to interact with stable IPs outside the cluster.\n\nThe traffic is directed to the gateway via vxlan tunnel in collect md\nmode. A recent BPF change utilized the bpf_redirect_neigh() helper to\nforward packets after the arrival and decap on vxlan, which turned out\nover time that the kmalloc-256 slab usage in kernel was ever-increasing.\n\nThe issue was that vxlan allocates the metadata_dst object and attaches\nit through a fake dst entry to the skb. The latter was never released\nthough given bpf_redirect_neigh() was merely setting the new dst entry\nvia skb_dst_set() without dropping an existing one first.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_81-default-1-150600.13.3.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_81-default-1-150600.13.3.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_81-default-1-150600.13.3.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-64kb-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-64kb-devel-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-devel-6.4.0-150600.23.81.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-macros-6.4.0-150600.23.81.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-zfcpdump-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-docs-6.4.0-150600.23.81.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-source-6.4.0-150600.23.81.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP6:kernel-default-extra-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:dlm-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:dtb-allwinner-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-altera-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-amazon-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-amd-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-amlogic-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-apm-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-apple-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-arm-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-broadcom-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-cavium-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-exynos-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-freescale-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-hisilicon-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-lg-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-marvell-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-mediatek-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-nvidia-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-qcom-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-renesas-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-rockchip-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-socionext-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-sprd-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-xilinx-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-64kb-devel-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-64kb-extra-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-64kb-optional-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-debug-vdso-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.aarch64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.x86_64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.81.3.150600.12.36.3.aarch64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.81.3.150600.12.36.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.81.3.150600.12.36.3.x86_64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-vdso-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-devel-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-docs-6.4.0-150600.23.81.1.noarch",
"openSUSE Leap 15.6:kernel-docs-html-6.4.0-150600.23.81.1.noarch",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-vdso-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-macros-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.s390x",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.x86_64",
"openSUSE Leap 15.6:kernel-source-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-source-vanilla-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.ppc64le",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.s390x",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.x86_64",
"openSUSE Leap 15.6:kernel-zfcpdump-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kselftests-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40183",
"url": "https://www.suse.com/security/cve/CVE-2025-40183"
},
{
"category": "external",
"summary": "SUSE Bug 1253441 for CVE-2025-40183",
"url": "https://bugzilla.suse.com/1253441"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_81-default-1-150600.13.3.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_81-default-1-150600.13.3.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_81-default-1-150600.13.3.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-64kb-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-64kb-devel-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-devel-6.4.0-150600.23.81.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-macros-6.4.0-150600.23.81.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-zfcpdump-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-docs-6.4.0-150600.23.81.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-source-6.4.0-150600.23.81.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP6:kernel-default-extra-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:dlm-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:dtb-allwinner-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-altera-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-amazon-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-amd-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-amlogic-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-apm-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-apple-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-arm-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-broadcom-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-cavium-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-exynos-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-freescale-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-hisilicon-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-lg-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-marvell-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-mediatek-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-nvidia-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-qcom-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-renesas-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-rockchip-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-socionext-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-sprd-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-xilinx-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-64kb-devel-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-64kb-extra-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-64kb-optional-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-debug-vdso-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.aarch64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.x86_64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.81.3.150600.12.36.3.aarch64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.81.3.150600.12.36.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.81.3.150600.12.36.3.x86_64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-vdso-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-devel-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-docs-6.4.0-150600.23.81.1.noarch",
"openSUSE Leap 15.6:kernel-docs-html-6.4.0-150600.23.81.1.noarch",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-vdso-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-macros-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.s390x",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.x86_64",
"openSUSE Leap 15.6:kernel-source-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-source-vanilla-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.ppc64le",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.s390x",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.x86_64",
"openSUSE Leap 15.6:kernel-zfcpdump-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kselftests-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_81-default-1-150600.13.3.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_81-default-1-150600.13.3.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_81-default-1-150600.13.3.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-64kb-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-64kb-devel-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-devel-6.4.0-150600.23.81.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-macros-6.4.0-150600.23.81.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-zfcpdump-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-docs-6.4.0-150600.23.81.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-source-6.4.0-150600.23.81.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP6:kernel-default-extra-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:dlm-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:dtb-allwinner-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-altera-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-amazon-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-amd-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-amlogic-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-apm-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-apple-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-arm-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-broadcom-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-cavium-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-exynos-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-freescale-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-hisilicon-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-lg-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-marvell-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-mediatek-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-nvidia-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-qcom-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-renesas-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-rockchip-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-socionext-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-sprd-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-xilinx-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-64kb-devel-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-64kb-extra-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-64kb-optional-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-debug-vdso-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.aarch64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.x86_64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.81.3.150600.12.36.3.aarch64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.81.3.150600.12.36.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.81.3.150600.12.36.3.x86_64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-vdso-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-devel-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-docs-6.4.0-150600.23.81.1.noarch",
"openSUSE Leap 15.6:kernel-docs-html-6.4.0-150600.23.81.1.noarch",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-vdso-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-macros-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.s390x",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.x86_64",
"openSUSE Leap 15.6:kernel-source-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-source-vanilla-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.ppc64le",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.s390x",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.x86_64",
"openSUSE Leap 15.6:kernel-zfcpdump-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kselftests-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-17T10:52:47Z",
"details": "moderate"
}
],
"title": "CVE-2025-40183"
},
{
"cve": "CVE-2025-40186",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40186"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\ntcp: Don\u0027t call reqsk_fastopen_remove() in tcp_conn_request().\n\nsyzbot reported the splat below in tcp_conn_request(). [0]\n\nIf a listener is close()d while a TFO socket is being processed in\ntcp_conn_request(), inet_csk_reqsk_queue_add() does not set reqsk-\u003esk\nand calls inet_child_forget(), which calls tcp_disconnect() for the\nTFO socket.\n\nAfter the cited commit, tcp_disconnect() calls reqsk_fastopen_remove(),\nwhere reqsk_put() is called due to !reqsk-\u003esk.\n\nThen, reqsk_fastopen_remove() in tcp_conn_request() decrements the\nlast req-\u003ersk_refcnt and frees reqsk, and __reqsk_free() at the\ndrop_and_free label causes the refcount underflow for the listener\nand double-free of the reqsk.\n\nLet\u0027s remove reqsk_fastopen_remove() in tcp_conn_request().\n\nNote that other callers make sure tp-\u003efastopen_rsk is not NULL.\n\n[0]:\nrefcount_t: underflow; use-after-free.\nWARNING: CPU: 12 PID: 5563 at lib/refcount.c:28 refcount_warn_saturate (lib/refcount.c:28)\nModules linked in:\nCPU: 12 UID: 0 PID: 5563 Comm: syz-executor Not tainted syzkaller #0 PREEMPT(full)\nHardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025\nRIP: 0010:refcount_warn_saturate (lib/refcount.c:28)\nCode: ab e8 8e b4 98 ff 0f 0b c3 cc cc cc cc cc 80 3d a4 e4 d6 01 00 75 9c c6 05 9b e4 d6 01 01 48 c7 c7 e8 df fb ab e8 6a b4 98 ff \u003c0f\u003e 0b e9 03 5b 76 00 cc 80 3d 7d e4 d6 01 00 0f 85 74 ff ff ff c6\nRSP: 0018:ffffa79fc0304a98 EFLAGS: 00010246\nRAX: d83af4db1c6b3900 RBX: ffff9f65c7a69020 RCX: d83af4db1c6b3900\nRDX: 0000000000000000 RSI: 00000000ffff7fff RDI: ffffffffac78a280\nRBP: 000000009d781b60 R08: 0000000000007fff R09: ffffffffac6ca280\nR10: 0000000000017ffd R11: 0000000000000004 R12: ffff9f65c7b4f100\nR13: ffff9f65c7d23c00 R14: ffff9f65c7d26000 R15: ffff9f65c7a64ef8\nFS: 00007f9f962176c0(0000) GS:ffff9f65fcf00000(0000) knlGS:0000000000000000\nCS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033\nCR2: 0000200000000180 CR3: 000000000dbbe006 CR4: 0000000000372ef0\nCall Trace:\n \u003cIRQ\u003e\n tcp_conn_request (./include/linux/refcount.h:400 ./include/linux/refcount.h:432 ./include/linux/refcount.h:450 ./include/net/sock.h:1965 ./include/net/request_sock.h:131 net/ipv4/tcp_input.c:7301)\n tcp_rcv_state_process (net/ipv4/tcp_input.c:6708)\n tcp_v6_do_rcv (net/ipv6/tcp_ipv6.c:1670)\n tcp_v6_rcv (net/ipv6/tcp_ipv6.c:1906)\n ip6_protocol_deliver_rcu (net/ipv6/ip6_input.c:438)\n ip6_input (net/ipv6/ip6_input.c:500)\n ipv6_rcv (net/ipv6/ip6_input.c:311)\n __netif_receive_skb (net/core/dev.c:6104)\n process_backlog (net/core/dev.c:6456)\n __napi_poll (net/core/dev.c:7506)\n net_rx_action (net/core/dev.c:7569 net/core/dev.c:7696)\n handle_softirqs (kernel/softirq.c:579)\n do_softirq (kernel/softirq.c:480)\n \u003c/IRQ\u003e",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_81-default-1-150600.13.3.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_81-default-1-150600.13.3.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_81-default-1-150600.13.3.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-64kb-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-64kb-devel-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-devel-6.4.0-150600.23.81.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-macros-6.4.0-150600.23.81.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-zfcpdump-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-docs-6.4.0-150600.23.81.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-source-6.4.0-150600.23.81.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP6:kernel-default-extra-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:dlm-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:dtb-allwinner-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-altera-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-amazon-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-amd-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-amlogic-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-apm-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-apple-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-arm-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-broadcom-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-cavium-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-exynos-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-freescale-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-hisilicon-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-lg-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-marvell-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-mediatek-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-nvidia-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-qcom-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-renesas-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-rockchip-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-socionext-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-sprd-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-xilinx-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-64kb-devel-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-64kb-extra-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-64kb-optional-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-debug-vdso-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.aarch64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.x86_64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.81.3.150600.12.36.3.aarch64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.81.3.150600.12.36.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.81.3.150600.12.36.3.x86_64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-vdso-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-devel-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-docs-6.4.0-150600.23.81.1.noarch",
"openSUSE Leap 15.6:kernel-docs-html-6.4.0-150600.23.81.1.noarch",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-vdso-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-macros-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.s390x",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.x86_64",
"openSUSE Leap 15.6:kernel-source-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-source-vanilla-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.ppc64le",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.s390x",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.x86_64",
"openSUSE Leap 15.6:kernel-zfcpdump-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kselftests-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40186",
"url": "https://www.suse.com/security/cve/CVE-2025-40186"
},
{
"category": "external",
"summary": "SUSE Bug 1253438 for CVE-2025-40186",
"url": "https://bugzilla.suse.com/1253438"
},
{
"category": "external",
"summary": "SUSE Bug 1253439 for CVE-2025-40186",
"url": "https://bugzilla.suse.com/1253439"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_81-default-1-150600.13.3.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_81-default-1-150600.13.3.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_81-default-1-150600.13.3.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-64kb-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-64kb-devel-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-devel-6.4.0-150600.23.81.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-macros-6.4.0-150600.23.81.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-zfcpdump-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-docs-6.4.0-150600.23.81.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-source-6.4.0-150600.23.81.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP6:kernel-default-extra-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:dlm-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:dtb-allwinner-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-altera-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-amazon-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-amd-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-amlogic-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-apm-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-apple-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-arm-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-broadcom-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-cavium-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-exynos-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-freescale-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-hisilicon-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-lg-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-marvell-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-mediatek-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-nvidia-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-qcom-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-renesas-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-rockchip-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-socionext-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-sprd-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-xilinx-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-64kb-devel-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-64kb-extra-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-64kb-optional-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-debug-vdso-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.aarch64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.x86_64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.81.3.150600.12.36.3.aarch64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.81.3.150600.12.36.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.81.3.150600.12.36.3.x86_64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-vdso-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-devel-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-docs-6.4.0-150600.23.81.1.noarch",
"openSUSE Leap 15.6:kernel-docs-html-6.4.0-150600.23.81.1.noarch",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-vdso-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-macros-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.s390x",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.x86_64",
"openSUSE Leap 15.6:kernel-source-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-source-vanilla-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.ppc64le",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.s390x",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.x86_64",
"openSUSE Leap 15.6:kernel-zfcpdump-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kselftests-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_81-default-1-150600.13.3.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_81-default-1-150600.13.3.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_81-default-1-150600.13.3.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-64kb-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-64kb-devel-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-devel-6.4.0-150600.23.81.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-macros-6.4.0-150600.23.81.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-zfcpdump-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-docs-6.4.0-150600.23.81.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-source-6.4.0-150600.23.81.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP6:kernel-default-extra-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:dlm-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:dtb-allwinner-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-altera-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-amazon-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-amd-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-amlogic-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-apm-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-apple-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-arm-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-broadcom-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-cavium-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-exynos-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-freescale-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-hisilicon-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-lg-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-marvell-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-mediatek-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-nvidia-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-qcom-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-renesas-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-rockchip-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-socionext-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-sprd-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-xilinx-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-64kb-devel-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-64kb-extra-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-64kb-optional-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-debug-vdso-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.aarch64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.x86_64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.81.3.150600.12.36.3.aarch64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.81.3.150600.12.36.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.81.3.150600.12.36.3.x86_64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-vdso-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-devel-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-docs-6.4.0-150600.23.81.1.noarch",
"openSUSE Leap 15.6:kernel-docs-html-6.4.0-150600.23.81.1.noarch",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-vdso-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-macros-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.s390x",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.x86_64",
"openSUSE Leap 15.6:kernel-source-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-source-vanilla-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.ppc64le",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.s390x",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.x86_64",
"openSUSE Leap 15.6:kernel-zfcpdump-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kselftests-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-17T10:52:47Z",
"details": "important"
}
],
"title": "CVE-2025-40186"
},
{
"cve": "CVE-2025-40188",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40188"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\npwm: berlin: Fix wrong register in suspend/resume\n\nThe \u0027enable\u0027 register should be BERLIN_PWM_EN rather than\nBERLIN_PWM_ENABLE, otherwise, the driver accesses wrong address, there\nwill be cpu exception then kernel panic during suspend/resume.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_81-default-1-150600.13.3.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_81-default-1-150600.13.3.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_81-default-1-150600.13.3.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-64kb-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-64kb-devel-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-devel-6.4.0-150600.23.81.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-macros-6.4.0-150600.23.81.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-zfcpdump-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-docs-6.4.0-150600.23.81.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-source-6.4.0-150600.23.81.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP6:kernel-default-extra-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:dlm-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:dtb-allwinner-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-altera-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-amazon-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-amd-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-amlogic-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-apm-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-apple-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-arm-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-broadcom-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-cavium-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-exynos-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-freescale-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-hisilicon-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-lg-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-marvell-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-mediatek-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-nvidia-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-qcom-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-renesas-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-rockchip-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-socionext-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-sprd-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-xilinx-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-64kb-devel-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-64kb-extra-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-64kb-optional-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-debug-vdso-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.aarch64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.x86_64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.81.3.150600.12.36.3.aarch64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.81.3.150600.12.36.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.81.3.150600.12.36.3.x86_64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-vdso-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-devel-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-docs-6.4.0-150600.23.81.1.noarch",
"openSUSE Leap 15.6:kernel-docs-html-6.4.0-150600.23.81.1.noarch",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-vdso-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-macros-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.s390x",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.x86_64",
"openSUSE Leap 15.6:kernel-source-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-source-vanilla-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.ppc64le",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.s390x",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.x86_64",
"openSUSE Leap 15.6:kernel-zfcpdump-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kselftests-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40188",
"url": "https://www.suse.com/security/cve/CVE-2025-40188"
},
{
"category": "external",
"summary": "SUSE Bug 1253449 for CVE-2025-40188",
"url": "https://bugzilla.suse.com/1253449"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_81-default-1-150600.13.3.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_81-default-1-150600.13.3.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_81-default-1-150600.13.3.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-64kb-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-64kb-devel-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-devel-6.4.0-150600.23.81.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-macros-6.4.0-150600.23.81.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-zfcpdump-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-docs-6.4.0-150600.23.81.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-source-6.4.0-150600.23.81.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP6:kernel-default-extra-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:dlm-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:dtb-allwinner-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-altera-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-amazon-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-amd-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-amlogic-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-apm-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-apple-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-arm-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-broadcom-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-cavium-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-exynos-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-freescale-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-hisilicon-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-lg-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-marvell-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-mediatek-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-nvidia-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-qcom-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-renesas-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-rockchip-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-socionext-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-sprd-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-xilinx-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-64kb-devel-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-64kb-extra-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-64kb-optional-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-debug-vdso-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.aarch64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.x86_64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.81.3.150600.12.36.3.aarch64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.81.3.150600.12.36.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.81.3.150600.12.36.3.x86_64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-vdso-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-devel-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-docs-6.4.0-150600.23.81.1.noarch",
"openSUSE Leap 15.6:kernel-docs-html-6.4.0-150600.23.81.1.noarch",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-vdso-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-macros-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.s390x",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.x86_64",
"openSUSE Leap 15.6:kernel-source-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-source-vanilla-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.ppc64le",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.s390x",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.x86_64",
"openSUSE Leap 15.6:kernel-zfcpdump-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kselftests-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_81-default-1-150600.13.3.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_81-default-1-150600.13.3.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_81-default-1-150600.13.3.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-64kb-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-64kb-devel-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-devel-6.4.0-150600.23.81.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-macros-6.4.0-150600.23.81.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-zfcpdump-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-docs-6.4.0-150600.23.81.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-source-6.4.0-150600.23.81.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP6:kernel-default-extra-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:dlm-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:dtb-allwinner-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-altera-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-amazon-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-amd-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-amlogic-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-apm-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-apple-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-arm-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-broadcom-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-cavium-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-exynos-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-freescale-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-hisilicon-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-lg-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-marvell-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-mediatek-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-nvidia-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-qcom-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-renesas-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-rockchip-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-socionext-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-sprd-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-xilinx-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-64kb-devel-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-64kb-extra-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-64kb-optional-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-debug-vdso-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.aarch64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.x86_64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.81.3.150600.12.36.3.aarch64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.81.3.150600.12.36.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.81.3.150600.12.36.3.x86_64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-vdso-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-devel-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-docs-6.4.0-150600.23.81.1.noarch",
"openSUSE Leap 15.6:kernel-docs-html-6.4.0-150600.23.81.1.noarch",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-vdso-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-macros-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.s390x",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.x86_64",
"openSUSE Leap 15.6:kernel-source-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-source-vanilla-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.ppc64le",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.s390x",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.x86_64",
"openSUSE Leap 15.6:kernel-zfcpdump-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kselftests-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-17T10:52:47Z",
"details": "moderate"
}
],
"title": "CVE-2025-40188"
},
{
"cve": "CVE-2025-40194",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40194"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\ncpufreq: intel_pstate: Fix object lifecycle issue in update_qos_request()\n\nThe cpufreq_cpu_put() call in update_qos_request() takes place too early\nbecause the latter subsequently calls freq_qos_update_request() that\nindirectly accesses the policy object in question through the QoS request\nobject passed to it.\n\nFortunately, update_qos_request() is called under intel_pstate_driver_lock,\nso this issue does not matter for changing the intel_pstate operation\nmode, but it theoretically can cause a crash to occur on CPU device hot\nremoval (which currently can only happen in virt, but it is formally\nsupported nevertheless).\n\nAddress this issue by modifying update_qos_request() to drop the\nreference to the policy later.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_81-default-1-150600.13.3.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_81-default-1-150600.13.3.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_81-default-1-150600.13.3.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-64kb-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-64kb-devel-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-devel-6.4.0-150600.23.81.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-macros-6.4.0-150600.23.81.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-zfcpdump-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-docs-6.4.0-150600.23.81.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-source-6.4.0-150600.23.81.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP6:kernel-default-extra-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:dlm-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:dtb-allwinner-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-altera-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-amazon-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-amd-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-amlogic-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-apm-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-apple-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-arm-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-broadcom-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-cavium-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-exynos-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-freescale-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-hisilicon-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-lg-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-marvell-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-mediatek-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-nvidia-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-qcom-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-renesas-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-rockchip-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-socionext-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-sprd-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-xilinx-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-64kb-devel-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-64kb-extra-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-64kb-optional-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-debug-vdso-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.aarch64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.x86_64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.81.3.150600.12.36.3.aarch64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.81.3.150600.12.36.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.81.3.150600.12.36.3.x86_64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-vdso-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-devel-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-docs-6.4.0-150600.23.81.1.noarch",
"openSUSE Leap 15.6:kernel-docs-html-6.4.0-150600.23.81.1.noarch",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-vdso-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-macros-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.s390x",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.x86_64",
"openSUSE Leap 15.6:kernel-source-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-source-vanilla-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.ppc64le",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.s390x",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.x86_64",
"openSUSE Leap 15.6:kernel-zfcpdump-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kselftests-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40194",
"url": "https://www.suse.com/security/cve/CVE-2025-40194"
},
{
"category": "external",
"summary": "SUSE Bug 1253445 for CVE-2025-40194",
"url": "https://bugzilla.suse.com/1253445"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_81-default-1-150600.13.3.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_81-default-1-150600.13.3.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_81-default-1-150600.13.3.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-64kb-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-64kb-devel-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-devel-6.4.0-150600.23.81.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-macros-6.4.0-150600.23.81.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-zfcpdump-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-docs-6.4.0-150600.23.81.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-source-6.4.0-150600.23.81.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP6:kernel-default-extra-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:dlm-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:dtb-allwinner-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-altera-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-amazon-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-amd-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-amlogic-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-apm-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-apple-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-arm-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-broadcom-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-cavium-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-exynos-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-freescale-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-hisilicon-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-lg-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-marvell-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-mediatek-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-nvidia-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-qcom-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-renesas-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-rockchip-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-socionext-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-sprd-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-xilinx-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-64kb-devel-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-64kb-extra-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-64kb-optional-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-debug-vdso-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.aarch64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.x86_64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.81.3.150600.12.36.3.aarch64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.81.3.150600.12.36.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.81.3.150600.12.36.3.x86_64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-vdso-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-devel-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-docs-6.4.0-150600.23.81.1.noarch",
"openSUSE Leap 15.6:kernel-docs-html-6.4.0-150600.23.81.1.noarch",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-vdso-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-macros-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.s390x",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.x86_64",
"openSUSE Leap 15.6:kernel-source-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-source-vanilla-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.ppc64le",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.s390x",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.x86_64",
"openSUSE Leap 15.6:kernel-zfcpdump-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kselftests-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.7,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_81-default-1-150600.13.3.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_81-default-1-150600.13.3.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_81-default-1-150600.13.3.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-64kb-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-64kb-devel-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-devel-6.4.0-150600.23.81.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-macros-6.4.0-150600.23.81.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-zfcpdump-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-docs-6.4.0-150600.23.81.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-source-6.4.0-150600.23.81.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP6:kernel-default-extra-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:dlm-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:dtb-allwinner-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-altera-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-amazon-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-amd-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-amlogic-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-apm-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-apple-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-arm-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-broadcom-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-cavium-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-exynos-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-freescale-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-hisilicon-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-lg-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-marvell-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-mediatek-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-nvidia-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-qcom-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-renesas-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-rockchip-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-socionext-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-sprd-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-xilinx-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-64kb-devel-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-64kb-extra-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-64kb-optional-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-debug-vdso-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.aarch64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.x86_64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.81.3.150600.12.36.3.aarch64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.81.3.150600.12.36.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.81.3.150600.12.36.3.x86_64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-vdso-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-devel-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-docs-6.4.0-150600.23.81.1.noarch",
"openSUSE Leap 15.6:kernel-docs-html-6.4.0-150600.23.81.1.noarch",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-vdso-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-macros-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.s390x",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.x86_64",
"openSUSE Leap 15.6:kernel-source-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-source-vanilla-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.ppc64le",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.s390x",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.x86_64",
"openSUSE Leap 15.6:kernel-zfcpdump-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kselftests-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-17T10:52:47Z",
"details": "moderate"
}
],
"title": "CVE-2025-40194"
},
{
"cve": "CVE-2025-40198",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40198"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\next4: avoid potential buffer over-read in parse_apply_sb_mount_options()\n\nUnlike other strings in the ext4 superblock, we rely on tune2fs to\nmake sure s_mount_opts is NUL terminated. Harden\nparse_apply_sb_mount_options() by treating s_mount_opts as a potential\n__nonstring.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_81-default-1-150600.13.3.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_81-default-1-150600.13.3.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_81-default-1-150600.13.3.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-64kb-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-64kb-devel-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-devel-6.4.0-150600.23.81.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-macros-6.4.0-150600.23.81.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-zfcpdump-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-docs-6.4.0-150600.23.81.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-source-6.4.0-150600.23.81.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP6:kernel-default-extra-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:dlm-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:dtb-allwinner-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-altera-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-amazon-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-amd-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-amlogic-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-apm-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-apple-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-arm-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-broadcom-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-cavium-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-exynos-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-freescale-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-hisilicon-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-lg-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-marvell-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-mediatek-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-nvidia-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-qcom-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-renesas-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-rockchip-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-socionext-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-sprd-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-xilinx-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-64kb-devel-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-64kb-extra-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-64kb-optional-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-debug-vdso-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.aarch64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.x86_64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.81.3.150600.12.36.3.aarch64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.81.3.150600.12.36.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.81.3.150600.12.36.3.x86_64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-vdso-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-devel-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-docs-6.4.0-150600.23.81.1.noarch",
"openSUSE Leap 15.6:kernel-docs-html-6.4.0-150600.23.81.1.noarch",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-vdso-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-macros-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.s390x",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.x86_64",
"openSUSE Leap 15.6:kernel-source-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-source-vanilla-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.ppc64le",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.s390x",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.x86_64",
"openSUSE Leap 15.6:kernel-zfcpdump-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kselftests-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40198",
"url": "https://www.suse.com/security/cve/CVE-2025-40198"
},
{
"category": "external",
"summary": "SUSE Bug 1253453 for CVE-2025-40198",
"url": "https://bugzilla.suse.com/1253453"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_81-default-1-150600.13.3.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_81-default-1-150600.13.3.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_81-default-1-150600.13.3.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-64kb-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-64kb-devel-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-devel-6.4.0-150600.23.81.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-macros-6.4.0-150600.23.81.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-zfcpdump-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-docs-6.4.0-150600.23.81.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-source-6.4.0-150600.23.81.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP6:kernel-default-extra-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:dlm-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:dtb-allwinner-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-altera-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-amazon-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-amd-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-amlogic-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-apm-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-apple-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-arm-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-broadcom-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-cavium-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-exynos-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-freescale-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-hisilicon-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-lg-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-marvell-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-mediatek-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-nvidia-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-qcom-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-renesas-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-rockchip-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-socionext-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-sprd-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-xilinx-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-64kb-devel-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-64kb-extra-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-64kb-optional-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-debug-vdso-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.aarch64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.x86_64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.81.3.150600.12.36.3.aarch64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.81.3.150600.12.36.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.81.3.150600.12.36.3.x86_64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-vdso-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-devel-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-docs-6.4.0-150600.23.81.1.noarch",
"openSUSE Leap 15.6:kernel-docs-html-6.4.0-150600.23.81.1.noarch",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-vdso-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-macros-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.s390x",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.x86_64",
"openSUSE Leap 15.6:kernel-source-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-source-vanilla-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.ppc64le",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.s390x",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.x86_64",
"openSUSE Leap 15.6:kernel-zfcpdump-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kselftests-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_81-default-1-150600.13.3.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_81-default-1-150600.13.3.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_81-default-1-150600.13.3.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-64kb-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-64kb-devel-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-devel-6.4.0-150600.23.81.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-macros-6.4.0-150600.23.81.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-zfcpdump-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-docs-6.4.0-150600.23.81.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-source-6.4.0-150600.23.81.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP6:kernel-default-extra-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:dlm-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:dtb-allwinner-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-altera-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-amazon-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-amd-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-amlogic-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-apm-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-apple-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-arm-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-broadcom-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-cavium-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-exynos-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-freescale-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-hisilicon-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-lg-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-marvell-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-mediatek-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-nvidia-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-qcom-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-renesas-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-rockchip-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-socionext-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-sprd-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-xilinx-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-64kb-devel-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-64kb-extra-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-64kb-optional-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-debug-vdso-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.aarch64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.x86_64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.81.3.150600.12.36.3.aarch64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.81.3.150600.12.36.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.81.3.150600.12.36.3.x86_64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-vdso-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-devel-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-docs-6.4.0-150600.23.81.1.noarch",
"openSUSE Leap 15.6:kernel-docs-html-6.4.0-150600.23.81.1.noarch",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-vdso-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-macros-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.s390x",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.x86_64",
"openSUSE Leap 15.6:kernel-source-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-source-vanilla-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.ppc64le",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.s390x",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.x86_64",
"openSUSE Leap 15.6:kernel-zfcpdump-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kselftests-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-17T10:52:47Z",
"details": "moderate"
}
],
"title": "CVE-2025-40198"
},
{
"cve": "CVE-2025-40200",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40200"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nSquashfs: reject negative file sizes in squashfs_read_inode()\n\nSyskaller reports a \"WARNING in ovl_copy_up_file\" in overlayfs.\n\nThis warning is ultimately caused because the underlying Squashfs file\nsystem returns a file with a negative file size.\n\nThis commit checks for a negative file size and returns EINVAL.\n\n[phillip@squashfs.org.uk: only need to check 64 bit quantity]",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_81-default-1-150600.13.3.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_81-default-1-150600.13.3.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_81-default-1-150600.13.3.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-64kb-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-64kb-devel-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-devel-6.4.0-150600.23.81.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-macros-6.4.0-150600.23.81.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-zfcpdump-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-docs-6.4.0-150600.23.81.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-source-6.4.0-150600.23.81.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP6:kernel-default-extra-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:dlm-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:dtb-allwinner-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-altera-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-amazon-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-amd-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-amlogic-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-apm-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-apple-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-arm-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-broadcom-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-cavium-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-exynos-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-freescale-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-hisilicon-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-lg-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-marvell-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-mediatek-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-nvidia-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-qcom-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-renesas-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-rockchip-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-socionext-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-sprd-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-xilinx-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-64kb-devel-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-64kb-extra-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-64kb-optional-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-debug-vdso-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.aarch64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.x86_64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.81.3.150600.12.36.3.aarch64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.81.3.150600.12.36.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.81.3.150600.12.36.3.x86_64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-vdso-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-devel-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-docs-6.4.0-150600.23.81.1.noarch",
"openSUSE Leap 15.6:kernel-docs-html-6.4.0-150600.23.81.1.noarch",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-vdso-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-macros-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.s390x",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.x86_64",
"openSUSE Leap 15.6:kernel-source-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-source-vanilla-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.ppc64le",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.s390x",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.x86_64",
"openSUSE Leap 15.6:kernel-zfcpdump-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kselftests-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40200",
"url": "https://www.suse.com/security/cve/CVE-2025-40200"
},
{
"category": "external",
"summary": "SUSE Bug 1253448 for CVE-2025-40200",
"url": "https://bugzilla.suse.com/1253448"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_81-default-1-150600.13.3.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_81-default-1-150600.13.3.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_81-default-1-150600.13.3.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-64kb-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-64kb-devel-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-devel-6.4.0-150600.23.81.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-macros-6.4.0-150600.23.81.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-zfcpdump-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-docs-6.4.0-150600.23.81.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-source-6.4.0-150600.23.81.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP6:kernel-default-extra-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:dlm-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:dtb-allwinner-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-altera-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-amazon-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-amd-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-amlogic-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-apm-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-apple-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-arm-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-broadcom-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-cavium-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-exynos-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-freescale-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-hisilicon-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-lg-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-marvell-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-mediatek-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-nvidia-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-qcom-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-renesas-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-rockchip-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-socionext-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-sprd-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-xilinx-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-64kb-devel-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-64kb-extra-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-64kb-optional-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-debug-vdso-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.aarch64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.x86_64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.81.3.150600.12.36.3.aarch64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.81.3.150600.12.36.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.81.3.150600.12.36.3.x86_64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-vdso-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-devel-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-docs-6.4.0-150600.23.81.1.noarch",
"openSUSE Leap 15.6:kernel-docs-html-6.4.0-150600.23.81.1.noarch",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-vdso-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-macros-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.s390x",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.x86_64",
"openSUSE Leap 15.6:kernel-source-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-source-vanilla-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.ppc64le",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.s390x",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.x86_64",
"openSUSE Leap 15.6:kernel-zfcpdump-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kselftests-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_81-default-1-150600.13.3.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_81-default-1-150600.13.3.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_81-default-1-150600.13.3.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-64kb-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-64kb-devel-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-devel-6.4.0-150600.23.81.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-macros-6.4.0-150600.23.81.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-zfcpdump-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-docs-6.4.0-150600.23.81.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-source-6.4.0-150600.23.81.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP6:kernel-default-extra-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:dlm-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:dtb-allwinner-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-altera-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-amazon-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-amd-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-amlogic-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-apm-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-apple-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-arm-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-broadcom-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-cavium-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-exynos-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-freescale-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-hisilicon-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-lg-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-marvell-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-mediatek-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-nvidia-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-qcom-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-renesas-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-rockchip-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-socionext-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-sprd-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-xilinx-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-64kb-devel-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-64kb-extra-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-64kb-optional-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-debug-vdso-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.aarch64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.x86_64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.81.3.150600.12.36.3.aarch64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.81.3.150600.12.36.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.81.3.150600.12.36.3.x86_64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-vdso-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-devel-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-docs-6.4.0-150600.23.81.1.noarch",
"openSUSE Leap 15.6:kernel-docs-html-6.4.0-150600.23.81.1.noarch",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-vdso-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-macros-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.s390x",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.x86_64",
"openSUSE Leap 15.6:kernel-source-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-source-vanilla-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.ppc64le",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.s390x",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.x86_64",
"openSUSE Leap 15.6:kernel-zfcpdump-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kselftests-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-17T10:52:47Z",
"details": "moderate"
}
],
"title": "CVE-2025-40200"
},
{
"cve": "CVE-2025-40204",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40204"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nsctp: Fix MAC comparison to be constant-time\n\nTo prevent timing attacks, MACs need to be compared in constant time.\nUse the appropriate helper function for this.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_81-default-1-150600.13.3.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_81-default-1-150600.13.3.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_81-default-1-150600.13.3.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-64kb-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-64kb-devel-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-devel-6.4.0-150600.23.81.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-macros-6.4.0-150600.23.81.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-zfcpdump-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-docs-6.4.0-150600.23.81.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-source-6.4.0-150600.23.81.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP6:kernel-default-extra-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:dlm-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:dtb-allwinner-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-altera-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-amazon-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-amd-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-amlogic-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-apm-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-apple-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-arm-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-broadcom-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-cavium-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-exynos-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-freescale-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-hisilicon-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-lg-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-marvell-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-mediatek-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-nvidia-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-qcom-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-renesas-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-rockchip-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-socionext-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-sprd-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-xilinx-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-64kb-devel-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-64kb-extra-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-64kb-optional-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-debug-vdso-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.aarch64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.x86_64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.81.3.150600.12.36.3.aarch64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.81.3.150600.12.36.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.81.3.150600.12.36.3.x86_64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-vdso-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-devel-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-docs-6.4.0-150600.23.81.1.noarch",
"openSUSE Leap 15.6:kernel-docs-html-6.4.0-150600.23.81.1.noarch",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-vdso-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-macros-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.s390x",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.x86_64",
"openSUSE Leap 15.6:kernel-source-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-source-vanilla-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.ppc64le",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.s390x",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.x86_64",
"openSUSE Leap 15.6:kernel-zfcpdump-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kselftests-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40204",
"url": "https://www.suse.com/security/cve/CVE-2025-40204"
},
{
"category": "external",
"summary": "SUSE Bug 1253436 for CVE-2025-40204",
"url": "https://bugzilla.suse.com/1253436"
},
{
"category": "external",
"summary": "SUSE Bug 1253437 for CVE-2025-40204",
"url": "https://bugzilla.suse.com/1253437"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_81-default-1-150600.13.3.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_81-default-1-150600.13.3.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_81-default-1-150600.13.3.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-64kb-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-64kb-devel-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-devel-6.4.0-150600.23.81.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-macros-6.4.0-150600.23.81.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-zfcpdump-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-docs-6.4.0-150600.23.81.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-source-6.4.0-150600.23.81.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP6:kernel-default-extra-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:dlm-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:dtb-allwinner-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-altera-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-amazon-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-amd-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-amlogic-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-apm-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-apple-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-arm-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-broadcom-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-cavium-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-exynos-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-freescale-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-hisilicon-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-lg-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-marvell-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-mediatek-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-nvidia-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-qcom-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-renesas-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-rockchip-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-socionext-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-sprd-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-xilinx-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-64kb-devel-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-64kb-extra-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-64kb-optional-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-debug-vdso-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.aarch64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.x86_64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.81.3.150600.12.36.3.aarch64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.81.3.150600.12.36.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.81.3.150600.12.36.3.x86_64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-vdso-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-devel-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-docs-6.4.0-150600.23.81.1.noarch",
"openSUSE Leap 15.6:kernel-docs-html-6.4.0-150600.23.81.1.noarch",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-vdso-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-macros-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.s390x",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.x86_64",
"openSUSE Leap 15.6:kernel-source-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-source-vanilla-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.ppc64le",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.s390x",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.x86_64",
"openSUSE Leap 15.6:kernel-zfcpdump-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kselftests-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_81-default-1-150600.13.3.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_81-default-1-150600.13.3.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_81-default-1-150600.13.3.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-64kb-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-64kb-devel-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-devel-6.4.0-150600.23.81.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-macros-6.4.0-150600.23.81.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-zfcpdump-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-docs-6.4.0-150600.23.81.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-source-6.4.0-150600.23.81.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP6:kernel-default-extra-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:dlm-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:dtb-allwinner-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-altera-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-amazon-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-amd-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-amlogic-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-apm-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-apple-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-arm-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-broadcom-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-cavium-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-exynos-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-freescale-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-hisilicon-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-lg-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-marvell-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-mediatek-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-nvidia-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-qcom-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-renesas-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-rockchip-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-socionext-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-sprd-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-xilinx-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-64kb-devel-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-64kb-extra-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-64kb-optional-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-debug-vdso-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.aarch64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.x86_64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.81.3.150600.12.36.3.aarch64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.81.3.150600.12.36.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.81.3.150600.12.36.3.x86_64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-vdso-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-devel-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-docs-6.4.0-150600.23.81.1.noarch",
"openSUSE Leap 15.6:kernel-docs-html-6.4.0-150600.23.81.1.noarch",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-vdso-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-macros-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.s390x",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.x86_64",
"openSUSE Leap 15.6:kernel-source-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-source-vanilla-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.ppc64le",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.s390x",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.x86_64",
"openSUSE Leap 15.6:kernel-zfcpdump-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kselftests-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-17T10:52:47Z",
"details": "important"
}
],
"title": "CVE-2025-40204"
},
{
"cve": "CVE-2025-40205",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40205"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nbtrfs: avoid potential out-of-bounds in btrfs_encode_fh()\n\nThe function btrfs_encode_fh() does not properly account for the three\ncases it handles.\n\nBefore writing to the file handle (fh), the function only returns to the\nuser BTRFS_FID_SIZE_NON_CONNECTABLE (5 dwords, 20 bytes) or\nBTRFS_FID_SIZE_CONNECTABLE (8 dwords, 32 bytes).\n\nHowever, when a parent exists and the root ID of the parent and the\ninode are different, the function writes BTRFS_FID_SIZE_CONNECTABLE_ROOT\n(10 dwords, 40 bytes).\n\nIf *max_len is not large enough, this write goes out of bounds because\nBTRFS_FID_SIZE_CONNECTABLE_ROOT is greater than\nBTRFS_FID_SIZE_CONNECTABLE originally returned.\n\nThis results in an 8-byte out-of-bounds write at\nfid-\u003eparent_root_objectid = parent_root_id.\n\nA previous attempt to fix this issue was made but was lost.\n\nhttps://lore.kernel.org/all/4CADAEEC020000780001B32C@vpn.id2.novell.com/\n\nAlthough this issue does not seem to be easily triggerable, it is a\npotential memory corruption bug that should be fixed. This patch\nresolves the issue by ensuring the function returns the appropriate size\nfor all three cases and validates that *max_len is large enough before\nwriting any data.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_81-default-1-150600.13.3.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_81-default-1-150600.13.3.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_81-default-1-150600.13.3.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-64kb-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-64kb-devel-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-devel-6.4.0-150600.23.81.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-macros-6.4.0-150600.23.81.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-zfcpdump-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-docs-6.4.0-150600.23.81.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-source-6.4.0-150600.23.81.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP6:kernel-default-extra-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:dlm-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:dtb-allwinner-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-altera-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-amazon-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-amd-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-amlogic-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-apm-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-apple-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-arm-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-broadcom-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-cavium-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-exynos-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-freescale-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-hisilicon-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-lg-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-marvell-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-mediatek-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-nvidia-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-qcom-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-renesas-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-rockchip-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-socionext-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-sprd-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-xilinx-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-64kb-devel-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-64kb-extra-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-64kb-optional-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-debug-vdso-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.aarch64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.x86_64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.81.3.150600.12.36.3.aarch64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.81.3.150600.12.36.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.81.3.150600.12.36.3.x86_64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-vdso-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-devel-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-docs-6.4.0-150600.23.81.1.noarch",
"openSUSE Leap 15.6:kernel-docs-html-6.4.0-150600.23.81.1.noarch",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-vdso-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-macros-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.s390x",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.x86_64",
"openSUSE Leap 15.6:kernel-source-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-source-vanilla-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.ppc64le",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.s390x",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.x86_64",
"openSUSE Leap 15.6:kernel-zfcpdump-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kselftests-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40205",
"url": "https://www.suse.com/security/cve/CVE-2025-40205"
},
{
"category": "external",
"summary": "SUSE Bug 1253456 for CVE-2025-40205",
"url": "https://bugzilla.suse.com/1253456"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_81-default-1-150600.13.3.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_81-default-1-150600.13.3.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_81-default-1-150600.13.3.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-64kb-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-64kb-devel-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-devel-6.4.0-150600.23.81.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-macros-6.4.0-150600.23.81.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-zfcpdump-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-docs-6.4.0-150600.23.81.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-source-6.4.0-150600.23.81.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP6:kernel-default-extra-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:dlm-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:dtb-allwinner-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-altera-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-amazon-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-amd-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-amlogic-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-apm-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-apple-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-arm-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-broadcom-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-cavium-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-exynos-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-freescale-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-hisilicon-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-lg-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-marvell-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-mediatek-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-nvidia-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-qcom-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-renesas-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-rockchip-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-socionext-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-sprd-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-xilinx-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-64kb-devel-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-64kb-extra-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-64kb-optional-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-debug-vdso-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.aarch64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.x86_64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.81.3.150600.12.36.3.aarch64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.81.3.150600.12.36.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.81.3.150600.12.36.3.x86_64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-vdso-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-devel-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-docs-6.4.0-150600.23.81.1.noarch",
"openSUSE Leap 15.6:kernel-docs-html-6.4.0-150600.23.81.1.noarch",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-vdso-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-macros-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.s390x",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.x86_64",
"openSUSE Leap 15.6:kernel-source-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-source-vanilla-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.ppc64le",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.s390x",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.x86_64",
"openSUSE Leap 15.6:kernel-zfcpdump-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kselftests-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_81-default-1-150600.13.3.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_81-default-1-150600.13.3.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_81-default-1-150600.13.3.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-64kb-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-64kb-devel-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-devel-6.4.0-150600.23.81.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-macros-6.4.0-150600.23.81.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-zfcpdump-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-docs-6.4.0-150600.23.81.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-source-6.4.0-150600.23.81.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP6:kernel-default-extra-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:dlm-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:dtb-allwinner-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-altera-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-amazon-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-amd-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-amlogic-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-apm-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-apple-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-arm-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-broadcom-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-cavium-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-exynos-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-freescale-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-hisilicon-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-lg-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-marvell-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-mediatek-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-nvidia-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-qcom-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-renesas-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-rockchip-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-socionext-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-sprd-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-xilinx-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-64kb-devel-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-64kb-extra-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-64kb-optional-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-debug-vdso-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.aarch64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.x86_64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.81.3.150600.12.36.3.aarch64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.81.3.150600.12.36.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.81.3.150600.12.36.3.x86_64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-vdso-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-devel-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-docs-6.4.0-150600.23.81.1.noarch",
"openSUSE Leap 15.6:kernel-docs-html-6.4.0-150600.23.81.1.noarch",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-vdso-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-macros-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.s390x",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.x86_64",
"openSUSE Leap 15.6:kernel-source-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-source-vanilla-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.ppc64le",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.s390x",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.x86_64",
"openSUSE Leap 15.6:kernel-zfcpdump-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kselftests-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-17T10:52:47Z",
"details": "moderate"
}
],
"title": "CVE-2025-40205"
},
{
"cve": "CVE-2025-40206",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40206"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnetfilter: nft_objref: validate objref and objrefmap expressions\n\nReferencing a synproxy stateful object from OUTPUT hook causes kernel\ncrash due to infinite recursive calls:\n\nBUG: TASK stack guard page was hit at 000000008bda5b8c (stack is 000000003ab1c4a5..00000000494d8b12)\n[...]\nCall Trace:\n __find_rr_leaf+0x99/0x230\n fib6_table_lookup+0x13b/0x2d0\n ip6_pol_route+0xa4/0x400\n fib6_rule_lookup+0x156/0x240\n ip6_route_output_flags+0xc6/0x150\n __nf_ip6_route+0x23/0x50\n synproxy_send_tcp_ipv6+0x106/0x200\n synproxy_send_client_synack_ipv6+0x1aa/0x1f0\n nft_synproxy_do_eval+0x263/0x310\n nft_do_chain+0x5a8/0x5f0 [nf_tables\n nft_do_chain_inet+0x98/0x110\n nf_hook_slow+0x43/0xc0\n __ip6_local_out+0xf0/0x170\n ip6_local_out+0x17/0x70\n synproxy_send_tcp_ipv6+0x1a2/0x200\n synproxy_send_client_synack_ipv6+0x1aa/0x1f0\n[...]\n\nImplement objref and objrefmap expression validate functions.\n\nCurrently, only NFT_OBJECT_SYNPROXY object type requires validation.\nThis will also handle a jump to a chain using a synproxy object from the\nOUTPUT hook.\n\nNow when trying to reference a synproxy object in the OUTPUT hook, nft\nwill produce the following error:\n\nsynproxy_crash.nft: Error: Could not process rule: Operation not supported\n synproxy name mysynproxy\n ^^^^^^^^^^^^^^^^^^^^^^^^",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_81-default-1-150600.13.3.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_81-default-1-150600.13.3.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_81-default-1-150600.13.3.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-64kb-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-64kb-devel-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-devel-6.4.0-150600.23.81.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-macros-6.4.0-150600.23.81.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-zfcpdump-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-docs-6.4.0-150600.23.81.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-source-6.4.0-150600.23.81.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP6:kernel-default-extra-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:dlm-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:dtb-allwinner-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-altera-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-amazon-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-amd-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-amlogic-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-apm-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-apple-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-arm-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-broadcom-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-cavium-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-exynos-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-freescale-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-hisilicon-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-lg-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-marvell-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-mediatek-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-nvidia-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-qcom-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-renesas-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-rockchip-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-socionext-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-sprd-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-xilinx-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-64kb-devel-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-64kb-extra-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-64kb-optional-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-debug-vdso-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.aarch64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.x86_64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.81.3.150600.12.36.3.aarch64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.81.3.150600.12.36.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.81.3.150600.12.36.3.x86_64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-vdso-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-devel-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-docs-6.4.0-150600.23.81.1.noarch",
"openSUSE Leap 15.6:kernel-docs-html-6.4.0-150600.23.81.1.noarch",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-vdso-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-macros-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.s390x",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.x86_64",
"openSUSE Leap 15.6:kernel-source-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-source-vanilla-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.ppc64le",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.s390x",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.x86_64",
"openSUSE Leap 15.6:kernel-zfcpdump-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kselftests-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40206",
"url": "https://www.suse.com/security/cve/CVE-2025-40206"
},
{
"category": "external",
"summary": "SUSE Bug 1253393 for CVE-2025-40206",
"url": "https://bugzilla.suse.com/1253393"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_81-default-1-150600.13.3.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_81-default-1-150600.13.3.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_81-default-1-150600.13.3.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-64kb-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-64kb-devel-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-devel-6.4.0-150600.23.81.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-macros-6.4.0-150600.23.81.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-zfcpdump-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-docs-6.4.0-150600.23.81.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-source-6.4.0-150600.23.81.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP6:kernel-default-extra-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:dlm-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:dtb-allwinner-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-altera-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-amazon-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-amd-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-amlogic-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-apm-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-apple-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-arm-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-broadcom-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-cavium-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-exynos-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-freescale-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-hisilicon-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-lg-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-marvell-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-mediatek-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-nvidia-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-qcom-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-renesas-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-rockchip-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-socionext-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-sprd-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-xilinx-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-64kb-devel-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-64kb-extra-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-64kb-optional-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-debug-vdso-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.aarch64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.x86_64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.81.3.150600.12.36.3.aarch64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.81.3.150600.12.36.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.81.3.150600.12.36.3.x86_64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-vdso-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-devel-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-docs-6.4.0-150600.23.81.1.noarch",
"openSUSE Leap 15.6:kernel-docs-html-6.4.0-150600.23.81.1.noarch",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-vdso-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-macros-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.s390x",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.x86_64",
"openSUSE Leap 15.6:kernel-source-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-source-vanilla-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.ppc64le",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.s390x",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.x86_64",
"openSUSE Leap 15.6:kernel-zfcpdump-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kselftests-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.1,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_81-default-1-150600.13.3.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_81-default-1-150600.13.3.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_81-default-1-150600.13.3.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-64kb-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-64kb-devel-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-devel-6.4.0-150600.23.81.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-macros-6.4.0-150600.23.81.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-zfcpdump-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-docs-6.4.0-150600.23.81.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-source-6.4.0-150600.23.81.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP6:kernel-default-extra-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:dlm-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:dtb-allwinner-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-altera-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-amazon-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-amd-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-amlogic-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-apm-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-apple-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-arm-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-broadcom-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-cavium-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-exynos-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-freescale-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-hisilicon-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-lg-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-marvell-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-mediatek-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-nvidia-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-qcom-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-renesas-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-rockchip-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-socionext-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-sprd-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-xilinx-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-64kb-devel-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-64kb-extra-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-64kb-optional-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-debug-vdso-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.aarch64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.x86_64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.81.3.150600.12.36.3.aarch64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.81.3.150600.12.36.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.81.3.150600.12.36.3.x86_64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-vdso-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-devel-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-docs-6.4.0-150600.23.81.1.noarch",
"openSUSE Leap 15.6:kernel-docs-html-6.4.0-150600.23.81.1.noarch",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-vdso-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-macros-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.s390x",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.x86_64",
"openSUSE Leap 15.6:kernel-source-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-source-vanilla-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.ppc64le",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.s390x",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.x86_64",
"openSUSE Leap 15.6:kernel-zfcpdump-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kselftests-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-17T10:52:47Z",
"details": "moderate"
}
],
"title": "CVE-2025-40206"
},
{
"cve": "CVE-2025-40207",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40207"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nmedia: v4l2-subdev: Fix alloc failure check in v4l2_subdev_call_state_try()\n\nv4l2_subdev_call_state_try() macro allocates a subdev state with\n__v4l2_subdev_state_alloc(), but does not check the returned value. If\n__v4l2_subdev_state_alloc fails, it returns an ERR_PTR, and that would\ncause v4l2_subdev_call_state_try() to crash.\n\nAdd proper error handling to v4l2_subdev_call_state_try().",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_81-default-1-150600.13.3.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_81-default-1-150600.13.3.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_81-default-1-150600.13.3.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-64kb-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-64kb-devel-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-devel-6.4.0-150600.23.81.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-macros-6.4.0-150600.23.81.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-zfcpdump-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-docs-6.4.0-150600.23.81.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-source-6.4.0-150600.23.81.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP6:kernel-default-extra-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:dlm-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:dtb-allwinner-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-altera-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-amazon-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-amd-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-amlogic-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-apm-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-apple-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-arm-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-broadcom-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-cavium-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-exynos-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-freescale-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-hisilicon-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-lg-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-marvell-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-mediatek-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-nvidia-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-qcom-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-renesas-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-rockchip-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-socionext-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-sprd-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-xilinx-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-64kb-devel-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-64kb-extra-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-64kb-optional-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-debug-vdso-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.aarch64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.x86_64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.81.3.150600.12.36.3.aarch64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.81.3.150600.12.36.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.81.3.150600.12.36.3.x86_64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-vdso-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-devel-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-docs-6.4.0-150600.23.81.1.noarch",
"openSUSE Leap 15.6:kernel-docs-html-6.4.0-150600.23.81.1.noarch",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-vdso-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-macros-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.s390x",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.x86_64",
"openSUSE Leap 15.6:kernel-source-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-source-vanilla-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.ppc64le",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.s390x",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.x86_64",
"openSUSE Leap 15.6:kernel-zfcpdump-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kselftests-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40207",
"url": "https://www.suse.com/security/cve/CVE-2025-40207"
},
{
"category": "external",
"summary": "SUSE Bug 1253395 for CVE-2025-40207",
"url": "https://bugzilla.suse.com/1253395"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_81-default-1-150600.13.3.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_81-default-1-150600.13.3.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_81-default-1-150600.13.3.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-64kb-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-64kb-devel-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-devel-6.4.0-150600.23.81.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-macros-6.4.0-150600.23.81.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-zfcpdump-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-docs-6.4.0-150600.23.81.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-source-6.4.0-150600.23.81.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP6:kernel-default-extra-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:dlm-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:dtb-allwinner-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-altera-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-amazon-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-amd-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-amlogic-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-apm-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-apple-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-arm-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-broadcom-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-cavium-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-exynos-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-freescale-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-hisilicon-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-lg-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-marvell-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-mediatek-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-nvidia-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-qcom-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-renesas-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-rockchip-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-socionext-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-sprd-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-xilinx-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-64kb-devel-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-64kb-extra-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-64kb-optional-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-debug-vdso-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.aarch64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.x86_64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.81.3.150600.12.36.3.aarch64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.81.3.150600.12.36.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.81.3.150600.12.36.3.x86_64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-vdso-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-devel-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-docs-6.4.0-150600.23.81.1.noarch",
"openSUSE Leap 15.6:kernel-docs-html-6.4.0-150600.23.81.1.noarch",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-vdso-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-macros-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.s390x",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.x86_64",
"openSUSE Leap 15.6:kernel-source-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-source-vanilla-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.ppc64le",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.s390x",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.x86_64",
"openSUSE Leap 15.6:kernel-zfcpdump-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kselftests-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_81-default-1-150600.13.3.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_81-default-1-150600.13.3.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_81-default-1-150600.13.3.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-64kb-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-64kb-devel-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-devel-6.4.0-150600.23.81.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-macros-6.4.0-150600.23.81.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-zfcpdump-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-docs-6.4.0-150600.23.81.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-source-6.4.0-150600.23.81.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP6:kernel-default-extra-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:dlm-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:dtb-allwinner-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-altera-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-amazon-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-amd-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-amlogic-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-apm-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-apple-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-arm-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-broadcom-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-cavium-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-exynos-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-freescale-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-hisilicon-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-lg-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-marvell-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-mediatek-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-nvidia-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-qcom-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-renesas-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-rockchip-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-socionext-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-sprd-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-xilinx-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-64kb-devel-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-64kb-extra-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-64kb-optional-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-debug-vdso-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.aarch64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.x86_64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.81.3.150600.12.36.3.aarch64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.81.3.150600.12.36.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.81.3.150600.12.36.3.x86_64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-vdso-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-devel-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-docs-6.4.0-150600.23.81.1.noarch",
"openSUSE Leap 15.6:kernel-docs-html-6.4.0-150600.23.81.1.noarch",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-vdso-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-macros-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.s390x",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.x86_64",
"openSUSE Leap 15.6:kernel-source-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-source-vanilla-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.ppc64le",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.s390x",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.x86_64",
"openSUSE Leap 15.6:kernel-zfcpdump-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kselftests-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-17T10:52:47Z",
"details": "moderate"
}
],
"title": "CVE-2025-40207"
}
]
}
SUSE-SU-2026:0316-1
Vulnerability from csaf_suse - Published: 2026-01-28 14:35 - Updated: 2026-01-28 14:35Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Security update for the Linux Kernel",
"title": "Title of the patch"
},
{
"category": "description",
"text": "\nThe SUSE Linux Enterprise 12 SP5 kernel was updated to fix various security issues\n\nThe following security issues were fixed:\n\n- CVE-2022-49604,CVE-2025-40074: ip: Fix data-races around sysctl_ip_fwd_use_pmtu (bsc#1238414 bsc#1252794).\n- CVE-2022-50527: drm/amdgpu: Fix size validation for non-exclusive domains (v4) (bsc#1251738).\n- CVE-2022-50625: serial: amba-pl011: avoid SBSA UART accessing DMACR register (bsc#1254559).\n- CVE-2022-50630: mm: hugetlb: fix UAF in hugetlb_handle_userfault (bsc#1254785).\n- CVE-2022-50656: nfc: pn533: Clear nfc_target before being used (bsc#1254745).\n- CVE-2022-50678: wifi: brcmfmac: fix invalid address access when enabling SCAN log level (bsc#1254902).\n- CVE-2022-50700: wifi: ath10k: Delay the unmapping of the buffer (bsc#1255576).\n- CVE-2023-53454: HID: multitouch: Correct devm device reference for hidinput input_dev name (bsc#1250759).\n- CVE-2023-53718: ring-buffer: Do not swap cpu_buffer during resize process (bsc#1252564).\n- CVE-2023-53748: media: mediatek: vcodec: Fix potential array out-of-bounds in decoder queue_setup (bsc#1254907).\n- CVE-2023-53765: dm cache: free background tracker\u0027s queued work in btracker_destroy (bsc#1254912).\n- CVE-2023-53781: smc: Fix use-after-free in tcp_write_timer_handler() (bsc#1254751).\n- CVE-2023-53788: ALSA: hda/ca0132: fixup buffer overrun at tuning_ctl_set() (bsc#1254917).\n- CVE-2023-53819: amdgpu: validate offset_in_bo of drm_amdgpu_gem_va (bsc#1254712).\n- CVE-2023-53850: iavf: use internal state to free traffic IRQs (bsc#1254677).\n- CVE-2023-54120: Bluetooth: Fix race condition in hidp_session_thread (bsc#1256133).\n- CVE-2023-54214: Bluetooth: L2CAP: Fix potential user-after-free (bsc#1255954).\n- CVE-2023-54236: net/net_failover: fix txq exceeding warning (bsc#1255922).\n- CVE-2023-54286: wifi: iwlwifi: dvm: Fix memcpy: detected field-spanning write backtrace (bsc#1255803).\n- CVE-2023-54300: wifi: ath9k: avoid referencing uninit memory in ath9k_wmi_ctrl_rx (bsc#1255790).\n- CVE-2025-38085: mm/hugetlb: fix huge_pmd_unshare() vs GUP-fast race (bsc#1245431 bsc#1245499).\n- CVE-2025-38336: ata: pata_via: Force PIO for ATAPI devices on VT6415/VT6330 (bsc#1246370).\n- CVE-2025-38728: smb3: fix for slab out of bounds on mount to ksmbd (bsc#1249256).\n- CVE-2025-40006: mm/hugetlb: fix folio is still mapped when deleted (bsc#1252342).\n- CVE-2025-40035: Input: uinput - zero-initialize uinput_ff_upload_compat to avoid info leak (bsc#1252866).\n- CVE-2025-40053: net: dlink: handle copy_thresh allocation failure (bsc#1252808).\n- CVE-2025-40064: smc: Fix use-after-free in __pnet_find_base_ndev() (bsc#1252845).\n- CVE-2025-40075: tcp_metrics: use dst_dev_net_rcu() (bsc#1252795).\n- CVE-2025-40081: perf: arm_spe: Prevent overflow in PERF_IDX2OFF() (bsc#1252776).\n- CVE-2025-40110: drm/vmwgfx: Fix a null-ptr access in the cursor snooper (bsc#1253275).\n- CVE-2025-40123: bpf: Enforce expected_attach_type for tailcall compatibility (bsc#1253365).\n- CVE-2025-40135: ipv6: use RCU in ip6_xmit() (bsc#1253342).\n- CVE-2025-40139: smc: Use __sk_dst_get() and dst_dev_rcu() in in smc_clc_prfx_set() (bsc#1253409).\n- CVE-2025-40149: tls: Use __sk_dst_get() and dst_dev_rcu() in get_netdev_for_sock() (bsc#1253355).\n- CVE-2025-40153: mm: hugetlb: avoid soft lockup when mprotect to large memory area (bsc#1253408).\n- CVE-2025-40158: ipv6: use RCU in ip6_output() (bsc#1253402).\n- CVE-2025-40160: xen/events: Cleanup find_virq() return codes (bsc#1253400).\n- CVE-2025-40164: usbnet: Fix using smp_processor_id() in preemptible code warnings (bsc#1253407).\n- CVE-2025-40167: ext4: detect invalid INLINE_DATA + EXTENTS flag combination (bsc#1253458).\n- CVE-2025-40168: smc: Use __sk_dst_get() and dst_dev_rcu() in smc_clc_prfx_match() (bsc#1253427).\n- CVE-2025-40170: net: use dst_dev_rcu() in sk_setup_caps() (bsc#1253413).\n- CVE-2025-40178: pid: Add a judgment for ns null in pid_nr_ns (bsc#1253463).\n- CVE-2025-40198: ext4: avoid potential buffer over-read in parse_apply_sb_mount_options() (bsc#1253453).\n- CVE-2025-40200: Squashfs: reject negative file sizes in squashfs_read_inode() (bsc#1253448).\n- CVE-2025-40215: kABI: xfrm: delete x-\u003etunnel as we delete x (bsc#1254959).\n- CVE-2025-40219: PCI/IOV: Add PCI rescan-remove locking when enabling/disabling SR-IOV (bsc#1254518).\n- CVE-2025-40233: ocfs2: clear extent cache after moving/defragmenting extents (bsc#1254813).\n- CVE-2025-40240: sctp: avoid NULL dereference when chunk data buffer is missing (bsc#1254869).\n- CVE-2025-40244: hfsplus: fix KMSAN uninit-value issue in __hfsplus_ext_cache_extent() (bsc#1255033).\n- CVE-2025-40248: vsock: Ignore signal/timeout on connect() if already established (bsc#1254864).\n- CVE-2025-40252: net: qlogic/qede: fix potential out-of-bounds read in qede_tpa_cont() and qede_tpa_end() (bsc#1254849).\n- CVE-2025-40269: ALSA: usb-audio: Fix potential overflow of PCM transfer buffer (bsc#1255035).\n- CVE-2025-40275: ALSA: usb-audio: Fix NULL pointer dereference in snd_usb_mixer_controls_badd (bsc#1254829).\n- CVE-2025-40278: net: sched: act_ife: initialize struct tc_ife to fix KMSAN kernel-infoleak (bsc#1254825).\n- CVE-2025-40279: net: sched: act_connmark: initialize struct tc_ife to fix kernel leak (bsc#1254846).\n- CVE-2025-40283: Bluetooth: btusb: reorder cleanup in btusb_disconnect to avoid UAF (bsc#1254858).\n- CVE-2025-40304: fbdev: Add bounds checking in bit_putcs to fix vmalloc-out-of-bounds (bsc#1255034).\n- CVE-2025-40308: Bluetooth: bcsp: receive data only if registered (bsc#1255064).\n- CVE-2025-40321: wifi: brcmfmac: fix crash while sending Action Frames in standalone AP Mode (bsc#1254795).\n- CVE-2025-40322: fbdev: bitblit: bound-check glyph index in bit_putcs* (bsc#1255092).\n- CVE-2025-40331: sctp: Prevent TOCTOU out-of-bounds write (bsc#1254615).\n- CVE-2025-40337: net: stmmac: Correctly handle Rx checksum offload errors (bsc#1255081).\n- CVE-2025-40349: hfs: validate record offset in hfsplus_bmap_alloc (bsc#1255280).\n- CVE-2025-40351: hfsplus: fix KMSAN uninit-value issue in hfsplus_delete_cat() (bsc#1255281).\n- CVE-2025-68206: netfilter: nft_ct: add seqadj extension for natted connections (bsc#1255142).\n- CVE-2025-68340: team: Move team device type change at the end of team_port_add (bsc#1255507).\n\nThe following non security issues were fixed:\n\n- HID: multitouch: Add NULL check in mt_input_configured (bsc#1250759).\n- Squashfs: add additional inode sanity checking (bsc#1253448).\n- drm/amdgpu: Fix potential NULL dereference (bsc#1251238).\n",
"title": "Description of the patch"
},
{
"category": "details",
"text": "SUSE-2026-316,SUSE-SLE-Live-Patching-12-SP5-2026-316,SUSE-SLE-SERVER-12-SP5-LTSS-2026-316,SUSE-SLE-SERVER-12-SP5-LTSS-EXTENDED-SECURITY-2026-316",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2026_0316-1.json"
},
{
"category": "self",
"summary": "URL for SUSE-SU-2026:0316-1",
"url": "https://www.suse.com/support/update/announcement/2026/suse-su-20260316-1/"
},
{
"category": "self",
"summary": "E-Mail link for SUSE-SU-2026:0316-1",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-January/023970.html"
},
{
"category": "self",
"summary": "SUSE Bug 1065729",
"url": "https://bugzilla.suse.com/1065729"
},
{
"category": "self",
"summary": "SUSE Bug 1082555",
"url": "https://bugzilla.suse.com/1082555"
},
{
"category": "self",
"summary": "SUSE Bug 1152446",
"url": "https://bugzilla.suse.com/1152446"
},
{
"category": "self",
"summary": "SUSE Bug 1190317",
"url": "https://bugzilla.suse.com/1190317"
},
{
"category": "self",
"summary": "SUSE Bug 1206889",
"url": "https://bugzilla.suse.com/1206889"
},
{
"category": "self",
"summary": "SUSE Bug 1207051",
"url": "https://bugzilla.suse.com/1207051"
},
{
"category": "self",
"summary": "SUSE Bug 1207088",
"url": "https://bugzilla.suse.com/1207088"
},
{
"category": "self",
"summary": "SUSE Bug 1207620",
"url": "https://bugzilla.suse.com/1207620"
},
{
"category": "self",
"summary": "SUSE Bug 1207653",
"url": "https://bugzilla.suse.com/1207653"
},
{
"category": "self",
"summary": "SUSE Bug 1208570",
"url": "https://bugzilla.suse.com/1208570"
},
{
"category": "self",
"summary": "SUSE Bug 1211439",
"url": "https://bugzilla.suse.com/1211439"
},
{
"category": "self",
"summary": "SUSE Bug 1212173",
"url": "https://bugzilla.suse.com/1212173"
},
{
"category": "self",
"summary": "SUSE Bug 1213025",
"url": "https://bugzilla.suse.com/1213025"
},
{
"category": "self",
"summary": "SUSE Bug 1213032",
"url": "https://bugzilla.suse.com/1213032"
},
{
"category": "self",
"summary": "SUSE Bug 1213287",
"url": "https://bugzilla.suse.com/1213287"
},
{
"category": "self",
"summary": "SUSE Bug 1213747",
"url": "https://bugzilla.suse.com/1213747"
},
{
"category": "self",
"summary": "SUSE Bug 1213969",
"url": "https://bugzilla.suse.com/1213969"
},
{
"category": "self",
"summary": "SUSE Bug 1214940",
"url": "https://bugzilla.suse.com/1214940"
},
{
"category": "self",
"summary": "SUSE Bug 1214962",
"url": "https://bugzilla.suse.com/1214962"
},
{
"category": "self",
"summary": "SUSE Bug 1216062",
"url": "https://bugzilla.suse.com/1216062"
},
{
"category": "self",
"summary": "SUSE Bug 1217036",
"url": "https://bugzilla.suse.com/1217036"
},
{
"category": "self",
"summary": "SUSE Bug 1225203",
"url": "https://bugzilla.suse.com/1225203"
},
{
"category": "self",
"summary": "SUSE Bug 1226846",
"url": "https://bugzilla.suse.com/1226846"
},
{
"category": "self",
"summary": "SUSE Bug 1238414",
"url": "https://bugzilla.suse.com/1238414"
},
{
"category": "self",
"summary": "SUSE Bug 1238750",
"url": "https://bugzilla.suse.com/1238750"
},
{
"category": "self",
"summary": "SUSE Bug 1240224",
"url": "https://bugzilla.suse.com/1240224"
},
{
"category": "self",
"summary": "SUSE Bug 1245196",
"url": "https://bugzilla.suse.com/1245196"
},
{
"category": "self",
"summary": "SUSE Bug 1245431",
"url": "https://bugzilla.suse.com/1245431"
},
{
"category": "self",
"summary": "SUSE Bug 1245499",
"url": "https://bugzilla.suse.com/1245499"
},
{
"category": "self",
"summary": "SUSE Bug 1246370",
"url": "https://bugzilla.suse.com/1246370"
},
{
"category": "self",
"summary": "SUSE Bug 1249256",
"url": "https://bugzilla.suse.com/1249256"
},
{
"category": "self",
"summary": "SUSE Bug 1249991",
"url": "https://bugzilla.suse.com/1249991"
},
{
"category": "self",
"summary": "SUSE Bug 1250759",
"url": "https://bugzilla.suse.com/1250759"
},
{
"category": "self",
"summary": "SUSE Bug 1251238",
"url": "https://bugzilla.suse.com/1251238"
},
{
"category": "self",
"summary": "SUSE Bug 1251738",
"url": "https://bugzilla.suse.com/1251738"
},
{
"category": "self",
"summary": "SUSE Bug 1252342",
"url": "https://bugzilla.suse.com/1252342"
},
{
"category": "self",
"summary": "SUSE Bug 1252564",
"url": "https://bugzilla.suse.com/1252564"
},
{
"category": "self",
"summary": "SUSE Bug 1252776",
"url": "https://bugzilla.suse.com/1252776"
},
{
"category": "self",
"summary": "SUSE Bug 1252795",
"url": "https://bugzilla.suse.com/1252795"
},
{
"category": "self",
"summary": "SUSE Bug 1252808",
"url": "https://bugzilla.suse.com/1252808"
},
{
"category": "self",
"summary": "SUSE Bug 1252845",
"url": "https://bugzilla.suse.com/1252845"
},
{
"category": "self",
"summary": "SUSE Bug 1252866",
"url": "https://bugzilla.suse.com/1252866"
},
{
"category": "self",
"summary": "SUSE Bug 1253275",
"url": "https://bugzilla.suse.com/1253275"
},
{
"category": "self",
"summary": "SUSE Bug 1253342",
"url": "https://bugzilla.suse.com/1253342"
},
{
"category": "self",
"summary": "SUSE Bug 1253355",
"url": "https://bugzilla.suse.com/1253355"
},
{
"category": "self",
"summary": "SUSE Bug 1253365",
"url": "https://bugzilla.suse.com/1253365"
},
{
"category": "self",
"summary": "SUSE Bug 1253400",
"url": "https://bugzilla.suse.com/1253400"
},
{
"category": "self",
"summary": "SUSE Bug 1253402",
"url": "https://bugzilla.suse.com/1253402"
},
{
"category": "self",
"summary": "SUSE Bug 1253407",
"url": "https://bugzilla.suse.com/1253407"
},
{
"category": "self",
"summary": "SUSE Bug 1253408",
"url": "https://bugzilla.suse.com/1253408"
},
{
"category": "self",
"summary": "SUSE Bug 1253409",
"url": "https://bugzilla.suse.com/1253409"
},
{
"category": "self",
"summary": "SUSE Bug 1253413",
"url": "https://bugzilla.suse.com/1253413"
},
{
"category": "self",
"summary": "SUSE Bug 1253427",
"url": "https://bugzilla.suse.com/1253427"
},
{
"category": "self",
"summary": "SUSE Bug 1253448",
"url": "https://bugzilla.suse.com/1253448"
},
{
"category": "self",
"summary": "SUSE Bug 1253453",
"url": "https://bugzilla.suse.com/1253453"
},
{
"category": "self",
"summary": "SUSE Bug 1253458",
"url": "https://bugzilla.suse.com/1253458"
},
{
"category": "self",
"summary": "SUSE Bug 1253463",
"url": "https://bugzilla.suse.com/1253463"
},
{
"category": "self",
"summary": "SUSE Bug 1254518",
"url": "https://bugzilla.suse.com/1254518"
},
{
"category": "self",
"summary": "SUSE Bug 1254559",
"url": "https://bugzilla.suse.com/1254559"
},
{
"category": "self",
"summary": "SUSE Bug 1254580",
"url": "https://bugzilla.suse.com/1254580"
},
{
"category": "self",
"summary": "SUSE Bug 1254609",
"url": "https://bugzilla.suse.com/1254609"
},
{
"category": "self",
"summary": "SUSE Bug 1254615",
"url": "https://bugzilla.suse.com/1254615"
},
{
"category": "self",
"summary": "SUSE Bug 1254617",
"url": "https://bugzilla.suse.com/1254617"
},
{
"category": "self",
"summary": "SUSE Bug 1254631",
"url": "https://bugzilla.suse.com/1254631"
},
{
"category": "self",
"summary": "SUSE Bug 1254634",
"url": "https://bugzilla.suse.com/1254634"
},
{
"category": "self",
"summary": "SUSE Bug 1254645",
"url": "https://bugzilla.suse.com/1254645"
},
{
"category": "self",
"summary": "SUSE Bug 1254671",
"url": "https://bugzilla.suse.com/1254671"
},
{
"category": "self",
"summary": "SUSE Bug 1254677",
"url": "https://bugzilla.suse.com/1254677"
},
{
"category": "self",
"summary": "SUSE Bug 1254686",
"url": "https://bugzilla.suse.com/1254686"
},
{
"category": "self",
"summary": "SUSE Bug 1254692",
"url": "https://bugzilla.suse.com/1254692"
},
{
"category": "self",
"summary": "SUSE Bug 1254698",
"url": "https://bugzilla.suse.com/1254698"
},
{
"category": "self",
"summary": "SUSE Bug 1254709",
"url": "https://bugzilla.suse.com/1254709"
},
{
"category": "self",
"summary": "SUSE Bug 1254712",
"url": "https://bugzilla.suse.com/1254712"
},
{
"category": "self",
"summary": "SUSE Bug 1254722",
"url": "https://bugzilla.suse.com/1254722"
},
{
"category": "self",
"summary": "SUSE Bug 1254745",
"url": "https://bugzilla.suse.com/1254745"
},
{
"category": "self",
"summary": "SUSE Bug 1254751",
"url": "https://bugzilla.suse.com/1254751"
},
{
"category": "self",
"summary": "SUSE Bug 1254763",
"url": "https://bugzilla.suse.com/1254763"
},
{
"category": "self",
"summary": "SUSE Bug 1254785",
"url": "https://bugzilla.suse.com/1254785"
},
{
"category": "self",
"summary": "SUSE Bug 1254795",
"url": "https://bugzilla.suse.com/1254795"
},
{
"category": "self",
"summary": "SUSE Bug 1254813",
"url": "https://bugzilla.suse.com/1254813"
},
{
"category": "self",
"summary": "SUSE Bug 1254825",
"url": "https://bugzilla.suse.com/1254825"
},
{
"category": "self",
"summary": "SUSE Bug 1254829",
"url": "https://bugzilla.suse.com/1254829"
},
{
"category": "self",
"summary": "SUSE Bug 1254846",
"url": "https://bugzilla.suse.com/1254846"
},
{
"category": "self",
"summary": "SUSE Bug 1254849",
"url": "https://bugzilla.suse.com/1254849"
},
{
"category": "self",
"summary": "SUSE Bug 1254851",
"url": "https://bugzilla.suse.com/1254851"
},
{
"category": "self",
"summary": "SUSE Bug 1254858",
"url": "https://bugzilla.suse.com/1254858"
},
{
"category": "self",
"summary": "SUSE Bug 1254864",
"url": "https://bugzilla.suse.com/1254864"
},
{
"category": "self",
"summary": "SUSE Bug 1254869",
"url": "https://bugzilla.suse.com/1254869"
},
{
"category": "self",
"summary": "SUSE Bug 1254902",
"url": "https://bugzilla.suse.com/1254902"
},
{
"category": "self",
"summary": "SUSE Bug 1254907",
"url": "https://bugzilla.suse.com/1254907"
},
{
"category": "self",
"summary": "SUSE Bug 1254912",
"url": "https://bugzilla.suse.com/1254912"
},
{
"category": "self",
"summary": "SUSE Bug 1254916",
"url": "https://bugzilla.suse.com/1254916"
},
{
"category": "self",
"summary": "SUSE Bug 1254917",
"url": "https://bugzilla.suse.com/1254917"
},
{
"category": "self",
"summary": "SUSE Bug 1254959",
"url": "https://bugzilla.suse.com/1254959"
},
{
"category": "self",
"summary": "SUSE Bug 1254994",
"url": "https://bugzilla.suse.com/1254994"
},
{
"category": "self",
"summary": "SUSE Bug 1255033",
"url": "https://bugzilla.suse.com/1255033"
},
{
"category": "self",
"summary": "SUSE Bug 1255034",
"url": "https://bugzilla.suse.com/1255034"
},
{
"category": "self",
"summary": "SUSE Bug 1255035",
"url": "https://bugzilla.suse.com/1255035"
},
{
"category": "self",
"summary": "SUSE Bug 1255064",
"url": "https://bugzilla.suse.com/1255064"
},
{
"category": "self",
"summary": "SUSE Bug 1255081",
"url": "https://bugzilla.suse.com/1255081"
},
{
"category": "self",
"summary": "SUSE Bug 1255092",
"url": "https://bugzilla.suse.com/1255092"
},
{
"category": "self",
"summary": "SUSE Bug 1255142",
"url": "https://bugzilla.suse.com/1255142"
},
{
"category": "self",
"summary": "SUSE Bug 1255165",
"url": "https://bugzilla.suse.com/1255165"
},
{
"category": "self",
"summary": "SUSE Bug 1255280",
"url": "https://bugzilla.suse.com/1255280"
},
{
"category": "self",
"summary": "SUSE Bug 1255281",
"url": "https://bugzilla.suse.com/1255281"
},
{
"category": "self",
"summary": "SUSE Bug 1255469",
"url": "https://bugzilla.suse.com/1255469"
},
{
"category": "self",
"summary": "SUSE Bug 1255507",
"url": "https://bugzilla.suse.com/1255507"
},
{
"category": "self",
"summary": "SUSE Bug 1255576",
"url": "https://bugzilla.suse.com/1255576"
},
{
"category": "self",
"summary": "SUSE Bug 1255581",
"url": "https://bugzilla.suse.com/1255581"
},
{
"category": "self",
"summary": "SUSE Bug 1255600",
"url": "https://bugzilla.suse.com/1255600"
},
{
"category": "self",
"summary": "SUSE Bug 1255605",
"url": "https://bugzilla.suse.com/1255605"
},
{
"category": "self",
"summary": "SUSE Bug 1255617",
"url": "https://bugzilla.suse.com/1255617"
},
{
"category": "self",
"summary": "SUSE Bug 1255749",
"url": "https://bugzilla.suse.com/1255749"
},
{
"category": "self",
"summary": "SUSE Bug 1255771",
"url": "https://bugzilla.suse.com/1255771"
},
{
"category": "self",
"summary": "SUSE Bug 1255780",
"url": "https://bugzilla.suse.com/1255780"
},
{
"category": "self",
"summary": "SUSE Bug 1255790",
"url": "https://bugzilla.suse.com/1255790"
},
{
"category": "self",
"summary": "SUSE Bug 1255802",
"url": "https://bugzilla.suse.com/1255802"
},
{
"category": "self",
"summary": "SUSE Bug 1255803",
"url": "https://bugzilla.suse.com/1255803"
},
{
"category": "self",
"summary": "SUSE Bug 1255806",
"url": "https://bugzilla.suse.com/1255806"
},
{
"category": "self",
"summary": "SUSE Bug 1255841",
"url": "https://bugzilla.suse.com/1255841"
},
{
"category": "self",
"summary": "SUSE Bug 1255843",
"url": "https://bugzilla.suse.com/1255843"
},
{
"category": "self",
"summary": "SUSE Bug 1255872",
"url": "https://bugzilla.suse.com/1255872"
},
{
"category": "self",
"summary": "SUSE Bug 1255875",
"url": "https://bugzilla.suse.com/1255875"
},
{
"category": "self",
"summary": "SUSE Bug 1255878",
"url": "https://bugzilla.suse.com/1255878"
},
{
"category": "self",
"summary": "SUSE Bug 1255901",
"url": "https://bugzilla.suse.com/1255901"
},
{
"category": "self",
"summary": "SUSE Bug 1255902",
"url": "https://bugzilla.suse.com/1255902"
},
{
"category": "self",
"summary": "SUSE Bug 1255922",
"url": "https://bugzilla.suse.com/1255922"
},
{
"category": "self",
"summary": "SUSE Bug 1255949",
"url": "https://bugzilla.suse.com/1255949"
},
{
"category": "self",
"summary": "SUSE Bug 1255951",
"url": "https://bugzilla.suse.com/1255951"
},
{
"category": "self",
"summary": "SUSE Bug 1255953",
"url": "https://bugzilla.suse.com/1255953"
},
{
"category": "self",
"summary": "SUSE Bug 1255954",
"url": "https://bugzilla.suse.com/1255954"
},
{
"category": "self",
"summary": "SUSE Bug 1255959",
"url": "https://bugzilla.suse.com/1255959"
},
{
"category": "self",
"summary": "SUSE Bug 1255969",
"url": "https://bugzilla.suse.com/1255969"
},
{
"category": "self",
"summary": "SUSE Bug 1255985",
"url": "https://bugzilla.suse.com/1255985"
},
{
"category": "self",
"summary": "SUSE Bug 1255993",
"url": "https://bugzilla.suse.com/1255993"
},
{
"category": "self",
"summary": "SUSE Bug 1255994",
"url": "https://bugzilla.suse.com/1255994"
},
{
"category": "self",
"summary": "SUSE Bug 1256045",
"url": "https://bugzilla.suse.com/1256045"
},
{
"category": "self",
"summary": "SUSE Bug 1256046",
"url": "https://bugzilla.suse.com/1256046"
},
{
"category": "self",
"summary": "SUSE Bug 1256048",
"url": "https://bugzilla.suse.com/1256048"
},
{
"category": "self",
"summary": "SUSE Bug 1256053",
"url": "https://bugzilla.suse.com/1256053"
},
{
"category": "self",
"summary": "SUSE Bug 1256062",
"url": "https://bugzilla.suse.com/1256062"
},
{
"category": "self",
"summary": "SUSE Bug 1256064",
"url": "https://bugzilla.suse.com/1256064"
},
{
"category": "self",
"summary": "SUSE Bug 1256091",
"url": "https://bugzilla.suse.com/1256091"
},
{
"category": "self",
"summary": "SUSE Bug 1256114",
"url": "https://bugzilla.suse.com/1256114"
},
{
"category": "self",
"summary": "SUSE Bug 1256129",
"url": "https://bugzilla.suse.com/1256129"
},
{
"category": "self",
"summary": "SUSE Bug 1256133",
"url": "https://bugzilla.suse.com/1256133"
},
{
"category": "self",
"summary": "SUSE Bug 1256142",
"url": "https://bugzilla.suse.com/1256142"
},
{
"category": "self",
"summary": "SUSE Bug 1256154",
"url": "https://bugzilla.suse.com/1256154"
},
{
"category": "self",
"summary": "SUSE Bug 1256172",
"url": "https://bugzilla.suse.com/1256172"
},
{
"category": "self",
"summary": "SUSE Bug 1256193",
"url": "https://bugzilla.suse.com/1256193"
},
{
"category": "self",
"summary": "SUSE Bug 1256194",
"url": "https://bugzilla.suse.com/1256194"
},
{
"category": "self",
"summary": "SUSE Bug 1256199",
"url": "https://bugzilla.suse.com/1256199"
},
{
"category": "self",
"summary": "SUSE Bug 1256208",
"url": "https://bugzilla.suse.com/1256208"
},
{
"category": "self",
"summary": "SUSE Bug 1256242",
"url": "https://bugzilla.suse.com/1256242"
},
{
"category": "self",
"summary": "SUSE Bug 1256271",
"url": "https://bugzilla.suse.com/1256271"
},
{
"category": "self",
"summary": "SUSE Bug 1256274",
"url": "https://bugzilla.suse.com/1256274"
},
{
"category": "self",
"summary": "SUSE Bug 1256285",
"url": "https://bugzilla.suse.com/1256285"
},
{
"category": "self",
"summary": "SUSE Bug 1256300",
"url": "https://bugzilla.suse.com/1256300"
},
{
"category": "self",
"summary": "SUSE Bug 1256334",
"url": "https://bugzilla.suse.com/1256334"
},
{
"category": "self",
"summary": "SUSE Bug 1256349",
"url": "https://bugzilla.suse.com/1256349"
},
{
"category": "self",
"summary": "SUSE Bug 1256353",
"url": "https://bugzilla.suse.com/1256353"
},
{
"category": "self",
"summary": "SUSE Bug 1256355",
"url": "https://bugzilla.suse.com/1256355"
},
{
"category": "self",
"summary": "SUSE Bug 1256364",
"url": "https://bugzilla.suse.com/1256364"
},
{
"category": "self",
"summary": "SUSE Bug 1256394",
"url": "https://bugzilla.suse.com/1256394"
},
{
"category": "self",
"summary": "SUSE Bug 1256423",
"url": "https://bugzilla.suse.com/1256423"
},
{
"category": "self",
"summary": "SUSE Bug 1256432",
"url": "https://bugzilla.suse.com/1256432"
},
{
"category": "self",
"summary": "SUSE Bug 1256516",
"url": "https://bugzilla.suse.com/1256516"
},
{
"category": "self",
"summary": "SUSE Bug 1256684",
"url": "https://bugzilla.suse.com/1256684"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-49546 page",
"url": "https://www.suse.com/security/cve/CVE-2022-49546/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-49604 page",
"url": "https://www.suse.com/security/cve/CVE-2022-49604/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-49975 page",
"url": "https://www.suse.com/security/cve/CVE-2022-49975/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-50527 page",
"url": "https://www.suse.com/security/cve/CVE-2022-50527/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-50615 page",
"url": "https://www.suse.com/security/cve/CVE-2022-50615/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-50625 page",
"url": "https://www.suse.com/security/cve/CVE-2022-50625/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-50630 page",
"url": "https://www.suse.com/security/cve/CVE-2022-50630/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-50636 page",
"url": "https://www.suse.com/security/cve/CVE-2022-50636/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-50638 page",
"url": "https://www.suse.com/security/cve/CVE-2022-50638/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-50640 page",
"url": "https://www.suse.com/security/cve/CVE-2022-50640/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-50643 page",
"url": "https://www.suse.com/security/cve/CVE-2022-50643/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-50646 page",
"url": "https://www.suse.com/security/cve/CVE-2022-50646/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-50656 page",
"url": "https://www.suse.com/security/cve/CVE-2022-50656/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-50668 page",
"url": "https://www.suse.com/security/cve/CVE-2022-50668/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-50677 page",
"url": "https://www.suse.com/security/cve/CVE-2022-50677/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-50678 page",
"url": "https://www.suse.com/security/cve/CVE-2022-50678/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-50700 page",
"url": "https://www.suse.com/security/cve/CVE-2022-50700/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-50706 page",
"url": "https://www.suse.com/security/cve/CVE-2022-50706/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-50715 page",
"url": "https://www.suse.com/security/cve/CVE-2022-50715/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-50728 page",
"url": "https://www.suse.com/security/cve/CVE-2022-50728/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-50730 page",
"url": "https://www.suse.com/security/cve/CVE-2022-50730/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-50733 page",
"url": "https://www.suse.com/security/cve/CVE-2022-50733/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-50747 page",
"url": "https://www.suse.com/security/cve/CVE-2022-50747/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-50755 page",
"url": "https://www.suse.com/security/cve/CVE-2022-50755/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-50761 page",
"url": "https://www.suse.com/security/cve/CVE-2022-50761/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-50779 page",
"url": "https://www.suse.com/security/cve/CVE-2022-50779/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-50821 page",
"url": "https://www.suse.com/security/cve/CVE-2022-50821/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-50824 page",
"url": "https://www.suse.com/security/cve/CVE-2022-50824/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-50840 page",
"url": "https://www.suse.com/security/cve/CVE-2022-50840/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-50849 page",
"url": "https://www.suse.com/security/cve/CVE-2022-50849/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-50850 page",
"url": "https://www.suse.com/security/cve/CVE-2022-50850/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-50859 page",
"url": "https://www.suse.com/security/cve/CVE-2022-50859/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-50870 page",
"url": "https://www.suse.com/security/cve/CVE-2022-50870/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-50879 page",
"url": "https://www.suse.com/security/cve/CVE-2022-50879/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2023-20569 page",
"url": "https://www.suse.com/security/cve/CVE-2023-20569/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2023-23559 page",
"url": "https://www.suse.com/security/cve/CVE-2023-23559/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2023-4132 page",
"url": "https://www.suse.com/security/cve/CVE-2023-4132/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2023-53020 page",
"url": "https://www.suse.com/security/cve/CVE-2023-53020/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2023-53176 page",
"url": "https://www.suse.com/security/cve/CVE-2023-53176/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2023-53454 page",
"url": "https://www.suse.com/security/cve/CVE-2023-53454/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2023-53718 page",
"url": "https://www.suse.com/security/cve/CVE-2023-53718/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2023-53746 page",
"url": "https://www.suse.com/security/cve/CVE-2023-53746/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2023-53748 page",
"url": "https://www.suse.com/security/cve/CVE-2023-53748/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2023-53754 page",
"url": "https://www.suse.com/security/cve/CVE-2023-53754/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2023-53765 page",
"url": "https://www.suse.com/security/cve/CVE-2023-53765/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2023-53781 page",
"url": "https://www.suse.com/security/cve/CVE-2023-53781/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2023-53786 page",
"url": "https://www.suse.com/security/cve/CVE-2023-53786/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2023-53788 page",
"url": "https://www.suse.com/security/cve/CVE-2023-53788/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2023-53803 page",
"url": "https://www.suse.com/security/cve/CVE-2023-53803/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2023-53809 page",
"url": "https://www.suse.com/security/cve/CVE-2023-53809/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2023-53819 page",
"url": "https://www.suse.com/security/cve/CVE-2023-53819/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2023-53832 page",
"url": "https://www.suse.com/security/cve/CVE-2023-53832/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2023-53840 page",
"url": "https://www.suse.com/security/cve/CVE-2023-53840/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2023-53847 page",
"url": "https://www.suse.com/security/cve/CVE-2023-53847/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2023-53850 page",
"url": "https://www.suse.com/security/cve/CVE-2023-53850/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2023-53862 page",
"url": "https://www.suse.com/security/cve/CVE-2023-53862/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2023-54014 page",
"url": "https://www.suse.com/security/cve/CVE-2023-54014/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2023-54017 page",
"url": "https://www.suse.com/security/cve/CVE-2023-54017/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2023-54021 page",
"url": "https://www.suse.com/security/cve/CVE-2023-54021/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2023-54032 page",
"url": "https://www.suse.com/security/cve/CVE-2023-54032/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2023-54045 page",
"url": "https://www.suse.com/security/cve/CVE-2023-54045/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2023-54051 page",
"url": "https://www.suse.com/security/cve/CVE-2023-54051/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2023-54070 page",
"url": "https://www.suse.com/security/cve/CVE-2023-54070/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2023-54091 page",
"url": "https://www.suse.com/security/cve/CVE-2023-54091/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2023-54095 page",
"url": "https://www.suse.com/security/cve/CVE-2023-54095/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2023-54108 page",
"url": "https://www.suse.com/security/cve/CVE-2023-54108/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2023-54110 page",
"url": "https://www.suse.com/security/cve/CVE-2023-54110/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2023-54119 page",
"url": "https://www.suse.com/security/cve/CVE-2023-54119/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2023-54120 page",
"url": "https://www.suse.com/security/cve/CVE-2023-54120/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2023-54123 page",
"url": "https://www.suse.com/security/cve/CVE-2023-54123/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2023-54130 page",
"url": "https://www.suse.com/security/cve/CVE-2023-54130/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2023-54146 page",
"url": "https://www.suse.com/security/cve/CVE-2023-54146/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2023-54168 page",
"url": "https://www.suse.com/security/cve/CVE-2023-54168/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2023-54170 page",
"url": "https://www.suse.com/security/cve/CVE-2023-54170/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2023-54177 page",
"url": "https://www.suse.com/security/cve/CVE-2023-54177/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2023-54179 page",
"url": "https://www.suse.com/security/cve/CVE-2023-54179/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2023-54186 page",
"url": "https://www.suse.com/security/cve/CVE-2023-54186/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2023-54197 page",
"url": "https://www.suse.com/security/cve/CVE-2023-54197/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2023-54211 page",
"url": "https://www.suse.com/security/cve/CVE-2023-54211/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2023-54213 page",
"url": "https://www.suse.com/security/cve/CVE-2023-54213/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2023-54214 page",
"url": "https://www.suse.com/security/cve/CVE-2023-54214/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2023-54220 page",
"url": "https://www.suse.com/security/cve/CVE-2023-54220/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2023-54224 page",
"url": "https://www.suse.com/security/cve/CVE-2023-54224/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2023-54226 page",
"url": "https://www.suse.com/security/cve/CVE-2023-54226/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2023-54236 page",
"url": "https://www.suse.com/security/cve/CVE-2023-54236/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2023-54260 page",
"url": "https://www.suse.com/security/cve/CVE-2023-54260/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2023-54264 page",
"url": "https://www.suse.com/security/cve/CVE-2023-54264/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2023-54266 page",
"url": "https://www.suse.com/security/cve/CVE-2023-54266/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2023-54270 page",
"url": "https://www.suse.com/security/cve/CVE-2023-54270/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2023-54271 page",
"url": "https://www.suse.com/security/cve/CVE-2023-54271/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2023-54286 page",
"url": "https://www.suse.com/security/cve/CVE-2023-54286/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2023-54289 page",
"url": "https://www.suse.com/security/cve/CVE-2023-54289/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2023-54294 page",
"url": "https://www.suse.com/security/cve/CVE-2023-54294/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2023-54300 page",
"url": "https://www.suse.com/security/cve/CVE-2023-54300/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2023-54309 page",
"url": "https://www.suse.com/security/cve/CVE-2023-54309/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2023-54317 page",
"url": "https://www.suse.com/security/cve/CVE-2023-54317/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-38085 page",
"url": "https://www.suse.com/security/cve/CVE-2025-38085/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-38336 page",
"url": "https://www.suse.com/security/cve/CVE-2025-38336/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-38728 page",
"url": "https://www.suse.com/security/cve/CVE-2025-38728/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40006 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40006/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40035 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40035/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40053 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40053/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40064 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40064/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40075 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40075/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40081 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40081/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40110 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40110/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40123 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40123/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40135 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40135/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40139 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40139/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40149 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40149/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40153 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40153/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40158 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40158/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40160 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40160/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40164 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40164/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40167 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40167/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40168 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40168/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40170 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40170/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40178 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40178/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40198 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40198/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40200 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40200/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40215 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40215/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40219 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40219/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40233 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40233/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40240 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40240/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40244 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40244/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40248 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40248/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40252 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40252/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40256 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40256/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40269 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40269/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40275 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40275/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40278 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40278/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40279 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40279/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40283 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40283/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40304 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40304/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40308 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40308/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40321 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40321/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40322 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40322/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40331 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40331/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40337 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40337/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40349 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40349/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40351 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40351/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-68206 page",
"url": "https://www.suse.com/security/cve/CVE-2025-68206/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-68340 page",
"url": "https://www.suse.com/security/cve/CVE-2025-68340/"
}
],
"title": "Security update for the Linux Kernel",
"tracking": {
"current_release_date": "2026-01-28T14:35:14Z",
"generator": {
"date": "2026-01-28T14:35:14Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "SUSE-SU-2026:0316-1",
"initial_release_date": "2026-01-28T14:35:14Z",
"revision_history": [
{
"date": "2026-01-28T14:35:14Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "cluster-md-kmp-default-4.12.14-122.290.1.aarch64",
"product": {
"name": "cluster-md-kmp-default-4.12.14-122.290.1.aarch64",
"product_id": "cluster-md-kmp-default-4.12.14-122.290.1.aarch64"
}
},
{
"category": "product_version",
"name": "dlm-kmp-default-4.12.14-122.290.1.aarch64",
"product": {
"name": "dlm-kmp-default-4.12.14-122.290.1.aarch64",
"product_id": "dlm-kmp-default-4.12.14-122.290.1.aarch64"
}
},
{
"category": "product_version",
"name": "gfs2-kmp-default-4.12.14-122.290.1.aarch64",
"product": {
"name": "gfs2-kmp-default-4.12.14-122.290.1.aarch64",
"product_id": "gfs2-kmp-default-4.12.14-122.290.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-default-4.12.14-122.290.1.aarch64",
"product": {
"name": "kernel-default-4.12.14-122.290.1.aarch64",
"product_id": "kernel-default-4.12.14-122.290.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-default-base-4.12.14-122.290.1.aarch64",
"product": {
"name": "kernel-default-base-4.12.14-122.290.1.aarch64",
"product_id": "kernel-default-base-4.12.14-122.290.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-default-devel-4.12.14-122.290.1.aarch64",
"product": {
"name": "kernel-default-devel-4.12.14-122.290.1.aarch64",
"product_id": "kernel-default-devel-4.12.14-122.290.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-default-extra-4.12.14-122.290.1.aarch64",
"product": {
"name": "kernel-default-extra-4.12.14-122.290.1.aarch64",
"product_id": "kernel-default-extra-4.12.14-122.290.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-default-kgraft-4.12.14-122.290.1.aarch64",
"product": {
"name": "kernel-default-kgraft-4.12.14-122.290.1.aarch64",
"product_id": "kernel-default-kgraft-4.12.14-122.290.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-obs-build-4.12.14-122.290.1.aarch64",
"product": {
"name": "kernel-obs-build-4.12.14-122.290.1.aarch64",
"product_id": "kernel-obs-build-4.12.14-122.290.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-obs-qa-4.12.14-122.290.1.aarch64",
"product": {
"name": "kernel-obs-qa-4.12.14-122.290.1.aarch64",
"product_id": "kernel-obs-qa-4.12.14-122.290.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-syms-4.12.14-122.290.1.aarch64",
"product": {
"name": "kernel-syms-4.12.14-122.290.1.aarch64",
"product_id": "kernel-syms-4.12.14-122.290.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-vanilla-4.12.14-122.290.1.aarch64",
"product": {
"name": "kernel-vanilla-4.12.14-122.290.1.aarch64",
"product_id": "kernel-vanilla-4.12.14-122.290.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-vanilla-base-4.12.14-122.290.1.aarch64",
"product": {
"name": "kernel-vanilla-base-4.12.14-122.290.1.aarch64",
"product_id": "kernel-vanilla-base-4.12.14-122.290.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-vanilla-devel-4.12.14-122.290.1.aarch64",
"product": {
"name": "kernel-vanilla-devel-4.12.14-122.290.1.aarch64",
"product_id": "kernel-vanilla-devel-4.12.14-122.290.1.aarch64"
}
},
{
"category": "product_version",
"name": "kselftests-kmp-default-4.12.14-122.290.1.aarch64",
"product": {
"name": "kselftests-kmp-default-4.12.14-122.290.1.aarch64",
"product_id": "kselftests-kmp-default-4.12.14-122.290.1.aarch64"
}
},
{
"category": "product_version",
"name": "ocfs2-kmp-default-4.12.14-122.290.1.aarch64",
"product": {
"name": "ocfs2-kmp-default-4.12.14-122.290.1.aarch64",
"product_id": "ocfs2-kmp-default-4.12.14-122.290.1.aarch64"
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-devel-4.12.14-122.290.1.noarch",
"product": {
"name": "kernel-devel-4.12.14-122.290.1.noarch",
"product_id": "kernel-devel-4.12.14-122.290.1.noarch"
}
},
{
"category": "product_version",
"name": "kernel-docs-4.12.14-122.290.1.noarch",
"product": {
"name": "kernel-docs-4.12.14-122.290.1.noarch",
"product_id": "kernel-docs-4.12.14-122.290.1.noarch"
}
},
{
"category": "product_version",
"name": "kernel-docs-html-4.12.14-122.290.1.noarch",
"product": {
"name": "kernel-docs-html-4.12.14-122.290.1.noarch",
"product_id": "kernel-docs-html-4.12.14-122.290.1.noarch"
}
},
{
"category": "product_version",
"name": "kernel-macros-4.12.14-122.290.1.noarch",
"product": {
"name": "kernel-macros-4.12.14-122.290.1.noarch",
"product_id": "kernel-macros-4.12.14-122.290.1.noarch"
}
},
{
"category": "product_version",
"name": "kernel-source-4.12.14-122.290.1.noarch",
"product": {
"name": "kernel-source-4.12.14-122.290.1.noarch",
"product_id": "kernel-source-4.12.14-122.290.1.noarch"
}
},
{
"category": "product_version",
"name": "kernel-source-vanilla-4.12.14-122.290.1.noarch",
"product": {
"name": "kernel-source-vanilla-4.12.14-122.290.1.noarch",
"product_id": "kernel-source-vanilla-4.12.14-122.290.1.noarch"
}
}
],
"category": "architecture",
"name": "noarch"
},
{
"branches": [
{
"category": "product_version",
"name": "cluster-md-kmp-default-4.12.14-122.290.1.ppc64le",
"product": {
"name": "cluster-md-kmp-default-4.12.14-122.290.1.ppc64le",
"product_id": "cluster-md-kmp-default-4.12.14-122.290.1.ppc64le"
}
},
{
"category": "product_version",
"name": "dlm-kmp-default-4.12.14-122.290.1.ppc64le",
"product": {
"name": "dlm-kmp-default-4.12.14-122.290.1.ppc64le",
"product_id": "dlm-kmp-default-4.12.14-122.290.1.ppc64le"
}
},
{
"category": "product_version",
"name": "gfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"product": {
"name": "gfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"product_id": "gfs2-kmp-default-4.12.14-122.290.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-default-4.12.14-122.290.1.ppc64le",
"product": {
"name": "kernel-default-4.12.14-122.290.1.ppc64le",
"product_id": "kernel-default-4.12.14-122.290.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-default-base-4.12.14-122.290.1.ppc64le",
"product": {
"name": "kernel-default-base-4.12.14-122.290.1.ppc64le",
"product_id": "kernel-default-base-4.12.14-122.290.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-default-devel-4.12.14-122.290.1.ppc64le",
"product": {
"name": "kernel-default-devel-4.12.14-122.290.1.ppc64le",
"product_id": "kernel-default-devel-4.12.14-122.290.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-default-extra-4.12.14-122.290.1.ppc64le",
"product": {
"name": "kernel-default-extra-4.12.14-122.290.1.ppc64le",
"product_id": "kernel-default-extra-4.12.14-122.290.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-default-kgraft-4.12.14-122.290.1.ppc64le",
"product": {
"name": "kernel-default-kgraft-4.12.14-122.290.1.ppc64le",
"product_id": "kernel-default-kgraft-4.12.14-122.290.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-default-kgraft-devel-4.12.14-122.290.1.ppc64le",
"product": {
"name": "kernel-default-kgraft-devel-4.12.14-122.290.1.ppc64le",
"product_id": "kernel-default-kgraft-devel-4.12.14-122.290.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-obs-build-4.12.14-122.290.1.ppc64le",
"product": {
"name": "kernel-obs-build-4.12.14-122.290.1.ppc64le",
"product_id": "kernel-obs-build-4.12.14-122.290.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-obs-qa-4.12.14-122.290.1.ppc64le",
"product": {
"name": "kernel-obs-qa-4.12.14-122.290.1.ppc64le",
"product_id": "kernel-obs-qa-4.12.14-122.290.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-syms-4.12.14-122.290.1.ppc64le",
"product": {
"name": "kernel-syms-4.12.14-122.290.1.ppc64le",
"product_id": "kernel-syms-4.12.14-122.290.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-vanilla-4.12.14-122.290.1.ppc64le",
"product": {
"name": "kernel-vanilla-4.12.14-122.290.1.ppc64le",
"product_id": "kernel-vanilla-4.12.14-122.290.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-vanilla-base-4.12.14-122.290.1.ppc64le",
"product": {
"name": "kernel-vanilla-base-4.12.14-122.290.1.ppc64le",
"product_id": "kernel-vanilla-base-4.12.14-122.290.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-vanilla-devel-4.12.14-122.290.1.ppc64le",
"product": {
"name": "kernel-vanilla-devel-4.12.14-122.290.1.ppc64le",
"product_id": "kernel-vanilla-devel-4.12.14-122.290.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kgraft-patch-4_12_14-122_290-default-1-8.7.1.ppc64le",
"product": {
"name": "kgraft-patch-4_12_14-122_290-default-1-8.7.1.ppc64le",
"product_id": "kgraft-patch-4_12_14-122_290-default-1-8.7.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kselftests-kmp-default-4.12.14-122.290.1.ppc64le",
"product": {
"name": "kselftests-kmp-default-4.12.14-122.290.1.ppc64le",
"product_id": "kselftests-kmp-default-4.12.14-122.290.1.ppc64le"
}
},
{
"category": "product_version",
"name": "ocfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"product": {
"name": "ocfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"product_id": "ocfs2-kmp-default-4.12.14-122.290.1.ppc64le"
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "cluster-md-kmp-default-4.12.14-122.290.1.s390x",
"product": {
"name": "cluster-md-kmp-default-4.12.14-122.290.1.s390x",
"product_id": "cluster-md-kmp-default-4.12.14-122.290.1.s390x"
}
},
{
"category": "product_version",
"name": "dlm-kmp-default-4.12.14-122.290.1.s390x",
"product": {
"name": "dlm-kmp-default-4.12.14-122.290.1.s390x",
"product_id": "dlm-kmp-default-4.12.14-122.290.1.s390x"
}
},
{
"category": "product_version",
"name": "gfs2-kmp-default-4.12.14-122.290.1.s390x",
"product": {
"name": "gfs2-kmp-default-4.12.14-122.290.1.s390x",
"product_id": "gfs2-kmp-default-4.12.14-122.290.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-default-4.12.14-122.290.1.s390x",
"product": {
"name": "kernel-default-4.12.14-122.290.1.s390x",
"product_id": "kernel-default-4.12.14-122.290.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-default-base-4.12.14-122.290.1.s390x",
"product": {
"name": "kernel-default-base-4.12.14-122.290.1.s390x",
"product_id": "kernel-default-base-4.12.14-122.290.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-default-devel-4.12.14-122.290.1.s390x",
"product": {
"name": "kernel-default-devel-4.12.14-122.290.1.s390x",
"product_id": "kernel-default-devel-4.12.14-122.290.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-default-extra-4.12.14-122.290.1.s390x",
"product": {
"name": "kernel-default-extra-4.12.14-122.290.1.s390x",
"product_id": "kernel-default-extra-4.12.14-122.290.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-default-kgraft-4.12.14-122.290.1.s390x",
"product": {
"name": "kernel-default-kgraft-4.12.14-122.290.1.s390x",
"product_id": "kernel-default-kgraft-4.12.14-122.290.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-default-kgraft-devel-4.12.14-122.290.1.s390x",
"product": {
"name": "kernel-default-kgraft-devel-4.12.14-122.290.1.s390x",
"product_id": "kernel-default-kgraft-devel-4.12.14-122.290.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-default-man-4.12.14-122.290.1.s390x",
"product": {
"name": "kernel-default-man-4.12.14-122.290.1.s390x",
"product_id": "kernel-default-man-4.12.14-122.290.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-obs-build-4.12.14-122.290.1.s390x",
"product": {
"name": "kernel-obs-build-4.12.14-122.290.1.s390x",
"product_id": "kernel-obs-build-4.12.14-122.290.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-obs-qa-4.12.14-122.290.1.s390x",
"product": {
"name": "kernel-obs-qa-4.12.14-122.290.1.s390x",
"product_id": "kernel-obs-qa-4.12.14-122.290.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-syms-4.12.14-122.290.1.s390x",
"product": {
"name": "kernel-syms-4.12.14-122.290.1.s390x",
"product_id": "kernel-syms-4.12.14-122.290.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-vanilla-4.12.14-122.290.1.s390x",
"product": {
"name": "kernel-vanilla-4.12.14-122.290.1.s390x",
"product_id": "kernel-vanilla-4.12.14-122.290.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-vanilla-base-4.12.14-122.290.1.s390x",
"product": {
"name": "kernel-vanilla-base-4.12.14-122.290.1.s390x",
"product_id": "kernel-vanilla-base-4.12.14-122.290.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-vanilla-devel-4.12.14-122.290.1.s390x",
"product": {
"name": "kernel-vanilla-devel-4.12.14-122.290.1.s390x",
"product_id": "kernel-vanilla-devel-4.12.14-122.290.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-zfcpdump-4.12.14-122.290.1.s390x",
"product": {
"name": "kernel-zfcpdump-4.12.14-122.290.1.s390x",
"product_id": "kernel-zfcpdump-4.12.14-122.290.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-zfcpdump-man-4.12.14-122.290.1.s390x",
"product": {
"name": "kernel-zfcpdump-man-4.12.14-122.290.1.s390x",
"product_id": "kernel-zfcpdump-man-4.12.14-122.290.1.s390x"
}
},
{
"category": "product_version",
"name": "kgraft-patch-4_12_14-122_290-default-1-8.7.1.s390x",
"product": {
"name": "kgraft-patch-4_12_14-122_290-default-1-8.7.1.s390x",
"product_id": "kgraft-patch-4_12_14-122_290-default-1-8.7.1.s390x"
}
},
{
"category": "product_version",
"name": "kselftests-kmp-default-4.12.14-122.290.1.s390x",
"product": {
"name": "kselftests-kmp-default-4.12.14-122.290.1.s390x",
"product_id": "kselftests-kmp-default-4.12.14-122.290.1.s390x"
}
},
{
"category": "product_version",
"name": "ocfs2-kmp-default-4.12.14-122.290.1.s390x",
"product": {
"name": "ocfs2-kmp-default-4.12.14-122.290.1.s390x",
"product_id": "ocfs2-kmp-default-4.12.14-122.290.1.s390x"
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"product": {
"name": "cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"product_id": "cluster-md-kmp-default-4.12.14-122.290.1.x86_64"
}
},
{
"category": "product_version",
"name": "dlm-kmp-default-4.12.14-122.290.1.x86_64",
"product": {
"name": "dlm-kmp-default-4.12.14-122.290.1.x86_64",
"product_id": "dlm-kmp-default-4.12.14-122.290.1.x86_64"
}
},
{
"category": "product_version",
"name": "gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"product": {
"name": "gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"product_id": "gfs2-kmp-default-4.12.14-122.290.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-default-4.12.14-122.290.1.x86_64",
"product": {
"name": "kernel-default-4.12.14-122.290.1.x86_64",
"product_id": "kernel-default-4.12.14-122.290.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-default-base-4.12.14-122.290.1.x86_64",
"product": {
"name": "kernel-default-base-4.12.14-122.290.1.x86_64",
"product_id": "kernel-default-base-4.12.14-122.290.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-default-devel-4.12.14-122.290.1.x86_64",
"product": {
"name": "kernel-default-devel-4.12.14-122.290.1.x86_64",
"product_id": "kernel-default-devel-4.12.14-122.290.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-default-extra-4.12.14-122.290.1.x86_64",
"product": {
"name": "kernel-default-extra-4.12.14-122.290.1.x86_64",
"product_id": "kernel-default-extra-4.12.14-122.290.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-default-kgraft-4.12.14-122.290.1.x86_64",
"product": {
"name": "kernel-default-kgraft-4.12.14-122.290.1.x86_64",
"product_id": "kernel-default-kgraft-4.12.14-122.290.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-default-kgraft-devel-4.12.14-122.290.1.x86_64",
"product": {
"name": "kernel-default-kgraft-devel-4.12.14-122.290.1.x86_64",
"product_id": "kernel-default-kgraft-devel-4.12.14-122.290.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-kvmsmall-4.12.14-122.290.1.x86_64",
"product": {
"name": "kernel-kvmsmall-4.12.14-122.290.1.x86_64",
"product_id": "kernel-kvmsmall-4.12.14-122.290.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-kvmsmall-base-4.12.14-122.290.1.x86_64",
"product": {
"name": "kernel-kvmsmall-base-4.12.14-122.290.1.x86_64",
"product_id": "kernel-kvmsmall-base-4.12.14-122.290.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-kvmsmall-devel-4.12.14-122.290.1.x86_64",
"product": {
"name": "kernel-kvmsmall-devel-4.12.14-122.290.1.x86_64",
"product_id": "kernel-kvmsmall-devel-4.12.14-122.290.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-obs-build-4.12.14-122.290.1.x86_64",
"product": {
"name": "kernel-obs-build-4.12.14-122.290.1.x86_64",
"product_id": "kernel-obs-build-4.12.14-122.290.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-obs-qa-4.12.14-122.290.1.x86_64",
"product": {
"name": "kernel-obs-qa-4.12.14-122.290.1.x86_64",
"product_id": "kernel-obs-qa-4.12.14-122.290.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-syms-4.12.14-122.290.1.x86_64",
"product": {
"name": "kernel-syms-4.12.14-122.290.1.x86_64",
"product_id": "kernel-syms-4.12.14-122.290.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-vanilla-4.12.14-122.290.1.x86_64",
"product": {
"name": "kernel-vanilla-4.12.14-122.290.1.x86_64",
"product_id": "kernel-vanilla-4.12.14-122.290.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-vanilla-base-4.12.14-122.290.1.x86_64",
"product": {
"name": "kernel-vanilla-base-4.12.14-122.290.1.x86_64",
"product_id": "kernel-vanilla-base-4.12.14-122.290.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-vanilla-devel-4.12.14-122.290.1.x86_64",
"product": {
"name": "kernel-vanilla-devel-4.12.14-122.290.1.x86_64",
"product_id": "kernel-vanilla-devel-4.12.14-122.290.1.x86_64"
}
},
{
"category": "product_version",
"name": "kgraft-patch-4_12_14-122_290-default-1-8.7.1.x86_64",
"product": {
"name": "kgraft-patch-4_12_14-122_290-default-1-8.7.1.x86_64",
"product_id": "kgraft-patch-4_12_14-122_290-default-1-8.7.1.x86_64"
}
},
{
"category": "product_version",
"name": "kselftests-kmp-default-4.12.14-122.290.1.x86_64",
"product": {
"name": "kselftests-kmp-default-4.12.14-122.290.1.x86_64",
"product_id": "kselftests-kmp-default-4.12.14-122.290.1.x86_64"
}
},
{
"category": "product_version",
"name": "ocfs2-kmp-default-4.12.14-122.290.1.x86_64",
"product": {
"name": "ocfs2-kmp-default-4.12.14-122.290.1.x86_64",
"product_id": "ocfs2-kmp-default-4.12.14-122.290.1.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "SUSE Linux Enterprise Live Patching 12 SP5",
"product": {
"name": "SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-live-patching:12:sp5"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Server 12 SP5-LTSS",
"product": {
"name": "SUSE Linux Enterprise Server 12 SP5-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP5-LTSS",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sles-ltss:12:sp5"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5",
"product": {
"name": "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5",
"product_id": "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sles-ltss-extended-security:12:sp5"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-kgraft-4.12.14-122.290.1.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.ppc64le"
},
"product_reference": "kernel-default-kgraft-4.12.14-122.290.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-kgraft-4.12.14-122.290.1.s390x as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.s390x"
},
"product_reference": "kernel-default-kgraft-4.12.14-122.290.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-kgraft-4.12.14-122.290.1.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.x86_64"
},
"product_reference": "kernel-default-kgraft-4.12.14-122.290.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-kgraft-devel-4.12.14-122.290.1.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.ppc64le"
},
"product_reference": "kernel-default-kgraft-devel-4.12.14-122.290.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-kgraft-devel-4.12.14-122.290.1.s390x as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.s390x"
},
"product_reference": "kernel-default-kgraft-devel-4.12.14-122.290.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-kgraft-devel-4.12.14-122.290.1.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.x86_64"
},
"product_reference": "kernel-default-kgraft-devel-4.12.14-122.290.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_290-default-1-8.7.1.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.ppc64le"
},
"product_reference": "kgraft-patch-4_12_14-122_290-default-1-8.7.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_290-default-1-8.7.1.s390x as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.s390x"
},
"product_reference": "kgraft-patch-4_12_14-122_290-default-1-8.7.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_290-default-1-8.7.1.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.x86_64"
},
"product_reference": "kgraft-patch-4_12_14-122_290-default-1-8.7.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cluster-md-kmp-default-4.12.14-122.290.1.aarch64 as component of SUSE Linux Enterprise Server 12 SP5-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.aarch64"
},
"product_reference": "cluster-md-kmp-default-4.12.14-122.290.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cluster-md-kmp-default-4.12.14-122.290.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP5-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.ppc64le"
},
"product_reference": "cluster-md-kmp-default-4.12.14-122.290.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cluster-md-kmp-default-4.12.14-122.290.1.s390x as component of SUSE Linux Enterprise Server 12 SP5-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.s390x"
},
"product_reference": "cluster-md-kmp-default-4.12.14-122.290.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cluster-md-kmp-default-4.12.14-122.290.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP5-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.x86_64"
},
"product_reference": "cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dlm-kmp-default-4.12.14-122.290.1.aarch64 as component of SUSE Linux Enterprise Server 12 SP5-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.aarch64"
},
"product_reference": "dlm-kmp-default-4.12.14-122.290.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dlm-kmp-default-4.12.14-122.290.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP5-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.ppc64le"
},
"product_reference": "dlm-kmp-default-4.12.14-122.290.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dlm-kmp-default-4.12.14-122.290.1.s390x as component of SUSE Linux Enterprise Server 12 SP5-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.s390x"
},
"product_reference": "dlm-kmp-default-4.12.14-122.290.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dlm-kmp-default-4.12.14-122.290.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP5-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.x86_64"
},
"product_reference": "dlm-kmp-default-4.12.14-122.290.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gfs2-kmp-default-4.12.14-122.290.1.aarch64 as component of SUSE Linux Enterprise Server 12 SP5-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.aarch64"
},
"product_reference": "gfs2-kmp-default-4.12.14-122.290.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gfs2-kmp-default-4.12.14-122.290.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP5-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.ppc64le"
},
"product_reference": "gfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gfs2-kmp-default-4.12.14-122.290.1.s390x as component of SUSE Linux Enterprise Server 12 SP5-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.s390x"
},
"product_reference": "gfs2-kmp-default-4.12.14-122.290.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gfs2-kmp-default-4.12.14-122.290.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP5-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.x86_64"
},
"product_reference": "gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-4.12.14-122.290.1.aarch64 as component of SUSE Linux Enterprise Server 12 SP5-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.aarch64"
},
"product_reference": "kernel-default-4.12.14-122.290.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-4.12.14-122.290.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP5-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.ppc64le"
},
"product_reference": "kernel-default-4.12.14-122.290.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-4.12.14-122.290.1.s390x as component of SUSE Linux Enterprise Server 12 SP5-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.s390x"
},
"product_reference": "kernel-default-4.12.14-122.290.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-4.12.14-122.290.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP5-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.x86_64"
},
"product_reference": "kernel-default-4.12.14-122.290.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-4.12.14-122.290.1.aarch64 as component of SUSE Linux Enterprise Server 12 SP5-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.aarch64"
},
"product_reference": "kernel-default-base-4.12.14-122.290.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-4.12.14-122.290.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP5-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.ppc64le"
},
"product_reference": "kernel-default-base-4.12.14-122.290.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-4.12.14-122.290.1.s390x as component of SUSE Linux Enterprise Server 12 SP5-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.s390x"
},
"product_reference": "kernel-default-base-4.12.14-122.290.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-4.12.14-122.290.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP5-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.x86_64"
},
"product_reference": "kernel-default-base-4.12.14-122.290.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-devel-4.12.14-122.290.1.aarch64 as component of SUSE Linux Enterprise Server 12 SP5-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.aarch64"
},
"product_reference": "kernel-default-devel-4.12.14-122.290.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-devel-4.12.14-122.290.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP5-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.ppc64le"
},
"product_reference": "kernel-default-devel-4.12.14-122.290.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-devel-4.12.14-122.290.1.s390x as component of SUSE Linux Enterprise Server 12 SP5-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.s390x"
},
"product_reference": "kernel-default-devel-4.12.14-122.290.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-devel-4.12.14-122.290.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP5-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.x86_64"
},
"product_reference": "kernel-default-devel-4.12.14-122.290.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-man-4.12.14-122.290.1.s390x as component of SUSE Linux Enterprise Server 12 SP5-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.290.1.s390x"
},
"product_reference": "kernel-default-man-4.12.14-122.290.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-4.12.14-122.290.1.noarch as component of SUSE Linux Enterprise Server 12 SP5-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.290.1.noarch"
},
"product_reference": "kernel-devel-4.12.14-122.290.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-macros-4.12.14-122.290.1.noarch as component of SUSE Linux Enterprise Server 12 SP5-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.290.1.noarch"
},
"product_reference": "kernel-macros-4.12.14-122.290.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-source-4.12.14-122.290.1.noarch as component of SUSE Linux Enterprise Server 12 SP5-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.290.1.noarch"
},
"product_reference": "kernel-source-4.12.14-122.290.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-4.12.14-122.290.1.aarch64 as component of SUSE Linux Enterprise Server 12 SP5-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.aarch64"
},
"product_reference": "kernel-syms-4.12.14-122.290.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-4.12.14-122.290.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP5-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.ppc64le"
},
"product_reference": "kernel-syms-4.12.14-122.290.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-4.12.14-122.290.1.s390x as component of SUSE Linux Enterprise Server 12 SP5-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.s390x"
},
"product_reference": "kernel-syms-4.12.14-122.290.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-4.12.14-122.290.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP5-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.x86_64"
},
"product_reference": "kernel-syms-4.12.14-122.290.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ocfs2-kmp-default-4.12.14-122.290.1.aarch64 as component of SUSE Linux Enterprise Server 12 SP5-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.aarch64"
},
"product_reference": "ocfs2-kmp-default-4.12.14-122.290.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ocfs2-kmp-default-4.12.14-122.290.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP5-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.ppc64le"
},
"product_reference": "ocfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ocfs2-kmp-default-4.12.14-122.290.1.s390x as component of SUSE Linux Enterprise Server 12 SP5-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.s390x"
},
"product_reference": "ocfs2-kmp-default-4.12.14-122.290.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ocfs2-kmp-default-4.12.14-122.290.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP5-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.x86_64"
},
"product_reference": "ocfs2-kmp-default-4.12.14-122.290.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cluster-md-kmp-default-4.12.14-122.290.1.x86_64 as component of SUSE Linux Enterprise Server LTSS Extended Security 12 SP5",
"product_id": "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.290.1.x86_64"
},
"product_reference": "cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dlm-kmp-default-4.12.14-122.290.1.x86_64 as component of SUSE Linux Enterprise Server LTSS Extended Security 12 SP5",
"product_id": "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.290.1.x86_64"
},
"product_reference": "dlm-kmp-default-4.12.14-122.290.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gfs2-kmp-default-4.12.14-122.290.1.x86_64 as component of SUSE Linux Enterprise Server LTSS Extended Security 12 SP5",
"product_id": "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.290.1.x86_64"
},
"product_reference": "gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-4.12.14-122.290.1.x86_64 as component of SUSE Linux Enterprise Server LTSS Extended Security 12 SP5",
"product_id": "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.290.1.x86_64"
},
"product_reference": "kernel-default-4.12.14-122.290.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-4.12.14-122.290.1.x86_64 as component of SUSE Linux Enterprise Server LTSS Extended Security 12 SP5",
"product_id": "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.290.1.x86_64"
},
"product_reference": "kernel-default-base-4.12.14-122.290.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-devel-4.12.14-122.290.1.x86_64 as component of SUSE Linux Enterprise Server LTSS Extended Security 12 SP5",
"product_id": "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.290.1.x86_64"
},
"product_reference": "kernel-default-devel-4.12.14-122.290.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-4.12.14-122.290.1.noarch as component of SUSE Linux Enterprise Server LTSS Extended Security 12 SP5",
"product_id": "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.290.1.noarch"
},
"product_reference": "kernel-devel-4.12.14-122.290.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-macros-4.12.14-122.290.1.noarch as component of SUSE Linux Enterprise Server LTSS Extended Security 12 SP5",
"product_id": "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.290.1.noarch"
},
"product_reference": "kernel-macros-4.12.14-122.290.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-source-4.12.14-122.290.1.noarch as component of SUSE Linux Enterprise Server LTSS Extended Security 12 SP5",
"product_id": "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.290.1.noarch"
},
"product_reference": "kernel-source-4.12.14-122.290.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-4.12.14-122.290.1.x86_64 as component of SUSE Linux Enterprise Server LTSS Extended Security 12 SP5",
"product_id": "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.290.1.x86_64"
},
"product_reference": "kernel-syms-4.12.14-122.290.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ocfs2-kmp-default-4.12.14-122.290.1.x86_64 as component of SUSE Linux Enterprise Server LTSS Extended Security 12 SP5",
"product_id": "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.290.1.x86_64"
},
"product_reference": "ocfs2-kmp-default-4.12.14-122.290.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2022-49546",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-49546"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nx86/kexec: fix memory leak of elf header buffer\n\nThis is reported by kmemleak detector:\n\nunreferenced object 0xffffc900002a9000 (size 4096):\n comm \"kexec\", pid 14950, jiffies 4295110793 (age 373.951s)\n hex dump (first 32 bytes):\n 7f 45 4c 46 02 01 01 00 00 00 00 00 00 00 00 00 .ELF............\n 04 00 3e 00 01 00 00 00 00 00 00 00 00 00 00 00 ..\u003e.............\n backtrace:\n [\u003c0000000016a8ef9f\u003e] __vmalloc_node_range+0x101/0x170\n [\u003c000000002b66b6c0\u003e] __vmalloc_node+0xb4/0x160\n [\u003c00000000ad40107d\u003e] crash_prepare_elf64_headers+0x8e/0xcd0\n [\u003c0000000019afff23\u003e] crash_load_segments+0x260/0x470\n [\u003c0000000019ebe95c\u003e] bzImage64_load+0x814/0xad0\n [\u003c0000000093e16b05\u003e] arch_kexec_kernel_image_load+0x1be/0x2a0\n [\u003c000000009ef2fc88\u003e] kimage_file_alloc_init+0x2ec/0x5a0\n [\u003c0000000038f5a97a\u003e] __do_sys_kexec_file_load+0x28d/0x530\n [\u003c0000000087c19992\u003e] do_syscall_64+0x3b/0x90\n [\u003c0000000066e063a4\u003e] entry_SYSCALL_64_after_hwframe+0x44/0xae\n\nIn crash_prepare_elf64_headers(), a buffer is allocated via vmalloc() to\nstore elf headers. While it\u0027s not freed back to system correctly when\nkdump kernel is reloaded or unloaded. Then memory leak is caused. Fix it\nby introducing x86 specific function arch_kimage_file_post_load_cleanup(),\nand freeing the buffer there.\n\nAnd also remove the incorrect elf header buffer freeing code. Before\ncalling arch specific kexec_file loading function, the image instance has\nbeen initialized. So \u0027image-\u003eelf_headers\u0027 must be NULL. It doesn\u0027t make\nsense to free the elf header buffer in the place.\n\nThree different people have reported three bugs about the memory leak on\nx86_64 inside Redhat.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.290.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-49546",
"url": "https://www.suse.com/security/cve/CVE-2022-49546"
},
{
"category": "external",
"summary": "SUSE Bug 1238750 for CVE-2022-49546",
"url": "https://bugzilla.suse.com/1238750"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.290.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 2.3,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.290.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-28T14:35:14Z",
"details": "low"
}
],
"title": "CVE-2022-49546"
},
{
"cve": "CVE-2022-49604",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-49604"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nip: Fix data-races around sysctl_ip_fwd_use_pmtu.\n\nWhile reading sysctl_ip_fwd_use_pmtu, it can be changed concurrently.\nThus, we need to add READ_ONCE() to its readers.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.290.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-49604",
"url": "https://www.suse.com/security/cve/CVE-2022-49604"
},
{
"category": "external",
"summary": "SUSE Bug 1238414 for CVE-2022-49604",
"url": "https://bugzilla.suse.com/1238414"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.290.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.290.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-28T14:35:14Z",
"details": "moderate"
}
],
"title": "CVE-2022-49604"
},
{
"cve": "CVE-2022-49975",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-49975"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nbpf: Don\u0027t redirect packets with invalid pkt_len\n\nSyzbot found an issue [1]: fq_codel_drop() try to drop a flow whitout any\nskbs, that is, the flow-\u003ehead is null.\nThe root cause, as the [2] says, is because that bpf_prog_test_run_skb()\nrun a bpf prog which redirects empty skbs.\nSo we should determine whether the length of the packet modified by bpf\nprog or others like bpf_prog_test is valid before forwarding it directly.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.290.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-49975",
"url": "https://www.suse.com/security/cve/CVE-2022-49975"
},
{
"category": "external",
"summary": "SUSE Bug 1245196 for CVE-2022-49975",
"url": "https://bugzilla.suse.com/1245196"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.290.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.290.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-28T14:35:14Z",
"details": "moderate"
}
],
"title": "CVE-2022-49975"
},
{
"cve": "CVE-2022-50527",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-50527"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\ndrm/amdgpu: Fix size validation for non-exclusive domains (v4)\n\nFix amdgpu_bo_validate_size() to check whether the TTM domain manager for the\nrequested memory exists, else we get a kernel oops when dereferencing \"man\".\n\nv2: Make the patch standalone, i.e. not dependent on local patches.\nv3: Preserve old behaviour and just check that the manager pointer is not\n NULL.\nv4: Complain if GTT domain requested and it is uninitialized--most likely a\n bug.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.290.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-50527",
"url": "https://www.suse.com/security/cve/CVE-2022-50527"
},
{
"category": "external",
"summary": "SUSE Bug 1251738 for CVE-2022-50527",
"url": "https://bugzilla.suse.com/1251738"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.290.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.290.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-28T14:35:14Z",
"details": "moderate"
}
],
"title": "CVE-2022-50527"
},
{
"cve": "CVE-2022-50615",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-50615"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nperf/x86/intel/uncore: Fix reference count leak in snr_uncore_mmio_map()\n\npci_get_device() will increase the reference count for the returned\npci_dev, so snr_uncore_get_mc_dev() will return a pci_dev with its\nreference count increased. We need to call pci_dev_put() to decrease the\nreference count. Let\u0027s add the missing pci_dev_put().",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.290.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-50615",
"url": "https://www.suse.com/security/cve/CVE-2022-50615"
},
{
"category": "external",
"summary": "SUSE Bug 1254580 for CVE-2022-50615",
"url": "https://bugzilla.suse.com/1254580"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.290.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.290.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-28T14:35:14Z",
"details": "moderate"
}
],
"title": "CVE-2022-50615"
},
{
"cve": "CVE-2022-50625",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-50625"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nserial: amba-pl011: avoid SBSA UART accessing DMACR register\n\nChapter \"B Generic UART\" in \"ARM Server Base System Architecture\" [1]\ndocumentation describes a generic UART interface. Such generic UART\ndoes not support DMA. In current code, sbsa_uart_pops and\namba_pl011_pops share the same stop_rx operation, which will invoke\npl011_dma_rx_stop, leading to an access of the DMACR register. This\ncommit adds a using_rx_dma check in pl011_dma_rx_stop to avoid the\naccess to DMACR register for SBSA UARTs which does not support DMA.\n\nWhen the kernel enables DMA engine with \"CONFIG_DMA_ENGINE=y\", Linux\nSBSA PL011 driver will access PL011 DMACR register in some functions.\nFor most real SBSA Pl011 hardware implementations, the DMACR write\nbehaviour will be ignored. So these DMACR operations will not cause\nobvious problems. But for some virtual SBSA PL011 hardware, like Xen\nvirtual SBSA PL011 (vpl011) device, the behaviour might be different.\nXen vpl011 emulation will inject a data abort to guest, when guest is\naccessing an unimplemented UART register. As Xen VPL011 is SBSA\ncompatible, it will not implement DMACR register. So when Linux SBSA\nPL011 driver access DMACR register, it will get an unhandled data abort\nfault and the application will get a segmentation fault:\nUnhandled fault at 0xffffffc00944d048\nMem abort info:\n ESR = 0x96000000\n EC = 0x25: DABT (current EL), IL = 32 bits\n SET = 0, FnV = 0\n EA = 0, S1PTW = 0\n FSC = 0x00: ttbr address size fault\nData abort info:\n ISV = 0, ISS = 0x00000000\n CM = 0, WnR = 0\nswapper pgtable: 4k pages, 39-bit VAs, pgdp=0000000020e2e000\n[ffffffc00944d048] pgd=100000003ffff803, p4d=100000003ffff803, pud=100000003ffff803, pmd=100000003fffa803, pte=006800009c090f13\nInternal error: ttbr address size fault: 96000000 [#1] PREEMPT SMP\n...\nCall trace:\n pl011_stop_rx+0x70/0x80\n tty_port_shutdown+0x7c/0xb4\n tty_port_close+0x60/0xcc\n uart_close+0x34/0x8c\n tty_release+0x144/0x4c0\n __fput+0x78/0x220\n ____fput+0x1c/0x30\n task_work_run+0x88/0xc0\n do_notify_resume+0x8d0/0x123c\n el0_svc+0xa8/0xc0\n el0t_64_sync_handler+0xa4/0x130\n el0t_64_sync+0x1a0/0x1a4\nCode: b9000083 b901f001 794038a0 8b000042 (b9000041)\n---[ end trace 83dd93df15c3216f ]---\nnote: bootlogd[132] exited with preempt_count 1\n/etc/rcS.d/S07bootlogd: line 47: 132 Segmentation fault start-stop-daemon\n\nThis has been discussed in the Xen community, and we think it should fix\nthis in Linux. See [2] for more information.\n\n[1] https://developer.arm.com/documentation/den0094/c/?lang=en\n[2] https://lists.xenproject.org/archives/html/xen-devel/2022-11/msg00543.html",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.290.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-50625",
"url": "https://www.suse.com/security/cve/CVE-2022-50625"
},
{
"category": "external",
"summary": "SUSE Bug 1254559 for CVE-2022-50625",
"url": "https://bugzilla.suse.com/1254559"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.290.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 2.3,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.290.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-28T14:35:14Z",
"details": "low"
}
],
"title": "CVE-2022-50625"
},
{
"cve": "CVE-2022-50630",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-50630"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nmm: hugetlb: fix UAF in hugetlb_handle_userfault\n\nThe vma_lock and hugetlb_fault_mutex are dropped before handling userfault\nand reacquire them again after handle_userfault(), but reacquire the\nvma_lock could lead to UAF[1,2] due to the following race,\n\nhugetlb_fault\n hugetlb_no_page\n /*unlock vma_lock */\n hugetlb_handle_userfault\n handle_userfault\n /* unlock mm-\u003emmap_lock*/\n vm_mmap_pgoff\n do_mmap\n mmap_region\n munmap_vma_range\n /* clean old vma */\n /* lock vma_lock again \u003c--- UAF */\n /* unlock vma_lock */\n\nSince the vma_lock will unlock immediately after\nhugetlb_handle_userfault(), let\u0027s drop the unneeded lock and unlock in\nhugetlb_handle_userfault() to fix the issue.\n\n[1] https://lore.kernel.org/linux-mm/000000000000d5e00a05e834962e@google.com/\n[2] https://lore.kernel.org/linux-mm/20220921014457.1668-1-liuzixian4@huawei.com/",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.290.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-50630",
"url": "https://www.suse.com/security/cve/CVE-2022-50630"
},
{
"category": "external",
"summary": "SUSE Bug 1254785 for CVE-2022-50630",
"url": "https://bugzilla.suse.com/1254785"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.290.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.290.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-28T14:35:14Z",
"details": "moderate"
}
],
"title": "CVE-2022-50630"
},
{
"cve": "CVE-2022-50636",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-50636"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nPCI: Fix pci_device_is_present() for VFs by checking PF\n\npci_device_is_present() previously didn\u0027t work for VFs because it reads the\nVendor and Device ID, which are 0xffff for VFs, which looks like they\naren\u0027t present. Check the PF instead.\n\nWei Gong reported that if virtio I/O is in progress when the driver is\nunbound or \"0\" is written to /sys/.../sriov_numvfs, the virtio I/O\noperation hangs, which may result in output like this:\n\n task:bash state:D stack: 0 pid: 1773 ppid: 1241 flags:0x00004002\n Call Trace:\n schedule+0x4f/0xc0\n blk_mq_freeze_queue_wait+0x69/0xa0\n blk_mq_freeze_queue+0x1b/0x20\n blk_cleanup_queue+0x3d/0xd0\n virtblk_remove+0x3c/0xb0 [virtio_blk]\n virtio_dev_remove+0x4b/0x80\n ...\n device_unregister+0x1b/0x60\n unregister_virtio_device+0x18/0x30\n virtio_pci_remove+0x41/0x80\n pci_device_remove+0x3e/0xb0\n\nThis happened because pci_device_is_present(VF) returned \"false\" in\nvirtio_pci_remove(), so it called virtio_break_device(). The broken vq\nmeant that vring_interrupt() skipped the vq.callback() that would have\ncompleted the virtio I/O operation via virtblk_done().\n\n[bhelgaas: commit log, simplify to always use pci_physfn(), add stable tag]",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.290.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-50636",
"url": "https://www.suse.com/security/cve/CVE-2022-50636"
},
{
"category": "external",
"summary": "SUSE Bug 1254645 for CVE-2022-50636",
"url": "https://bugzilla.suse.com/1254645"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.290.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.290.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-28T14:35:14Z",
"details": "moderate"
}
],
"title": "CVE-2022-50636"
},
{
"cve": "CVE-2022-50638",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-50638"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\next4: fix bug_on in __es_tree_search caused by bad boot loader inode\n\nWe got a issue as fllows:\n==================================================================\n kernel BUG at fs/ext4/extents_status.c:203!\n invalid opcode: 0000 [#1] PREEMPT SMP\n CPU: 1 PID: 945 Comm: cat Not tainted 6.0.0-next-20221007-dirty #349\n RIP: 0010:ext4_es_end.isra.0+0x34/0x42\n RSP: 0018:ffffc9000143b768 EFLAGS: 00010203\n RAX: 0000000000000000 RBX: ffff8881769cd0b8 RCX: 0000000000000000\n RDX: 0000000000000000 RSI: ffffffff8fc27cf7 RDI: 00000000ffffffff\n RBP: ffff8881769cd0bc R08: 0000000000000000 R09: ffffc9000143b5f8\n R10: 0000000000000001 R11: 0000000000000001 R12: ffff8881769cd0a0\n R13: ffff8881768e5668 R14: 00000000768e52f0 R15: 0000000000000000\n FS: 00007f359f7f05c0(0000)GS:ffff88842fd00000(0000)knlGS:0000000000000000\n CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033\n CR2: 00007f359f5a2000 CR3: 000000017130c000 CR4: 00000000000006e0\n DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000\n DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400\n Call Trace:\n \u003cTASK\u003e\n __es_tree_search.isra.0+0x6d/0xf5\n ext4_es_cache_extent+0xfa/0x230\n ext4_cache_extents+0xd2/0x110\n ext4_find_extent+0x5d5/0x8c0\n ext4_ext_map_blocks+0x9c/0x1d30\n ext4_map_blocks+0x431/0xa50\n ext4_mpage_readpages+0x48e/0xe40\n ext4_readahead+0x47/0x50\n read_pages+0x82/0x530\n page_cache_ra_unbounded+0x199/0x2a0\n do_page_cache_ra+0x47/0x70\n page_cache_ra_order+0x242/0x400\n ondemand_readahead+0x1e8/0x4b0\n page_cache_sync_ra+0xf4/0x110\n filemap_get_pages+0x131/0xb20\n filemap_read+0xda/0x4b0\n generic_file_read_iter+0x13a/0x250\n ext4_file_read_iter+0x59/0x1d0\n vfs_read+0x28f/0x460\n ksys_read+0x73/0x160\n __x64_sys_read+0x1e/0x30\n do_syscall_64+0x35/0x80\n entry_SYSCALL_64_after_hwframe+0x63/0xcd\n \u003c/TASK\u003e\n==================================================================\n\nIn the above issue, ioctl invokes the swap_inode_boot_loader function to\nswap inode\u003c5\u003e and inode\u003c12\u003e. However, inode\u003c5\u003e contain incorrect imode and\ndisordered extents, and i_nlink is set to 1. The extents check for inode in\nthe ext4_iget function can be bypassed bacause 5 is EXT4_BOOT_LOADER_INO.\nWhile links_count is set to 1, the extents are not initialized in\nswap_inode_boot_loader. After the ioctl command is executed successfully,\nthe extents are swapped to inode\u003c12\u003e, in this case, run the `cat` command\nto view inode\u003c12\u003e. And Bug_ON is triggered due to the incorrect extents.\n\nWhen the boot loader inode is not initialized, its imode can be one of the\nfollowing:\n1) the imode is a bad type, which is marked as bad_inode in ext4_iget and\n set to S_IFREG.\n2) the imode is good type but not S_IFREG.\n3) the imode is S_IFREG.\n\nThe BUG_ON may be triggered by bypassing the check in cases 1 and 2.\nTherefore, when the boot loader inode is bad_inode or its imode is not\nS_IFREG, initialize the inode to avoid triggering the BUG.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.290.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-50638",
"url": "https://www.suse.com/security/cve/CVE-2022-50638"
},
{
"category": "external",
"summary": "SUSE Bug 1255469 for CVE-2022-50638",
"url": "https://bugzilla.suse.com/1255469"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.290.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.290.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-28T14:35:14Z",
"details": "moderate"
}
],
"title": "CVE-2022-50638"
},
{
"cve": "CVE-2022-50640",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-50640"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nmmc: core: Fix kernel panic when remove non-standard SDIO card\n\nSDIO tuple is only allocated for standard SDIO card, especially it causes\nmemory corruption issues when the non-standard SDIO card has removed, which\nis because the card device\u0027s reference counter does not increase for it at\nsdio_init_func(), but all SDIO card device reference counter gets decreased\nat sdio_release_func().",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.290.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-50640",
"url": "https://www.suse.com/security/cve/CVE-2022-50640"
},
{
"category": "external",
"summary": "SUSE Bug 1254686 for CVE-2022-50640",
"url": "https://bugzilla.suse.com/1254686"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.290.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.290.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-28T14:35:14Z",
"details": "moderate"
}
],
"title": "CVE-2022-50640"
},
{
"cve": "CVE-2022-50643",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-50643"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\ncifs: Fix xid leak in cifs_copy_file_range()\n\nIf the file is used by swap, before return -EOPNOTSUPP, should\nfree the xid, otherwise, the xid will be leaked.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.290.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-50643",
"url": "https://www.suse.com/security/cve/CVE-2022-50643"
},
{
"category": "external",
"summary": "SUSE Bug 1254631 for CVE-2022-50643",
"url": "https://bugzilla.suse.com/1254631"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.290.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.3,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.290.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-28T14:35:14Z",
"details": "low"
}
],
"title": "CVE-2022-50643"
},
{
"cve": "CVE-2022-50646",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-50646"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nscsi: hpsa: Fix possible memory leak in hpsa_init_one()\n\nThe hpda_alloc_ctlr_info() allocates h and its field reply_map. However, in\nhpsa_init_one(), if alloc_percpu() failed, the hpsa_init_one() jumps to\nclean1 directly, which frees h and leaks the h-\u003ereply_map.\n\nFix by calling hpda_free_ctlr_info() to release h-\u003ereplay_map and h instead\nfree h directly.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.290.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-50646",
"url": "https://www.suse.com/security/cve/CVE-2022-50646"
},
{
"category": "external",
"summary": "SUSE Bug 1254634 for CVE-2022-50646",
"url": "https://bugzilla.suse.com/1254634"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.290.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.3,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.290.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-28T14:35:14Z",
"details": "low"
}
],
"title": "CVE-2022-50646"
},
{
"cve": "CVE-2022-50656",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-50656"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnfc: pn533: Clear nfc_target before being used\n\nFix a slab-out-of-bounds read that occurs in nla_put() called from\nnfc_genl_send_target() when target-\u003esensb_res_len, which is duplicated\nfrom an nfc_target in pn533, is too large as the nfc_target is not\nproperly initialized and retains garbage values. Clear nfc_targets with\nmemset() before they are used.\n\nFound by a modified version of syzkaller.\n\nBUG: KASAN: slab-out-of-bounds in nla_put\nCall Trace:\n memcpy\n nla_put\n nfc_genl_dump_targets\n genl_lock_dumpit\n netlink_dump\n __netlink_dump_start\n genl_family_rcv_msg_dumpit\n genl_rcv_msg\n netlink_rcv_skb\n genl_rcv\n netlink_unicast\n netlink_sendmsg\n sock_sendmsg\n ____sys_sendmsg\n ___sys_sendmsg\n __sys_sendmsg\n do_syscall_64",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.290.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-50656",
"url": "https://www.suse.com/security/cve/CVE-2022-50656"
},
{
"category": "external",
"summary": "SUSE Bug 1254745 for CVE-2022-50656",
"url": "https://bugzilla.suse.com/1254745"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.290.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.1,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:L",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.290.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-28T14:35:14Z",
"details": "moderate"
}
],
"title": "CVE-2022-50656"
},
{
"cve": "CVE-2022-50668",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-50668"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\next4: fix deadlock due to mbcache entry corruption\n\nWhen manipulating xattr blocks, we can deadlock infinitely looping\ninside ext4_xattr_block_set() where we constantly keep finding xattr\nblock for reuse in mbcache but we are unable to reuse it because its\nreference count is too big. This happens because cache entry for the\nxattr block is marked as reusable (e_reusable set) although its\nreference count is too big. When this inconsistency happens, this\ninconsistent state is kept indefinitely and so ext4_xattr_block_set()\nkeeps retrying indefinitely.\n\nThe inconsistent state is caused by non-atomic update of e_reusable bit.\ne_reusable is part of a bitfield and e_reusable update can race with\nupdate of e_referenced bit in the same bitfield resulting in loss of one\nof the updates. Fix the problem by using atomic bitops instead.\n\nThis bug has been around for many years, but it became *much* easier\nto hit after commit 65f8b80053a1 (\"ext4: fix race when reusing xattr\nblocks\").",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.290.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-50668",
"url": "https://www.suse.com/security/cve/CVE-2022-50668"
},
{
"category": "external",
"summary": "SUSE Bug 1254763 for CVE-2022-50668",
"url": "https://bugzilla.suse.com/1254763"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.290.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.290.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-28T14:35:14Z",
"details": "moderate"
}
],
"title": "CVE-2022-50668"
},
{
"cve": "CVE-2022-50677",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-50677"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nipmi: fix use after free in _ipmi_destroy_user()\n\nThe intf_free() function frees the \"intf\" pointer so we cannot\ndereference it again on the next line.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.290.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-50677",
"url": "https://www.suse.com/security/cve/CVE-2022-50677"
},
{
"category": "external",
"summary": "SUSE Bug 1254692 for CVE-2022-50677",
"url": "https://bugzilla.suse.com/1254692"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.290.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.290.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-28T14:35:14Z",
"details": "moderate"
}
],
"title": "CVE-2022-50677"
},
{
"cve": "CVE-2022-50678",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-50678"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nwifi: brcmfmac: fix invalid address access when enabling SCAN log level\n\nThe variable i is changed when setting random MAC address and causes\ninvalid address access when printing the value of pi-\u003ereqs[i]-\u003ereqid.\n\nWe replace reqs index with ri to fix the issue.\n\n[ 136.726473] Unable to handle kernel access to user memory outside uaccess routines at virtual address 0000000000000000\n[ 136.737365] Mem abort info:\n[ 136.740172] ESR = 0x96000004\n[ 136.743359] Exception class = DABT (current EL), IL = 32 bits\n[ 136.749294] SET = 0, FnV = 0\n[ 136.752481] EA = 0, S1PTW = 0\n[ 136.755635] Data abort info:\n[ 136.758514] ISV = 0, ISS = 0x00000004\n[ 136.762487] CM = 0, WnR = 0\n[ 136.765522] user pgtable: 4k pages, 48-bit VAs, pgdp = 000000005c4e2577\n[ 136.772265] [0000000000000000] pgd=0000000000000000\n[ 136.777160] Internal error: Oops: 96000004 [#1] PREEMPT SMP\n[ 136.782732] Modules linked in: brcmfmac(O) brcmutil(O) cfg80211(O) compat(O)\n[ 136.789788] Process wificond (pid: 3175, stack limit = 0x00000000053048fb)\n[ 136.796664] CPU: 3 PID: 3175 Comm: wificond Tainted: G O 4.19.42-00001-g531a5f5 #1\n[ 136.805532] Hardware name: Freescale i.MX8MQ EVK (DT)\n[ 136.810584] pstate: 60400005 (nZCv daif +PAN -UAO)\n[ 136.815429] pc : brcmf_pno_config_sched_scans+0x6cc/0xa80 [brcmfmac]\n[ 136.821811] lr : brcmf_pno_config_sched_scans+0x67c/0xa80 [brcmfmac]\n[ 136.828162] sp : ffff00000e9a3880\n[ 136.831475] x29: ffff00000e9a3890 x28: ffff800020543400\n[ 136.836786] x27: ffff8000b1008880 x26: ffff0000012bf6a0\n[ 136.842098] x25: ffff80002054345c x24: ffff800088d22400\n[ 136.847409] x23: ffff0000012bf638 x22: ffff0000012bf6d8\n[ 136.852721] x21: ffff8000aced8fc0 x20: ffff8000ac164400\n[ 136.858032] x19: ffff00000e9a3946 x18: 0000000000000000\n[ 136.863343] x17: 0000000000000000 x16: 0000000000000000\n[ 136.868655] x15: ffff0000093f3b37 x14: 0000000000000050\n[ 136.873966] x13: 0000000000003135 x12: 0000000000000000\n[ 136.879277] x11: 0000000000000000 x10: ffff000009a61888\n[ 136.884589] x9 : 000000000000000f x8 : 0000000000000008\n[ 136.889900] x7 : 303a32303d726464 x6 : ffff00000a1f957d\n[ 136.895211] x5 : 0000000000000000 x4 : ffff00000e9a3942\n[ 136.900523] x3 : 0000000000000000 x2 : ffff0000012cead8\n[ 136.905834] x1 : ffff0000012bf6d8 x0 : 0000000000000000\n[ 136.911146] Call trace:\n[ 136.913623] brcmf_pno_config_sched_scans+0x6cc/0xa80 [brcmfmac]\n[ 136.919658] brcmf_pno_start_sched_scan+0xa4/0x118 [brcmfmac]\n[ 136.925430] brcmf_cfg80211_sched_scan_start+0x80/0xe0 [brcmfmac]\n[ 136.931636] nl80211_start_sched_scan+0x140/0x308 [cfg80211]\n[ 136.937298] genl_rcv_msg+0x358/0x3f4\n[ 136.940960] netlink_rcv_skb+0xb4/0x118\n[ 136.944795] genl_rcv+0x34/0x48\n[ 136.947935] netlink_unicast+0x264/0x300\n[ 136.951856] netlink_sendmsg+0x2e4/0x33c\n[ 136.955781] __sys_sendto+0x120/0x19c",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.290.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-50678",
"url": "https://www.suse.com/security/cve/CVE-2022-50678"
},
{
"category": "external",
"summary": "SUSE Bug 1254902 for CVE-2022-50678",
"url": "https://bugzilla.suse.com/1254902"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.290.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.290.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-28T14:35:14Z",
"details": "moderate"
}
],
"title": "CVE-2022-50678"
},
{
"cve": "CVE-2022-50700",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-50700"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nwifi: ath10k: Delay the unmapping of the buffer\n\nOn WCN3990, we are seeing a rare scenario where copy engine hardware is\nsending a copy complete interrupt to the host driver while still\nprocessing the buffer that the driver has sent, this is leading into an\nSMMU fault triggering kernel panic. This is happening on copy engine\nchannel 3 (CE3) where the driver normally enqueues WMI commands to the\nfirmware. Upon receiving a copy complete interrupt, host driver will\nimmediately unmap and frees the buffer presuming that hardware has\nprocessed the buffer. In the issue case, upon receiving copy complete\ninterrupt, host driver will unmap and free the buffer but since hardware\nis still accessing the buffer (which in this case got unmapped in\nparallel), SMMU hardware will trigger an SMMU fault resulting in a\nkernel panic.\n\nIn order to avoid this, as a work around, add a delay before unmapping\nthe copy engine source DMA buffer. This is conditionally done for\nWCN3990 and only for the CE3 channel where issue is seen.\n\nBelow is the crash signature:\n\nwifi smmu error: kernel: [ 10.120965] arm-smmu 15000000.iommu: Unhandled\ncontext fault: fsr=0x402, iova=0x7fdfd8ac0,\nfsynr=0x500003,cbfrsynra=0xc1, cb=6 arm-smmu 15000000.iommu: Unhandled\ncontext fault:fsr=0x402, iova=0x7fe06fdc0, fsynr=0x710003,\ncbfrsynra=0xc1, cb=6 qcom-q6v5-mss 4080000.remoteproc: fatal error\nreceived: err_qdi.c:1040:EF:wlan_process:0x1:WLAN RT:0x2091:\ncmnos_thread.c:3998:Asserted in copy_engine.c:AXI_ERROR_DETECTED:2149\nremoteproc remoteproc0: crash detected in\n4080000.remoteproc: type fatal error \u003c3\u003e remoteproc remoteproc0:\nhandling crash #1 in 4080000.remoteproc\n\npc : __arm_lpae_unmap+0x500/0x514\nlr : __arm_lpae_unmap+0x4bc/0x514\nsp : ffffffc011ffb530\nx29: ffffffc011ffb590 x28: 0000000000000000\nx27: 0000000000000000 x26: 0000000000000004\nx25: 0000000000000003 x24: ffffffc011ffb890\nx23: ffffffa762ef9be0 x22: ffffffa77244ef00\nx21: 0000000000000009 x20: 00000007fff7c000\nx19: 0000000000000003 x18: 0000000000000000\nx17: 0000000000000004 x16: ffffffd7a357d9f0\nx15: 0000000000000000 x14: 00fd5d4fa7ffffff\nx13: 000000000000000e x12: 0000000000000000\nx11: 00000000ffffffff x10: 00000000fffffe00\nx9 : 000000000000017c x8 : 000000000000000c\nx7 : 0000000000000000 x6 : ffffffa762ef9000\nx5 : 0000000000000003 x4 : 0000000000000004\nx3 : 0000000000001000 x2 : 00000007fff7c000\nx1 : ffffffc011ffb890 x0 : 0000000000000000 Call trace:\n__arm_lpae_unmap+0x500/0x514\n__arm_lpae_unmap+0x4bc/0x514\n__arm_lpae_unmap+0x4bc/0x514\narm_lpae_unmap_pages+0x78/0xa4\narm_smmu_unmap_pages+0x78/0x104\n__iommu_unmap+0xc8/0x1e4\niommu_unmap_fast+0x38/0x48\n__iommu_dma_unmap+0x84/0x104\niommu_dma_free+0x34/0x50\ndma_free_attrs+0xa4/0xd0\nath10k_htt_rx_free+0xc4/0xf4 [ath10k_core] ath10k_core_stop+0x64/0x7c\n[ath10k_core]\nath10k_halt+0x11c/0x180 [ath10k_core]\nath10k_stop+0x54/0x94 [ath10k_core]\ndrv_stop+0x48/0x1c8 [mac80211]\nieee80211_do_open+0x638/0x77c [mac80211] ieee80211_open+0x48/0x5c\n[mac80211]\n__dev_open+0xb4/0x174\n__dev_change_flags+0xc4/0x1dc\ndev_change_flags+0x3c/0x7c\ndevinet_ioctl+0x2b4/0x580\ninet_ioctl+0xb0/0x1b4\nsock_do_ioctl+0x4c/0x16c\ncompat_ifreq_ioctl+0x1cc/0x35c\ncompat_sock_ioctl+0x110/0x2ac\n__arm64_compat_sys_ioctl+0xf4/0x3e0\nel0_svc_common+0xb4/0x17c\nel0_svc_compat_handler+0x2c/0x58\nel0_svc_compat+0x8/0x2c\n\nTested-on: WCN3990 hw1.0 SNOC WLAN.HL.2.0-01387-QCAHLSWMTPLZ-1",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.290.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-50700",
"url": "https://www.suse.com/security/cve/CVE-2022-50700"
},
{
"category": "external",
"summary": "SUSE Bug 1255576 for CVE-2022-50700",
"url": "https://bugzilla.suse.com/1255576"
},
{
"category": "external",
"summary": "SUSE Bug 1255577 for CVE-2022-50700",
"url": "https://bugzilla.suse.com/1255577"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.290.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.290.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-28T14:35:14Z",
"details": "important"
}
],
"title": "CVE-2022-50700"
},
{
"cve": "CVE-2022-50706",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-50706"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnet/ieee802154: don\u0027t warn zero-sized raw_sendmsg()\n\nsyzbot is hitting skb_assert_len() warning at __dev_queue_xmit() [1],\nfor PF_IEEE802154 socket\u0027s zero-sized raw_sendmsg() request is hitting\n__dev_queue_xmit() with skb-\u003elen == 0.\n\nSince PF_IEEE802154 socket\u0027s zero-sized raw_sendmsg() request was\nable to return 0, don\u0027t call __dev_queue_xmit() if packet length is 0.\n\n ----------\n #include \u003csys/socket.h\u003e\n #include \u003cnetinet/in.h\u003e\n\n int main(int argc, char *argv[])\n {\n struct sockaddr_in addr = { .sin_family = AF_INET, .sin_addr.s_addr = htonl(INADDR_LOOPBACK) };\n struct iovec iov = { };\n struct msghdr hdr = { .msg_name = \u0026addr, .msg_namelen = sizeof(addr), .msg_iov = \u0026iov, .msg_iovlen = 1 };\n sendmsg(socket(PF_IEEE802154, SOCK_RAW, 0), \u0026hdr, 0);\n return 0;\n }\n ----------\n\nNote that this might be a sign that commit fd1894224407c484 (\"bpf: Don\u0027t\nredirect packets with invalid pkt_len\") should be reverted, for\nskb-\u003elen == 0 was acceptable for at least PF_IEEE802154 socket.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.290.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-50706",
"url": "https://www.suse.com/security/cve/CVE-2022-50706"
},
{
"category": "external",
"summary": "SUSE Bug 1255581 for CVE-2022-50706",
"url": "https://bugzilla.suse.com/1255581"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.290.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.290.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-28T14:35:14Z",
"details": "moderate"
}
],
"title": "CVE-2022-50706"
},
{
"cve": "CVE-2022-50715",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-50715"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nmd/raid1: stop mdx_raid1 thread when raid1 array run failed\n\nfail run raid1 array when we assemble array with the inactive disk only,\nbut the mdx_raid1 thread were not stop, Even if the associated resources\nhave been released. it will caused a NULL dereference when we do poweroff.\n\nThis causes the following Oops:\n [ 287.587787] BUG: kernel NULL pointer dereference, address: 0000000000000070\n [ 287.594762] #PF: supervisor read access in kernel mode\n [ 287.599912] #PF: error_code(0x0000) - not-present page\n [ 287.605061] PGD 0 P4D 0\n [ 287.607612] Oops: 0000 [#1] SMP NOPTI\n [ 287.611287] CPU: 3 PID: 5265 Comm: md0_raid1 Tainted: G U 5.10.146 #0\n [ 287.619029] Hardware name: xxxxxxx/To be filled by O.E.M, BIOS 5.19 06/16/2022\n [ 287.626775] RIP: 0010:md_check_recovery+0x57/0x500 [md_mod]\n [ 287.632357] Code: fe 01 00 00 48 83 bb 10 03 00 00 00 74 08 48 89 ......\n [ 287.651118] RSP: 0018:ffffc90000433d78 EFLAGS: 00010202\n [ 287.656347] RAX: 0000000000000000 RBX: ffff888105986800 RCX: 0000000000000000\n [ 287.663491] RDX: ffffc90000433bb0 RSI: 00000000ffffefff RDI: ffff888105986800\n [ 287.670634] RBP: ffffc90000433da0 R08: 0000000000000000 R09: c0000000ffffefff\n [ 287.677771] R10: 0000000000000001 R11: ffffc90000433ba8 R12: ffff888105986800\n [ 287.684907] R13: 0000000000000000 R14: fffffffffffffe00 R15: ffff888100b6b500\n [ 287.692052] FS: 0000000000000000(0000) GS:ffff888277f80000(0000) knlGS:0000000000000000\n [ 287.700149] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033\n [ 287.705897] CR2: 0000000000000070 CR3: 000000000320a000 CR4: 0000000000350ee0\n [ 287.713033] Call Trace:\n [ 287.715498] raid1d+0x6c/0xbbb [raid1]\n [ 287.719256] ? __schedule+0x1ff/0x760\n [ 287.722930] ? schedule+0x3b/0xb0\n [ 287.726260] ? schedule_timeout+0x1ed/0x290\n [ 287.730456] ? __switch_to+0x11f/0x400\n [ 287.734219] md_thread+0xe9/0x140 [md_mod]\n [ 287.738328] ? md_thread+0xe9/0x140 [md_mod]\n [ 287.742601] ? wait_woken+0x80/0x80\n [ 287.746097] ? md_register_thread+0xe0/0xe0 [md_mod]\n [ 287.751064] kthread+0x11a/0x140\n [ 287.754300] ? kthread_park+0x90/0x90\n [ 287.757974] ret_from_fork+0x1f/0x30\n\nIn fact, when raid1 array run fail, we need to do\nmd_unregister_thread() before raid1_free().",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.290.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-50715",
"url": "https://www.suse.com/security/cve/CVE-2022-50715"
},
{
"category": "external",
"summary": "SUSE Bug 1255749 for CVE-2022-50715",
"url": "https://bugzilla.suse.com/1255749"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.290.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.290.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-28T14:35:14Z",
"details": "moderate"
}
],
"title": "CVE-2022-50715"
},
{
"cve": "CVE-2022-50728",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-50728"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\ns390/lcs: Fix return type of lcs_start_xmit()\n\nWith clang\u0027s kernel control flow integrity (kCFI, CONFIG_CFI_CLANG),\nindirect call targets are validated against the expected function\npointer prototype to make sure the call target is valid to help mitigate\nROP attacks. If they are not identical, there is a failure at run time,\nwhich manifests as either a kernel panic or thread getting killed. A\nproposed warning in clang aims to catch these at compile time, which\nreveals:\n\n drivers/s390/net/lcs.c:2090:21: error: incompatible function pointer types initializing \u0027netdev_tx_t (*)(struct sk_buff *, struct net_device *)\u0027 (aka \u0027enum netdev_tx (*)(struct sk_buff *, struct net_device *)\u0027) with an expression of type \u0027int (struct sk_buff *, struct net_device *)\u0027 [-Werror,-Wincompatible-function-pointer-types-strict]\n .ndo_start_xmit = lcs_start_xmit,\n ^~~~~~~~~~~~~~\n drivers/s390/net/lcs.c:2097:21: error: incompatible function pointer types initializing \u0027netdev_tx_t (*)(struct sk_buff *, struct net_device *)\u0027 (aka \u0027enum netdev_tx (*)(struct sk_buff *, struct net_device *)\u0027) with an expression of type \u0027int (struct sk_buff *, struct net_device *)\u0027 [-Werror,-Wincompatible-function-pointer-types-strict]\n .ndo_start_xmit = lcs_start_xmit,\n ^~~~~~~~~~~~~~\n\n-\u003endo_start_xmit() in \u0027struct net_device_ops\u0027 expects a return type of\n\u0027netdev_tx_t\u0027, not \u0027int\u0027. Adjust the return type of lcs_start_xmit() to\nmatch the prototype\u0027s to resolve the warning and potential CFI failure,\nshould s390 select ARCH_SUPPORTS_CFI_CLANG in the future.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.290.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-50728",
"url": "https://www.suse.com/security/cve/CVE-2022-50728"
},
{
"category": "external",
"summary": "SUSE Bug 1256046 for CVE-2022-50728",
"url": "https://bugzilla.suse.com/1256046"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.290.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.290.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-28T14:35:14Z",
"details": "moderate"
}
],
"title": "CVE-2022-50728"
},
{
"cve": "CVE-2022-50730",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-50730"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\next4: silence the warning when evicting inode with dioread_nolock\n\nWhen evicting an inode with default dioread_nolock, it could be raced by\nthe unwritten extents converting kworker after writeback some new\nallocated dirty blocks. It convert unwritten extents to written, the\nextents could be merged to upper level and free extent blocks, so it\ncould mark the inode dirty again even this inode has been marked\nI_FREEING. But the inode-\u003ei_io_list check and warning in\next4_evict_inode() missing this corner case. Fortunately,\next4_evict_inode() will wait all extents converting finished before this\ncheck, so it will not lead to inode use-after-free problem, every thing\nis OK besides this warning. The WARN_ON_ONCE was originally designed\nfor finding inode use-after-free issues in advance, but if we add\ncurrent dioread_nolock case in, it will become not quite useful, so fix\nthis warning by just remove this check.\n\n ======\n WARNING: CPU: 7 PID: 1092 at fs/ext4/inode.c:227\n ext4_evict_inode+0x875/0xc60\n ...\n RIP: 0010:ext4_evict_inode+0x875/0xc60\n ...\n Call Trace:\n \u003cTASK\u003e\n evict+0x11c/0x2b0\n iput+0x236/0x3a0\n do_unlinkat+0x1b4/0x490\n __x64_sys_unlinkat+0x4c/0xb0\n do_syscall_64+0x3b/0x90\n entry_SYSCALL_64_after_hwframe+0x46/0xb0\n RIP: 0033:0x7fa933c1115b\n ======\n\nrm kworker\n ext4_end_io_end()\nvfs_unlink()\n ext4_unlink()\n ext4_convert_unwritten_io_end_vec()\n ext4_convert_unwritten_extents()\n ext4_map_blocks()\n ext4_ext_map_blocks()\n ext4_ext_try_to_merge_up()\n __mark_inode_dirty()\n check !I_FREEING\n locked_inode_to_wb_and_lock_list()\n iput()\n iput_final()\n evict()\n ext4_evict_inode()\n truncate_inode_pages_final() //wait release io_end\n inode_io_list_move_locked()\n ext4_release_io_end()\n trigger WARN_ON_ONCE()",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.290.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-50730",
"url": "https://www.suse.com/security/cve/CVE-2022-50730"
},
{
"category": "external",
"summary": "SUSE Bug 1256048 for CVE-2022-50730",
"url": "https://bugzilla.suse.com/1256048"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.290.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.290.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-28T14:35:14Z",
"details": "moderate"
}
],
"title": "CVE-2022-50730"
},
{
"cve": "CVE-2022-50733",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-50733"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nusb: idmouse: fix an uninit-value in idmouse_open\n\nIn idmouse_create_image, if any ftip_command fails, it will\ngo to the reset label. However, this leads to the data in\nbulk_in_buffer[HEADER..IMGSIZE] uninitialized. And the check\nfor valid image incurs an uninitialized dereference.\n\nFix this by moving the check before reset label since this\ncheck only be valid if the data after bulk_in_buffer[HEADER]\nhas concrete data.\n\nNote that this is found by KMSAN, so only kernel compilation\nis tested.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.290.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-50733",
"url": "https://www.suse.com/security/cve/CVE-2022-50733"
},
{
"category": "external",
"summary": "SUSE Bug 1256064 for CVE-2022-50733",
"url": "https://bugzilla.suse.com/1256064"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.290.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.290.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-28T14:35:14Z",
"details": "moderate"
}
],
"title": "CVE-2022-50733"
},
{
"cve": "CVE-2022-50747",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-50747"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nhfs: Fix OOB Write in hfs_asc2mac\n\nSyzbot reported a OOB Write bug:\n\nloop0: detected capacity change from 0 to 64\n==================================================================\nBUG: KASAN: slab-out-of-bounds in hfs_asc2mac+0x467/0x9a0\nfs/hfs/trans.c:133\nWrite of size 1 at addr ffff88801848314e by task syz-executor391/3632\n\nCall Trace:\n \u003cTASK\u003e\n __dump_stack lib/dump_stack.c:88 [inline]\n dump_stack_lvl+0x1b1/0x28e lib/dump_stack.c:106\n print_address_description+0x74/0x340 mm/kasan/report.c:284\n print_report+0x107/0x1f0 mm/kasan/report.c:395\n kasan_report+0xcd/0x100 mm/kasan/report.c:495\n hfs_asc2mac+0x467/0x9a0 fs/hfs/trans.c:133\n hfs_cat_build_key+0x92/0x170 fs/hfs/catalog.c:28\n hfs_lookup+0x1ab/0x2c0 fs/hfs/dir.c:31\n lookup_open fs/namei.c:3391 [inline]\n open_last_lookups fs/namei.c:3481 [inline]\n path_openat+0x10e6/0x2df0 fs/namei.c:3710\n do_filp_open+0x264/0x4f0 fs/namei.c:3740\n\nIf in-\u003elen is much larger than HFS_NAMELEN(31) which is the maximum\nlength of an HFS filename, a OOB write could occur in hfs_asc2mac(). In\nthat case, when the dst reaches the boundary, the srclen is still\ngreater than 0, which causes a OOB write.\nFix this by adding a check on dstlen in while() before writing to dst\naddress.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.290.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-50747",
"url": "https://www.suse.com/security/cve/CVE-2022-50747"
},
{
"category": "external",
"summary": "SUSE Bug 1256432 for CVE-2022-50747",
"url": "https://bugzilla.suse.com/1256432"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.290.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.6,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.290.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-28T14:35:14Z",
"details": "moderate"
}
],
"title": "CVE-2022-50747"
},
{
"cve": "CVE-2022-50755",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-50755"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nudf: Avoid double brelse() in udf_rename()\n\nsyzbot reported a warning like below [1]:\n\nVFS: brelse: Trying to free free buffer\nWARNING: CPU: 2 PID: 7301 at fs/buffer.c:1145 __brelse+0x67/0xa0\n...\nCall Trace:\n \u003cTASK\u003e\n invalidate_bh_lru+0x99/0x150\n smp_call_function_many_cond+0xe2a/0x10c0\n ? generic_remap_file_range_prep+0x50/0x50\n ? __brelse+0xa0/0xa0\n ? __mutex_lock+0x21c/0x12d0\n ? smp_call_on_cpu+0x250/0x250\n ? rcu_read_lock_sched_held+0xb/0x60\n ? lock_release+0x587/0x810\n ? __brelse+0xa0/0xa0\n ? generic_remap_file_range_prep+0x50/0x50\n on_each_cpu_cond_mask+0x3c/0x80\n blkdev_flush_mapping+0x13a/0x2f0\n blkdev_put_whole+0xd3/0xf0\n blkdev_put+0x222/0x760\n deactivate_locked_super+0x96/0x160\n deactivate_super+0xda/0x100\n cleanup_mnt+0x222/0x3d0\n task_work_run+0x149/0x240\n ? task_work_cancel+0x30/0x30\n do_exit+0xb29/0x2a40\n ? reacquire_held_locks+0x4a0/0x4a0\n ? do_raw_spin_lock+0x12a/0x2b0\n ? mm_update_next_owner+0x7c0/0x7c0\n ? rwlock_bug.part.0+0x90/0x90\n ? zap_other_threads+0x234/0x2d0\n do_group_exit+0xd0/0x2a0\n __x64_sys_exit_group+0x3a/0x50\n do_syscall_64+0x34/0xb0\n entry_SYSCALL_64_after_hwframe+0x63/0xcd\n\nThe cause of the issue is that brelse() is called on both ofibh.sbh\nand ofibh.ebh by udf_find_entry() when it returns NULL. However,\nbrelse() is called by udf_rename(), too. So, b_count on buffer_head\nbecomes unbalanced.\n\nThis patch fixes the issue by not calling brelse() by udf_rename()\nwhen udf_find_entry() returns NULL.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.290.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-50755",
"url": "https://www.suse.com/security/cve/CVE-2022-50755"
},
{
"category": "external",
"summary": "SUSE Bug 1256199 for CVE-2022-50755",
"url": "https://bugzilla.suse.com/1256199"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.290.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.1,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.290.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-28T14:35:14Z",
"details": "moderate"
}
],
"title": "CVE-2022-50755"
},
{
"cve": "CVE-2022-50761",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-50761"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nx86/xen: Fix memory leak in xen_init_lock_cpu()\n\nIn xen_init_lock_cpu(), the @name has allocated new string by kasprintf(),\nif bind_ipi_to_irqhandler() fails, it should be freed, otherwise may lead\nto a memory leak issue, fix it.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.290.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-50761",
"url": "https://www.suse.com/security/cve/CVE-2022-50761"
},
{
"category": "external",
"summary": "SUSE Bug 1256062 for CVE-2022-50761",
"url": "https://bugzilla.suse.com/1256062"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.290.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.290.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-28T14:35:14Z",
"details": "moderate"
}
],
"title": "CVE-2022-50761"
},
{
"cve": "CVE-2022-50779",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-50779"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\norangefs: Fix kmemleak in orangefs_prepare_debugfs_help_string()\n\nWhen insert and remove the orangefs module, then debug_help_string will\nbe leaked:\n\n unreferenced object 0xffff8881652ba000 (size 4096):\n comm \"insmod\", pid 1701, jiffies 4294893639 (age 13218.530s)\n hex dump (first 32 bytes):\n 43 6c 69 65 6e 74 20 44 65 62 75 67 20 4b 65 79 Client Debug Key\n 77 6f 72 64 73 20 61 72 65 20 75 6e 6b 6e 6f 77 words are unknow\n backtrace:\n [\u003c0000000004e6f8e3\u003e] kmalloc_trace+0x27/0xa0\n [\u003c0000000006f75d85\u003e] orangefs_prepare_debugfs_help_string+0x5e/0x480 [orangefs]\n [\u003c0000000091270a2a\u003e] _sub_I_65535_1+0x57/0xf70 [crc_itu_t]\n [\u003c000000004b1ee1a3\u003e] do_one_initcall+0x87/0x2a0\n [\u003c000000001d0614ae\u003e] do_init_module+0xdf/0x320\n [\u003c00000000efef068c\u003e] load_module+0x2f98/0x3330\n [\u003c000000006533b44d\u003e] __do_sys_finit_module+0x113/0x1b0\n [\u003c00000000a0da6f99\u003e] do_syscall_64+0x35/0x80\n [\u003c000000007790b19b\u003e] entry_SYSCALL_64_after_hwframe+0x46/0xb0\n\nWhen remove the module, should always free debug_help_string. Should\nalways free the allocated buffer when change the free_debug_help_string.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.290.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-50779",
"url": "https://www.suse.com/security/cve/CVE-2022-50779"
},
{
"category": "external",
"summary": "SUSE Bug 1256423 for CVE-2022-50779",
"url": "https://bugzilla.suse.com/1256423"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.290.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.290.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-28T14:35:14Z",
"details": "moderate"
}
],
"title": "CVE-2022-50779"
},
{
"cve": "CVE-2022-50821",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-50821"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nSUNRPC: Don\u0027t leak netobj memory when gss_read_proxy_verf() fails",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.290.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-50821",
"url": "https://www.suse.com/security/cve/CVE-2022-50821"
},
{
"category": "external",
"summary": "SUSE Bug 1256242 for CVE-2022-50821",
"url": "https://bugzilla.suse.com/1256242"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.290.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.290.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-28T14:35:14Z",
"details": "moderate"
}
],
"title": "CVE-2022-50821"
},
{
"cve": "CVE-2022-50824",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-50824"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\ntpm: tpm_tis: Add the missed acpi_put_table() to fix memory leak\n\nIn check_acpi_tpm2(), we get the TPM2 table just to make\nsure the table is there, not used after the init, so the\nacpi_put_table() should be added to release the ACPI memory.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.290.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-50824",
"url": "https://www.suse.com/security/cve/CVE-2022-50824"
},
{
"category": "external",
"summary": "SUSE Bug 1256334 for CVE-2022-50824",
"url": "https://bugzilla.suse.com/1256334"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.290.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.290.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-28T14:35:14Z",
"details": "moderate"
}
],
"title": "CVE-2022-50824"
},
{
"cve": "CVE-2022-50840",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-50840"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nscsi: snic: Fix possible UAF in snic_tgt_create()\n\nSmatch reports a warning as follows:\n\ndrivers/scsi/snic/snic_disc.c:307 snic_tgt_create() warn:\n \u0027\u0026tgt-\u003elist\u0027 not removed from list\n\nIf device_add() fails in snic_tgt_create(), tgt will be freed, but\ntgt-\u003elist will not be removed from snic-\u003edisc.tgt_list, then list traversal\nmay cause UAF.\n\nRemove from snic-\u003edisc.tgt_list before free().",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.290.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-50840",
"url": "https://www.suse.com/security/cve/CVE-2022-50840"
},
{
"category": "external",
"summary": "SUSE Bug 1256208 for CVE-2022-50840",
"url": "https://bugzilla.suse.com/1256208"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.290.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.290.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-28T14:35:14Z",
"details": "moderate"
}
],
"title": "CVE-2022-50840"
},
{
"cve": "CVE-2022-50849",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-50849"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\npstore: Avoid kcore oops by vmap()ing with VM_IOREMAP\n\nAn oops can be induced by running \u0027cat /proc/kcore \u003e /dev/null\u0027 on\ndevices using pstore with the ram backend because kmap_atomic() assumes\nlowmem pages are accessible with __va().\n\n Unable to handle kernel paging request at virtual address ffffff807ff2b000\n Mem abort info:\n ESR = 0x96000006\n EC = 0x25: DABT (current EL), IL = 32 bits\n SET = 0, FnV = 0\n EA = 0, S1PTW = 0\n FSC = 0x06: level 2 translation fault\n Data abort info:\n ISV = 0, ISS = 0x00000006\n CM = 0, WnR = 0\n swapper pgtable: 4k pages, 39-bit VAs, pgdp=0000000081d87000\n [ffffff807ff2b000] pgd=180000017fe18003, p4d=180000017fe18003, pud=180000017fe18003, pmd=0000000000000000\n Internal error: Oops: 96000006 [#1] PREEMPT SMP\n Modules linked in: dm_integrity\n CPU: 7 PID: 21179 Comm: perf Not tainted 5.15.67-10882-ge4eb2eb988cd #1 baa443fb8e8477896a370b31a821eb2009f9bfba\n Hardware name: Google Lazor (rev3 - 8) (DT)\n pstate: a0400009 (NzCv daif +PAN -UAO -TCO -DIT -SSBS BTYPE=--)\n pc : __memcpy+0x110/0x260\n lr : vread+0x194/0x294\n sp : ffffffc013ee39d0\n x29: ffffffc013ee39f0 x28: 0000000000001000 x27: ffffff807ff2b000\n x26: 0000000000001000 x25: ffffffc0085a2000 x24: ffffff802d4b3000\n x23: ffffff80f8a60000 x22: ffffff802d4b3000 x21: ffffffc0085a2000\n x20: ffffff8080b7bc68 x19: 0000000000001000 x18: 0000000000000000\n x17: 0000000000000000 x16: 0000000000000000 x15: ffffffd3073f2e60\n x14: ffffffffad588000 x13: 0000000000000000 x12: 0000000000000001\n x11: 00000000000001a2 x10: 00680000fff2bf0b x9 : 03fffffff807ff2b\n x8 : 0000000000000001 x7 : 0000000000000000 x6 : 0000000000000000\n x5 : ffffff802d4b4000 x4 : ffffff807ff2c000 x3 : ffffffc013ee3a78\n x2 : 0000000000001000 x1 : ffffff807ff2b000 x0 : ffffff802d4b3000\n Call trace:\n __memcpy+0x110/0x260\n read_kcore+0x584/0x778\n proc_reg_read+0xb4/0xe4\n\nDuring early boot, memblock reserves the pages for the ramoops reserved\nmemory node in DT that would otherwise be part of the direct lowmem\nmapping. Pstore\u0027s ram backend reuses those reserved pages to change the\nmemory type (writeback or non-cached) by passing the pages to vmap()\n(see pfn_to_page() usage in persistent_ram_vmap() for more details) with\nspecific flags. When read_kcore() starts iterating over the vmalloc\nregion, it runs over the virtual address that vmap() returned for\nramoops. In aligned_vread() the virtual address is passed to\nvmalloc_to_page() which returns the page struct for the reserved lowmem\narea. That lowmem page is passed to kmap_atomic(), which effectively\ncalls page_to_virt() that assumes a lowmem page struct must be directly\naccessible with __va() and friends. These pages are mapped via vmap()\nthough, and the lowmem mapping was never made, so accessing them via the\nlowmem virtual address oopses like above.\n\nLet\u0027s side-step this problem by passing VM_IOREMAP to vmap(). This will\ntell vread() to not include the ramoops region in the kcore. Instead the\narea will look like a bunch of zeros. The alternative is to teach kmap()\nabout vmalloc areas that intersect with lowmem. Presumably such a change\nisn\u0027t a one-liner, and there isn\u0027t much interest in inspecting the\nramoops region in kcore files anyway, so the most expedient route is\ntaken for now.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.290.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-50849",
"url": "https://www.suse.com/security/cve/CVE-2022-50849"
},
{
"category": "external",
"summary": "SUSE Bug 1256193 for CVE-2022-50849",
"url": "https://bugzilla.suse.com/1256193"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.290.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.290.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-28T14:35:14Z",
"details": "moderate"
}
],
"title": "CVE-2022-50849"
},
{
"cve": "CVE-2022-50850",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-50850"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nscsi: ipr: Fix WARNING in ipr_init()\n\nipr_init() will not call unregister_reboot_notifier() when\npci_register_driver() fails, which causes a WARNING. Call\nunregister_reboot_notifier() when pci_register_driver() fails.\n\nnotifier callback ipr_halt [ipr] already registered\nWARNING: CPU: 3 PID: 299 at kernel/notifier.c:29\nnotifier_chain_register+0x16d/0x230\nModules linked in: ipr(+) xhci_pci_renesas xhci_hcd ehci_hcd usbcore\nled_class gpu_sched drm_buddy video wmi drm_ttm_helper ttm\ndrm_display_helper drm_kms_helper drm drm_panel_orientation_quirks\nagpgart cfbft\nCPU: 3 PID: 299 Comm: modprobe Tainted: G W\n6.1.0-rc1-00190-g39508d23b672-dirty #332\nHardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS\nrel-1.15.0-0-g2dd4b9b3f840-prebuilt.qemu.org 04/01/2014\nRIP: 0010:notifier_chain_register+0x16d/0x230\nCall Trace:\n \u003cTASK\u003e\n __blocking_notifier_chain_register+0x73/0xb0\n ipr_init+0x30/0x1000 [ipr]\n do_one_initcall+0xdb/0x480\n do_init_module+0x1cf/0x680\n load_module+0x6a50/0x70a0\n __do_sys_finit_module+0x12f/0x1c0\n do_syscall_64+0x3f/0x90\n entry_SYSCALL_64_after_hwframe+0x63/0xcd",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.290.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-50850",
"url": "https://www.suse.com/security/cve/CVE-2022-50850"
},
{
"category": "external",
"summary": "SUSE Bug 1256194 for CVE-2022-50850",
"url": "https://bugzilla.suse.com/1256194"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.290.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.290.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-28T14:35:14Z",
"details": "moderate"
}
],
"title": "CVE-2022-50850"
},
{
"cve": "CVE-2022-50859",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-50859"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\ncifs: Fix the error length of VALIDATE_NEGOTIATE_INFO message\n\nCommit d5c7076b772a (\"smb3: add smb3.1.1 to default dialect list\")\nextend the dialects from 3 to 4, but forget to decrease the extended\nlength when specific the dialect, then the message length is larger\nthan expected.\n\nThis maybe leak some info through network because not initialize the\nmessage body.\n\nAfter apply this patch, the VALIDATE_NEGOTIATE_INFO message length is\nreduced from 28 bytes to 26 bytes.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.290.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-50859",
"url": "https://www.suse.com/security/cve/CVE-2022-50859"
},
{
"category": "external",
"summary": "SUSE Bug 1256172 for CVE-2022-50859",
"url": "https://bugzilla.suse.com/1256172"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.290.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.290.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-28T14:35:14Z",
"details": "moderate"
}
],
"title": "CVE-2022-50859"
},
{
"cve": "CVE-2022-50870",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-50870"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\npowerpc/rtas: avoid device tree lookups in rtas_os_term()\n\nrtas_os_term() is called during panic. Its behavior depends on a couple\nof conditions in the /rtas node of the device tree, the traversal of\nwhich entails locking and local IRQ state changes. If the kernel panics\nwhile devtree_lock is held, rtas_os_term() as currently written could\nhang.\n\nInstead of discovering the relevant characteristics at panic time,\ncache them in file-static variables at boot. Note the lookup for\n\"ibm,extended-os-term\" is converted to of_property_read_bool() since it\nis a boolean property, not an RTAS function token.\n\n[mpe: Incorporate suggested change from Nick]",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.290.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-50870",
"url": "https://www.suse.com/security/cve/CVE-2022-50870"
},
{
"category": "external",
"summary": "SUSE Bug 1256154 for CVE-2022-50870",
"url": "https://bugzilla.suse.com/1256154"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.290.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.290.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-28T14:35:14Z",
"details": "moderate"
}
],
"title": "CVE-2022-50870"
},
{
"cve": "CVE-2022-50879",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-50879"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nobjtool: Fix SEGFAULT\n\nfind_insn() will return NULL in case of failure. Check insn in order\nto avoid a kernel Oops for NULL pointer dereference.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.290.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-50879",
"url": "https://www.suse.com/security/cve/CVE-2022-50879"
},
{
"category": "external",
"summary": "SUSE Bug 1256129 for CVE-2022-50879",
"url": "https://bugzilla.suse.com/1256129"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.290.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.290.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-28T14:35:14Z",
"details": "moderate"
}
],
"title": "CVE-2022-50879"
},
{
"cve": "CVE-2023-20569",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2023-20569"
}
],
"notes": [
{
"category": "general",
"text": "\n\n\nA side channel vulnerability on some of the AMD CPUs may allow an attacker to influence the return address prediction. This may result in speculative execution at an attacker-controlled\u202faddress, potentially leading to information disclosure.\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.290.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2023-20569",
"url": "https://www.suse.com/security/cve/CVE-2023-20569"
},
{
"category": "external",
"summary": "SUSE Bug 1213287 for CVE-2023-20569",
"url": "https://bugzilla.suse.com/1213287"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.290.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.6,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.290.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-28T14:35:14Z",
"details": "moderate"
}
],
"title": "CVE-2023-20569"
},
{
"cve": "CVE-2023-23559",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2023-23559"
}
],
"notes": [
{
"category": "general",
"text": "In rndis_query_oid in drivers/net/wireless/rndis_wlan.c in the Linux kernel through 6.1.5, there is an integer overflow in an addition.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.290.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2023-23559",
"url": "https://www.suse.com/security/cve/CVE-2023-23559"
},
{
"category": "external",
"summary": "SUSE Bug 1207051 for CVE-2023-23559",
"url": "https://bugzilla.suse.com/1207051"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.290.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:L",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.290.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-28T14:35:14Z",
"details": "moderate"
}
],
"title": "CVE-2023-23559"
},
{
"cve": "CVE-2023-4132",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2023-4132"
}
],
"notes": [
{
"category": "general",
"text": "A use-after-free vulnerability was found in the siano smsusb module in the Linux kernel. The bug occurs during device initialization when the siano device is plugged in. This flaw allows a local user to crash the system, causing a denial of service condition.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.290.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2023-4132",
"url": "https://www.suse.com/security/cve/CVE-2023-4132"
},
{
"category": "external",
"summary": "SUSE Bug 1213969 for CVE-2023-4132",
"url": "https://bugzilla.suse.com/1213969"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.290.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.2,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.290.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-28T14:35:14Z",
"details": "moderate"
}
],
"title": "CVE-2023-4132"
},
{
"cve": "CVE-2023-53020",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2023-53020"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nl2tp: close all race conditions in l2tp_tunnel_register()\n\nThe code in l2tp_tunnel_register() is racy in several ways:\n\n1. It modifies the tunnel socket _after_ publishing it.\n\n2. It calls setup_udp_tunnel_sock() on an existing socket without\n locking.\n\n3. It changes sock lock class on fly, which triggers many syzbot\n reports.\n\nThis patch amends all of them by moving socket initialization code\nbefore publishing and under sock lock. As suggested by Jakub, the\nl2tp lockdep class is not necessary as we can just switch to\nbh_lock_sock_nested().",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.290.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2023-53020",
"url": "https://www.suse.com/security/cve/CVE-2023-53020"
},
{
"category": "external",
"summary": "SUSE Bug 1240224 for CVE-2023-53020",
"url": "https://bugzilla.suse.com/1240224"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.290.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.290.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-28T14:35:14Z",
"details": "moderate"
}
],
"title": "CVE-2023-53020"
},
{
"cve": "CVE-2023-53176",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2023-53176"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nserial: 8250: Reinit port-\u003epm on port specific driver unbind\n\nWhen we unbind a serial port hardware specific 8250 driver, the generic\nserial8250 driver takes over the port. After that we see an oops about 10\nseconds later. This can produce the following at least on some TI SoCs:\n\nUnhandled fault: imprecise external abort (0x1406)\nInternal error: : 1406 [#1] SMP ARM\n\nTurns out that we may still have the serial port hardware specific driver\nport-\u003epm in use, and serial8250_pm() tries to call it after the port\nspecific driver is gone:\n\nserial8250_pm [8250_base] from uart_change_pm+0x54/0x8c [serial_base]\nuart_change_pm [serial_base] from uart_hangup+0x154/0x198 [serial_base]\nuart_hangup [serial_base] from __tty_hangup.part.0+0x328/0x37c\n__tty_hangup.part.0 from disassociate_ctty+0x154/0x20c\ndisassociate_ctty from do_exit+0x744/0xaac\ndo_exit from do_group_exit+0x40/0x8c\ndo_group_exit from __wake_up_parent+0x0/0x1c\n\nLet\u0027s fix the issue by calling serial8250_set_defaults() in\nserial8250_unregister_port(). This will set the port back to using\nthe serial8250 default functions, and sets the port-\u003epm to point to\nserial8250_pm.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.290.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2023-53176",
"url": "https://www.suse.com/security/cve/CVE-2023-53176"
},
{
"category": "external",
"summary": "SUSE Bug 1249991 for CVE-2023-53176",
"url": "https://bugzilla.suse.com/1249991"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.290.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.1,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.290.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-28T14:35:14Z",
"details": "moderate"
}
],
"title": "CVE-2023-53176"
},
{
"cve": "CVE-2023-53454",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2023-53454"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nHID: multitouch: Correct devm device reference for hidinput input_dev name\n\nReference the HID device rather than the input device for the devm\nallocation of the input_dev name. Referencing the input_dev would lead to a\nuse-after-free when the input_dev was unregistered and subsequently fires a\nuevent that depends on the name. At the point of firing the uevent, the\nname would be freed by devres management.\n\nUse devm_kasprintf to simplify the logic for allocating memory and\nformatting the input_dev name string.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.290.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2023-53454",
"url": "https://www.suse.com/security/cve/CVE-2023-53454"
},
{
"category": "external",
"summary": "SUSE Bug 1250759 for CVE-2023-53454",
"url": "https://bugzilla.suse.com/1250759"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.290.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.6,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.290.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-28T14:35:14Z",
"details": "moderate"
}
],
"title": "CVE-2023-53454"
},
{
"cve": "CVE-2023-53718",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2023-53718"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nring-buffer: Do not swap cpu_buffer during resize process\n\nWhen ring_buffer_swap_cpu was called during resize process,\nthe cpu buffer was swapped in the middle, resulting in incorrect state.\nContinuing to run in the wrong state will result in oops.\n\nThis issue can be easily reproduced using the following two scripts:\n/tmp # cat test1.sh\n//#! /bin/sh\nfor i in `seq 0 100000`\ndo\n echo 2000 \u003e /sys/kernel/debug/tracing/buffer_size_kb\n sleep 0.5\n echo 5000 \u003e /sys/kernel/debug/tracing/buffer_size_kb\n sleep 0.5\ndone\n/tmp # cat test2.sh\n//#! /bin/sh\nfor i in `seq 0 100000`\ndo\n echo irqsoff \u003e /sys/kernel/debug/tracing/current_tracer\n sleep 1\n echo nop \u003e /sys/kernel/debug/tracing/current_tracer\n sleep 1\ndone\n/tmp # ./test1.sh \u0026\n/tmp # ./test2.sh \u0026\n\nA typical oops log is as follows, sometimes with other different oops logs.\n\n[ 231.711293] WARNING: CPU: 0 PID: 9 at kernel/trace/ring_buffer.c:2026 rb_update_pages+0x378/0x3f8\n[ 231.713375] Modules linked in:\n[ 231.714735] CPU: 0 PID: 9 Comm: kworker/0:1 Tainted: G W 6.5.0-rc1-00276-g20edcec23f92 #15\n[ 231.716750] Hardware name: linux,dummy-virt (DT)\n[ 231.718152] Workqueue: events update_pages_handler\n[ 231.719714] pstate: 60000005 (nZCv daif -PAN -UAO -TCO -DIT -SSBS BTYPE=--)\n[ 231.721171] pc : rb_update_pages+0x378/0x3f8\n[ 231.722212] lr : rb_update_pages+0x25c/0x3f8\n[ 231.723248] sp : ffff800082b9bd50\n[ 231.724169] x29: ffff800082b9bd50 x28: ffff8000825f7000 x27: 0000000000000000\n[ 231.726102] x26: 0000000000000001 x25: fffffffffffff010 x24: 0000000000000ff0\n[ 231.728122] x23: ffff0000c3a0b600 x22: ffff0000c3a0b5c0 x21: fffffffffffffe0a\n[ 231.730203] x20: ffff0000c3a0b600 x19: ffff0000c0102400 x18: 0000000000000000\n[ 231.732329] x17: 0000000000000000 x16: 0000000000000000 x15: 0000ffffe7aa8510\n[ 231.734212] x14: 0000000000000000 x13: 0000000000000000 x12: 0000000000000002\n[ 231.736291] x11: ffff8000826998a8 x10: ffff800082b9baf0 x9 : ffff800081137558\n[ 231.738195] x8 : fffffc00030e82c8 x7 : 0000000000000000 x6 : 0000000000000001\n[ 231.740192] x5 : ffff0000ffbafe00 x4 : 0000000000000000 x3 : 0000000000000000\n[ 231.742118] x2 : 00000000000006aa x1 : 0000000000000001 x0 : ffff0000c0007208\n[ 231.744196] Call trace:\n[ 231.744892] rb_update_pages+0x378/0x3f8\n[ 231.745893] update_pages_handler+0x1c/0x38\n[ 231.746893] process_one_work+0x1f0/0x468\n[ 231.747852] worker_thread+0x54/0x410\n[ 231.748737] kthread+0x124/0x138\n[ 231.749549] ret_from_fork+0x10/0x20\n[ 231.750434] ---[ end trace 0000000000000000 ]---\n[ 233.720486] Unable to handle kernel NULL pointer dereference at virtual address 0000000000000000\n[ 233.721696] Mem abort info:\n[ 233.721935] ESR = 0x0000000096000004\n[ 233.722283] EC = 0x25: DABT (current EL), IL = 32 bits\n[ 233.722596] SET = 0, FnV = 0\n[ 233.722805] EA = 0, S1PTW = 0\n[ 233.723026] FSC = 0x04: level 0 translation fault\n[ 233.723458] Data abort info:\n[ 233.723734] ISV = 0, ISS = 0x00000004, ISS2 = 0x00000000\n[ 233.724176] CM = 0, WnR = 0, TnD = 0, TagAccess = 0\n[ 233.724589] GCS = 0, Overlay = 0, DirtyBit = 0, Xs = 0\n[ 233.725075] user pgtable: 4k pages, 48-bit VAs, pgdp=0000000104943000\n[ 233.725592] [0000000000000000] pgd=0000000000000000, p4d=0000000000000000\n[ 233.726231] Internal error: Oops: 0000000096000004 [#1] PREEMPT SMP\n[ 233.726720] Modules linked in:\n[ 233.727007] CPU: 0 PID: 9 Comm: kworker/0:1 Tainted: G W 6.5.0-rc1-00276-g20edcec23f92 #15\n[ 233.727777] Hardware name: linux,dummy-virt (DT)\n[ 233.728225] Workqueue: events update_pages_handler\n[ 233.728655] pstate: 200000c5 (nzCv daIF -PAN -UAO -TCO -DIT -SSBS BTYPE=--)\n[ 233.729054] pc : rb_update_pages+0x1a8/0x3f8\n[ 233.729334] lr : rb_update_pages+0x154/0x3f8\n[ 233.729592] sp : ffff800082b9bd50\n[ 233.729792] x29: ffff800082b9bd50 x28: ffff8000825f7000 x27: 00000000\n---truncated---",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.290.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2023-53718",
"url": "https://www.suse.com/security/cve/CVE-2023-53718"
},
{
"category": "external",
"summary": "SUSE Bug 1252564 for CVE-2023-53718",
"url": "https://bugzilla.suse.com/1252564"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.290.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.290.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-28T14:35:14Z",
"details": "moderate"
}
],
"title": "CVE-2023-53718"
},
{
"cve": "CVE-2023-53746",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2023-53746"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\ns390/vfio-ap: fix memory leak in vfio_ap device driver\n\nThe device release callback function invoked to release the matrix device\nuses the dev_get_drvdata(device *dev) function to retrieve the\npointer to the vfio_matrix_dev object in order to free its storage. The\nproblem is, this object is not stored as drvdata with the device; since the\nkfree function will accept a NULL pointer, the memory for the\nvfio_matrix_dev object is never freed.\n\nSince the device being released is contained within the vfio_matrix_dev\nobject, the container_of macro will be used to retrieve its pointer.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.290.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2023-53746",
"url": "https://www.suse.com/security/cve/CVE-2023-53746"
},
{
"category": "external",
"summary": "SUSE Bug 1254617 for CVE-2023-53746",
"url": "https://bugzilla.suse.com/1254617"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.290.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.290.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-28T14:35:14Z",
"details": "moderate"
}
],
"title": "CVE-2023-53746"
},
{
"cve": "CVE-2023-53748",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2023-53748"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nmedia: mediatek: vcodec: Fix potential array out-of-bounds in decoder queue_setup\n\nvariable *nplanes is provided by user via system call argument. The\npossible value of q_data-\u003efmt-\u003enum_planes is 1-3, while the value\nof *nplanes can be 1-8. The array access by index i can cause array\nout-of-bounds.\n\nFix this bug by checking *nplanes against the array size.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.290.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2023-53748",
"url": "https://www.suse.com/security/cve/CVE-2023-53748"
},
{
"category": "external",
"summary": "SUSE Bug 1254907 for CVE-2023-53748",
"url": "https://bugzilla.suse.com/1254907"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.290.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.290.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-28T14:35:14Z",
"details": "moderate"
}
],
"title": "CVE-2023-53748"
},
{
"cve": "CVE-2023-53754",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2023-53754"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nscsi: lpfc: Fix ioremap issues in lpfc_sli4_pci_mem_setup()\n\nWhen if_type equals zero and pci_resource_start(pdev, PCI_64BIT_BAR4)\nreturns false, drbl_regs_memmap_p is not remapped. This passes a NULL\npointer to iounmap(), which can trigger a WARN() on certain arches.\n\nWhen if_type equals six and pci_resource_start(pdev, PCI_64BIT_BAR4)\nreturns true, drbl_regs_memmap_p may has been remapped and\nctrl_regs_memmap_p is not remapped. This is a resource leak and passes a\nNULL pointer to iounmap().\n\nTo fix these issues, we need to add null checks before iounmap(), and\nchange some goto labels.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.290.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2023-53754",
"url": "https://www.suse.com/security/cve/CVE-2023-53754"
},
{
"category": "external",
"summary": "SUSE Bug 1254609 for CVE-2023-53754",
"url": "https://bugzilla.suse.com/1254609"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.290.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.290.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-28T14:35:14Z",
"details": "moderate"
}
],
"title": "CVE-2023-53754"
},
{
"cve": "CVE-2023-53765",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2023-53765"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\ndm cache: free background tracker\u0027s queued work in btracker_destroy\n\nOtherwise the kernel can BUG with:\n\n[ 2245.426978] =============================================================================\n[ 2245.435155] BUG bt_work (Tainted: G B W ): Objects remaining in bt_work on __kmem_cache_shutdown()\n[ 2245.445233] -----------------------------------------------------------------------------\n[ 2245.445233]\n[ 2245.454879] Slab 0x00000000b0ce2b30 objects=64 used=2 fp=0x000000000a3c6a4e flags=0x17ffffc0000200(slab|node=0|zone=2|lastcpupid=0x1fffff)\n[ 2245.467300] CPU: 7 PID: 10805 Comm: lvm Kdump: loaded Tainted: G B W 6.0.0-rc2 #19\n[ 2245.476078] Hardware name: Dell Inc. PowerEdge R7525/0590KW, BIOS 2.5.6 10/06/2021\n[ 2245.483646] Call Trace:\n[ 2245.486100] \u003cTASK\u003e\n[ 2245.488206] dump_stack_lvl+0x34/0x48\n[ 2245.491878] slab_err+0x95/0xcd\n[ 2245.495028] __kmem_cache_shutdown.cold+0x31/0x136\n[ 2245.499821] kmem_cache_destroy+0x49/0x130\n[ 2245.503928] btracker_destroy+0x12/0x20 [dm_cache]\n[ 2245.508728] smq_destroy+0x15/0x60 [dm_cache_smq]\n[ 2245.513435] dm_cache_policy_destroy+0x12/0x20 [dm_cache]\n[ 2245.518834] destroy+0xc0/0x110 [dm_cache]\n[ 2245.522933] dm_table_destroy+0x5c/0x120 [dm_mod]\n[ 2245.527649] __dm_destroy+0x10e/0x1c0 [dm_mod]\n[ 2245.532102] dev_remove+0x117/0x190 [dm_mod]\n[ 2245.536384] ctl_ioctl+0x1a2/0x290 [dm_mod]\n[ 2245.540579] dm_ctl_ioctl+0xa/0x20 [dm_mod]\n[ 2245.544773] __x64_sys_ioctl+0x8a/0xc0\n[ 2245.548524] do_syscall_64+0x5c/0x90\n[ 2245.552104] ? syscall_exit_to_user_mode+0x12/0x30\n[ 2245.556897] ? do_syscall_64+0x69/0x90\n[ 2245.560648] ? do_syscall_64+0x69/0x90\n[ 2245.564394] entry_SYSCALL_64_after_hwframe+0x63/0xcd\n[ 2245.569447] RIP: 0033:0x7fe52583ec6b\n...\n[ 2245.646771] ------------[ cut here ]------------\n[ 2245.651395] kmem_cache_destroy bt_work: Slab cache still has objects when called from btracker_destroy+0x12/0x20 [dm_cache]\n[ 2245.651408] WARNING: CPU: 7 PID: 10805 at mm/slab_common.c:478 kmem_cache_destroy+0x128/0x130\n\nFound using: lvm2-testsuite --only \"cache-single-split.sh\"\n\nBen bisected and found that commit 0495e337b703 (\"mm/slab_common:\nDeleting kobject in kmem_cache_destroy() without holding\nslab_mutex/cpu_hotplug_lock\") first exposed dm-cache\u0027s incomplete\ncleanup of its background tracker work objects.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.290.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2023-53765",
"url": "https://www.suse.com/security/cve/CVE-2023-53765"
},
{
"category": "external",
"summary": "SUSE Bug 1254912 for CVE-2023-53765",
"url": "https://bugzilla.suse.com/1254912"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.290.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.290.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-28T14:35:14Z",
"details": "moderate"
}
],
"title": "CVE-2023-53765"
},
{
"cve": "CVE-2023-53781",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2023-53781"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nsmc: Fix use-after-free in tcp_write_timer_handler().\n\nWith Eric\u0027s ref tracker, syzbot finally found a repro for\nuse-after-free in tcp_write_timer_handler() by kernel TCP\nsockets. [0]\n\nIf SMC creates a kernel socket in __smc_create(), the kernel\nsocket is supposed to be freed in smc_clcsock_release() by\ncalling sock_release() when we close() the parent SMC socket.\n\nHowever, at the end of smc_clcsock_release(), the kernel\nsocket\u0027s sk_state might not be TCP_CLOSE. This means that\nwe have not called inet_csk_destroy_sock() in __tcp_close()\nand have not stopped the TCP timers.\n\nThe kernel socket\u0027s TCP timers can be fired later, so we\nneed to hold a refcnt for net as we do for MPTCP subflows\nin mptcp_subflow_create_socket().\n\n[0]:\nleaked reference.\n sk_alloc (./include/net/net_namespace.h:335 net/core/sock.c:2108)\n inet_create (net/ipv4/af_inet.c:319 net/ipv4/af_inet.c:244)\n __sock_create (net/socket.c:1546)\n smc_create (net/smc/af_smc.c:3269 net/smc/af_smc.c:3284)\n __sock_create (net/socket.c:1546)\n __sys_socket (net/socket.c:1634 net/socket.c:1618 net/socket.c:1661)\n __x64_sys_socket (net/socket.c:1672)\n do_syscall_64 (arch/x86/entry/common.c:50 arch/x86/entry/common.c:80)\n entry_SYSCALL_64_after_hwframe (arch/x86/entry/entry_64.S:120)\n==================================================================\nBUG: KASAN: slab-use-after-free in tcp_write_timer_handler (net/ipv4/tcp_timer.c:378 net/ipv4/tcp_timer.c:624 net/ipv4/tcp_timer.c:594)\nRead of size 1 at addr ffff888052b65e0d by task syzrepro/18091\n\nCPU: 0 PID: 18091 Comm: syzrepro Tainted: G W 6.3.0-rc4-01174-gb5d54eb5899a #7\nHardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.16.0-1.amzn2022.0.1 04/01/2014\nCall Trace:\n \u003cIRQ\u003e\n dump_stack_lvl (lib/dump_stack.c:107)\n print_report (mm/kasan/report.c:320 mm/kasan/report.c:430)\n kasan_report (mm/kasan/report.c:538)\n tcp_write_timer_handler (net/ipv4/tcp_timer.c:378 net/ipv4/tcp_timer.c:624 net/ipv4/tcp_timer.c:594)\n tcp_write_timer (./include/linux/spinlock.h:390 net/ipv4/tcp_timer.c:643)\n call_timer_fn (./arch/x86/include/asm/jump_label.h:27 ./include/linux/jump_label.h:207 ./include/trace/events/timer.h:127 kernel/time/timer.c:1701)\n __run_timers.part.0 (kernel/time/timer.c:1752 kernel/time/timer.c:2022)\n run_timer_softirq (kernel/time/timer.c:2037)\n __do_softirq (./arch/x86/include/asm/jump_label.h:27 ./include/linux/jump_label.h:207 ./include/trace/events/irq.h:142 kernel/softirq.c:572)\n __irq_exit_rcu (kernel/softirq.c:445 kernel/softirq.c:650)\n irq_exit_rcu (kernel/softirq.c:664)\n sysvec_apic_timer_interrupt (arch/x86/kernel/apic/apic.c:1107 (discriminator 14))\n \u003c/IRQ\u003e",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.290.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2023-53781",
"url": "https://www.suse.com/security/cve/CVE-2023-53781"
},
{
"category": "external",
"summary": "SUSE Bug 1254751 for CVE-2023-53781",
"url": "https://bugzilla.suse.com/1254751"
},
{
"category": "external",
"summary": "SUSE Bug 1254755 for CVE-2023-53781",
"url": "https://bugzilla.suse.com/1254755"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.290.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.290.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-28T14:35:14Z",
"details": "important"
}
],
"title": "CVE-2023-53781"
},
{
"cve": "CVE-2023-53786",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2023-53786"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\ndm flakey: fix a crash with invalid table line\n\nThis command will crash with NULL pointer dereference:\n dmsetup create flakey --table \\\n \"0 `blockdev --getsize /dev/ram0` flakey /dev/ram0 0 0 1 2 corrupt_bio_byte 512\"\n\nFix the crash by checking if arg_name is non-NULL before comparing it.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.290.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2023-53786",
"url": "https://www.suse.com/security/cve/CVE-2023-53786"
},
{
"category": "external",
"summary": "SUSE Bug 1254916 for CVE-2023-53786",
"url": "https://bugzilla.suse.com/1254916"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.290.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.290.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-28T14:35:14Z",
"details": "moderate"
}
],
"title": "CVE-2023-53786"
},
{
"cve": "CVE-2023-53788",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2023-53788"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nALSA: hda/ca0132: fixup buffer overrun at tuning_ctl_set()\n\ntuning_ctl_set() might have buffer overrun at (X) if it didn\u0027t break\nfrom loop by matching (A).\n\n\tstatic int tuning_ctl_set(...)\n\t{\n\t\tfor (i = 0; i \u003c TUNING_CTLS_COUNT; i++)\n(A)\t\t\tif (nid == ca0132_tuning_ctls[i].nid)\n\t\t\t\tbreak;\n\n\t\tsnd_hda_power_up(...);\n(X)\t\tdspio_set_param(..., ca0132_tuning_ctls[i].mid, ...);\n\t\tsnd_hda_power_down(...); ^\n\n\t\treturn 1;\n\t}\n\nWe will get below error by cppcheck\n\n\tsound/pci/hda/patch_ca0132.c:4229:2: note: After for loop, i has value 12\n\t for (i = 0; i \u003c TUNING_CTLS_COUNT; i++)\n\t ^\n\tsound/pci/hda/patch_ca0132.c:4234:43: note: Array index out of bounds\n\t dspio_set_param(codec, ca0132_tuning_ctls[i].mid, 0x20,\n\t ^\nThis patch cares non match case.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.290.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2023-53788",
"url": "https://www.suse.com/security/cve/CVE-2023-53788"
},
{
"category": "external",
"summary": "SUSE Bug 1254917 for CVE-2023-53788",
"url": "https://bugzilla.suse.com/1254917"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.290.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.290.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-28T14:35:14Z",
"details": "moderate"
}
],
"title": "CVE-2023-53788"
},
{
"cve": "CVE-2023-53803",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2023-53803"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nscsi: ses: Fix slab-out-of-bounds in ses_enclosure_data_process()\n\nA fix for:\n\nBUG: KASAN: slab-out-of-bounds in ses_enclosure_data_process+0x949/0xe30 [ses]\nRead of size 1 at addr ffff88a1b043a451 by task systemd-udevd/3271\n\nChecking after (and before in next loop) addl_desc_ptr[1] is sufficient, we\nexpect the size to be sanitized before first access to addl_desc_ptr[1].\nMake sure we don\u0027t walk beyond end of page.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.290.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2023-53803",
"url": "https://www.suse.com/security/cve/CVE-2023-53803"
},
{
"category": "external",
"summary": "SUSE Bug 1255165 for CVE-2023-53803",
"url": "https://bugzilla.suse.com/1255165"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.290.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.6,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.290.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-28T14:35:14Z",
"details": "moderate"
}
],
"title": "CVE-2023-53803"
},
{
"cve": "CVE-2023-53809",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2023-53809"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nl2tp: Avoid possible recursive deadlock in l2tp_tunnel_register()\n\nWhen a file descriptor of pppol2tp socket is passed as file descriptor\nof UDP socket, a recursive deadlock occurs in l2tp_tunnel_register().\nThis situation is reproduced by the following program:\n\nint main(void)\n{\n\tint sock;\n\tstruct sockaddr_pppol2tp addr;\n\n\tsock = socket(AF_PPPOX, SOCK_DGRAM, PX_PROTO_OL2TP);\n\tif (sock \u003c 0) {\n\t\tperror(\"socket\");\n\t\treturn 1;\n\t}\n\n\taddr.sa_family = AF_PPPOX;\n\taddr.sa_protocol = PX_PROTO_OL2TP;\n\taddr.pppol2tp.pid = 0;\n\taddr.pppol2tp.fd = sock;\n\taddr.pppol2tp.addr.sin_family = PF_INET;\n\taddr.pppol2tp.addr.sin_port = htons(0);\n\taddr.pppol2tp.addr.sin_addr.s_addr = inet_addr(\"192.168.0.1\");\n\taddr.pppol2tp.s_tunnel = 1;\n\taddr.pppol2tp.s_session = 0;\n\taddr.pppol2tp.d_tunnel = 0;\n\taddr.pppol2tp.d_session = 0;\n\n\tif (connect(sock, (const struct sockaddr *)\u0026addr, sizeof(addr)) \u003c 0) {\n\t\tperror(\"connect\");\n\t\treturn 1;\n\t}\n\n\treturn 0;\n}\n\nThis program causes the following lockdep warning:\n\n ============================================\n WARNING: possible recursive locking detected\n 6.2.0-rc5-00205-gc96618275234 #56 Not tainted\n --------------------------------------------\n repro/8607 is trying to acquire lock:\n ffff8880213c8130 (sk_lock-AF_PPPOX){+.+.}-{0:0}, at: l2tp_tunnel_register+0x2b7/0x11c0\n\n but task is already holding lock:\n ffff8880213c8130 (sk_lock-AF_PPPOX){+.+.}-{0:0}, at: pppol2tp_connect+0xa82/0x1a30\n\n other info that might help us debug this:\n Possible unsafe locking scenario:\n\n CPU0\n ----\n lock(sk_lock-AF_PPPOX);\n lock(sk_lock-AF_PPPOX);\n\n *** DEADLOCK ***\n\n May be due to missing lock nesting notation\n\n 1 lock held by repro/8607:\n #0: ffff8880213c8130 (sk_lock-AF_PPPOX){+.+.}-{0:0}, at: pppol2tp_connect+0xa82/0x1a30\n\n stack backtrace:\n CPU: 0 PID: 8607 Comm: repro Not tainted 6.2.0-rc5-00205-gc96618275234 #56\n Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.16.1-2.fc37 04/01/2014\n Call Trace:\n \u003cTASK\u003e\n dump_stack_lvl+0x100/0x178\n __lock_acquire.cold+0x119/0x3b9\n ? lockdep_hardirqs_on_prepare+0x410/0x410\n lock_acquire+0x1e0/0x610\n ? l2tp_tunnel_register+0x2b7/0x11c0\n ? lock_downgrade+0x710/0x710\n ? __fget_files+0x283/0x3e0\n lock_sock_nested+0x3a/0xf0\n ? l2tp_tunnel_register+0x2b7/0x11c0\n l2tp_tunnel_register+0x2b7/0x11c0\n ? sprintf+0xc4/0x100\n ? l2tp_tunnel_del_work+0x6b0/0x6b0\n ? debug_object_deactivate+0x320/0x320\n ? lockdep_init_map_type+0x16d/0x7a0\n ? lockdep_init_map_type+0x16d/0x7a0\n ? l2tp_tunnel_create+0x2bf/0x4b0\n ? l2tp_tunnel_create+0x3c6/0x4b0\n pppol2tp_connect+0x14e1/0x1a30\n ? pppol2tp_put_sk+0xd0/0xd0\n ? aa_sk_perm+0x2b7/0xa80\n ? aa_af_perm+0x260/0x260\n ? bpf_lsm_socket_connect+0x9/0x10\n ? pppol2tp_put_sk+0xd0/0xd0\n __sys_connect_file+0x14f/0x190\n __sys_connect+0x133/0x160\n ? __sys_connect_file+0x190/0x190\n ? lockdep_hardirqs_on+0x7d/0x100\n ? ktime_get_coarse_real_ts64+0x1b7/0x200\n ? ktime_get_coarse_real_ts64+0x147/0x200\n ? __audit_syscall_entry+0x396/0x500\n __x64_sys_connect+0x72/0xb0\n do_syscall_64+0x38/0xb0\n entry_SYSCALL_64_after_hwframe+0x63/0xcd\n\nThis patch fixes the issue by getting/creating the tunnel before\nlocking the pppol2tp socket.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.290.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2023-53809",
"url": "https://www.suse.com/security/cve/CVE-2023-53809"
},
{
"category": "external",
"summary": "SUSE Bug 1254722 for CVE-2023-53809",
"url": "https://bugzilla.suse.com/1254722"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.290.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.290.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-28T14:35:14Z",
"details": "moderate"
}
],
"title": "CVE-2023-53809"
},
{
"cve": "CVE-2023-53819",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2023-53819"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\namdgpu: validate offset_in_bo of drm_amdgpu_gem_va\n\nThis is motivated by OOB access in amdgpu_vm_update_range when\noffset_in_bo+map_size overflows.\n\nv2: keep the validations in amdgpu_vm_bo_map\nv3: add the validations to amdgpu_vm_bo_map/amdgpu_vm_bo_replace_map\n rather than to amdgpu_gem_va_ioctl",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.290.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2023-53819",
"url": "https://www.suse.com/security/cve/CVE-2023-53819"
},
{
"category": "external",
"summary": "SUSE Bug 1254712 for CVE-2023-53819",
"url": "https://bugzilla.suse.com/1254712"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.290.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.290.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-28T14:35:14Z",
"details": "moderate"
}
],
"title": "CVE-2023-53819"
},
{
"cve": "CVE-2023-53832",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2023-53832"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nmd/raid10: fix null-ptr-deref in raid10_sync_request\n\ninit_resync() inits mempool and sets conf-\u003ehave_replacemnt at the beginning\nof sync, close_sync() frees the mempool when sync is completed.\n\nAfter [1] recovery might be skipped and init_resync() is called but\nclose_sync() is not. null-ptr-deref occurs with r10bio-\u003edev[i].repl_bio.\n\nThe following is one way to reproduce the issue.\n\n 1) create a array, wait for resync to complete, mddev-\u003erecovery_cp is set\n to MaxSector.\n 2) recovery is woken and it is skipped. conf-\u003ehave_replacement is set to\n 0 in init_resync(). close_sync() not called.\n 3) some io errors and rdev A is set to WantReplacement.\n 4) a new device is added and set to A\u0027s replacement.\n 5) recovery is woken, A have replacement, but conf-\u003ehave_replacemnt is\n 0. r10bio-\u003edev[i].repl_bio will not be alloced and null-ptr-deref\n occurs.\n\nFix it by not calling init_resync() if recovery skipped.\n\n[1] commit 7e83ccbecd60 (\"md/raid10: Allow skipping recovery when clean arrays are assembled\")",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.290.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2023-53832",
"url": "https://www.suse.com/security/cve/CVE-2023-53832"
},
{
"category": "external",
"summary": "SUSE Bug 1254671 for CVE-2023-53832",
"url": "https://bugzilla.suse.com/1254671"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.290.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.290.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-28T14:35:14Z",
"details": "moderate"
}
],
"title": "CVE-2023-53832"
},
{
"cve": "CVE-2023-53840",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2023-53840"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nusb: early: xhci-dbc: Fix a potential out-of-bound memory access\n\nIf xdbc_bulk_write() fails, the values in \u0027buf\u0027 can be anything. So the\nstring is not guaranteed to be NULL terminated when xdbc_trace() is called.\n\nReserve an extra byte, which will be zeroed automatically because \u0027buf\u0027 is\na static variable, in order to avoid troubles, should it happen.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.290.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2023-53840",
"url": "https://www.suse.com/security/cve/CVE-2023-53840"
},
{
"category": "external",
"summary": "SUSE Bug 1254709 for CVE-2023-53840",
"url": "https://bugzilla.suse.com/1254709"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.290.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.290.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-28T14:35:14Z",
"details": "moderate"
}
],
"title": "CVE-2023-53840"
},
{
"cve": "CVE-2023-53847",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2023-53847"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nusb-storage: alauda: Fix uninit-value in alauda_check_media()\n\nSyzbot got KMSAN to complain about access to an uninitialized value in\nthe alauda subdriver of usb-storage:\n\nBUG: KMSAN: uninit-value in alauda_transport+0x462/0x57f0\ndrivers/usb/storage/alauda.c:1137\nCPU: 0 PID: 12279 Comm: usb-storage Not tainted 5.3.0-rc7+ #0\nHardware name: Google Google Compute Engine/Google Compute Engine, BIOS\nGoogle 01/01/2011\nCall Trace:\n __dump_stack lib/dump_stack.c:77 [inline]\n dump_stack+0x191/0x1f0 lib/dump_stack.c:113\n kmsan_report+0x13a/0x2b0 mm/kmsan/kmsan_report.c:108\n __msan_warning+0x73/0xe0 mm/kmsan/kmsan_instr.c:250\n alauda_check_media+0x344/0x3310 drivers/usb/storage/alauda.c:460\n\nThe problem is that alauda_check_media() doesn\u0027t verify that its USB\ntransfer succeeded before trying to use the received data. What\nshould happen if the transfer fails isn\u0027t entirely clear, but a\nreasonably conservative approach is to pretend that no media is\npresent.\n\nA similar problem exists in a usb_stor_dbg() call in\nalauda_get_media_status(). In this case, when an error occurs the\ncall is redundant, because usb_stor_ctrl_transfer() already will print\na debugging message.\n\nFinally, unrelated to the uninitialized memory access, is the fact\nthat alauda_check_media() performs DMA to a buffer on the stack.\nFortunately usb-storage provides a general purpose DMA-able buffer for\nuses like this. We\u0027ll use it instead.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.290.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2023-53847",
"url": "https://www.suse.com/security/cve/CVE-2023-53847"
},
{
"category": "external",
"summary": "SUSE Bug 1254698 for CVE-2023-53847",
"url": "https://bugzilla.suse.com/1254698"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.290.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.290.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-28T14:35:14Z",
"details": "moderate"
}
],
"title": "CVE-2023-53847"
},
{
"cve": "CVE-2023-53850",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2023-53850"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\niavf: use internal state to free traffic IRQs\n\nIf the system tries to close the netdev while iavf_reset_task() is\nrunning, __LINK_STATE_START will be cleared and netif_running() will\nreturn false in iavf_reinit_interrupt_scheme(). This will result in\niavf_free_traffic_irqs() not being called and a leak as follows:\n\n [7632.489326] remove_proc_entry: removing non-empty directory \u0027irq/999\u0027, leaking at least \u0027iavf-enp24s0f0v0-TxRx-0\u0027\n [7632.490214] WARNING: CPU: 0 PID: 10 at fs/proc/generic.c:718 remove_proc_entry+0x19b/0x1b0\n\nis shown when pci_disable_msix() is later called. Fix by using the\ninternal adapter state. The traffic IRQs will always exist if\nstate == __IAVF_RUNNING.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.290.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2023-53850",
"url": "https://www.suse.com/security/cve/CVE-2023-53850"
},
{
"category": "external",
"summary": "SUSE Bug 1254677 for CVE-2023-53850",
"url": "https://bugzilla.suse.com/1254677"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.290.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.290.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-28T14:35:14Z",
"details": "moderate"
}
],
"title": "CVE-2023-53850"
},
{
"cve": "CVE-2023-53862",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2023-53862"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nhfs: fix missing hfs_bnode_get() in __hfs_bnode_create\n\nSyzbot found a kernel BUG in hfs_bnode_put():\n\n kernel BUG at fs/hfs/bnode.c:466!\n invalid opcode: 0000 [#1] PREEMPT SMP KASAN\n CPU: 0 PID: 3634 Comm: kworker/u4:5 Not tainted 6.1.0-rc7-syzkaller-00190-g97ee9d1c1696 #0\n Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/26/2022\n Workqueue: writeback wb_workfn (flush-7:0)\n RIP: 0010:hfs_bnode_put+0x46f/0x480 fs/hfs/bnode.c:466\n Code: 8a 80 ff e9 73 fe ff ff 89 d9 80 e1 07 80 c1 03 38 c1 0f 8c a0 fe ff ff 48 89 df e8 db 8a 80 ff e9 93 fe ff ff e8 a1 68 2c ff \u003c0f\u003e 0b e8 9a 68 2c ff 0f 0b 0f 1f 84 00 00 00 00 00 55 41 57 41 56\n RSP: 0018:ffffc90003b4f258 EFLAGS: 00010293\n RAX: ffffffff825e318f RBX: 0000000000000000 RCX: ffff8880739dd7c0\n RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000\n RBP: ffffc90003b4f430 R08: ffffffff825e2d9b R09: ffffed10045157d1\n R10: ffffed10045157d1 R11: 1ffff110045157d0 R12: ffff8880228abe80\n R13: ffff88807016c000 R14: dffffc0000000000 R15: ffff8880228abe00\n FS: 0000000000000000(0000) GS:ffff8880b9800000(0000) knlGS:0000000000000000\n CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033\n CR2: 00007fa6ebe88718 CR3: 000000001e93d000 CR4: 00000000003506f0\n DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000\n DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400\n Call Trace:\n \u003cTASK\u003e\n hfs_write_inode+0x1bc/0xb40\n write_inode fs/fs-writeback.c:1440 [inline]\n __writeback_single_inode+0x4d6/0x670 fs/fs-writeback.c:1652\n writeback_sb_inodes+0xb3b/0x18f0 fs/fs-writeback.c:1878\n __writeback_inodes_wb+0x125/0x420 fs/fs-writeback.c:1949\n wb_writeback+0x440/0x7b0 fs/fs-writeback.c:2054\n wb_check_start_all fs/fs-writeback.c:2176 [inline]\n wb_do_writeback fs/fs-writeback.c:2202 [inline]\n wb_workfn+0x827/0xef0 fs/fs-writeback.c:2235\n process_one_work+0x877/0xdb0 kernel/workqueue.c:2289\n worker_thread+0xb14/0x1330 kernel/workqueue.c:2436\n kthread+0x266/0x300 kernel/kthread.c:376\n ret_from_fork+0x1f/0x30 arch/x86/entry/entry_64.S:306\n \u003c/TASK\u003e\n\nThe BUG_ON() is triggered at here:\n\n/* Dispose of resources used by a node */\nvoid hfs_bnode_put(struct hfs_bnode *node)\n{\n\tif (node) {\n \t\t\u003cskipped\u003e\n \t\tBUG_ON(!atomic_read(\u0026node-\u003erefcnt)); \u003c- we have issue here!!!!\n \t\t\u003cskipped\u003e\n \t}\n}\n\nBy tracing the refcnt, I found the node is created by hfs_bmap_alloc()\nwith refcnt 1. Then the node is used by hfs_btree_write(). There is a\nmissing of hfs_bnode_get() after find the node. The issue happened in\nfollowing path:\n\n\u003calloc\u003e\n hfs_bmap_alloc\n hfs_bnode_find\n __hfs_bnode_create \u003c- allocate a new node with refcnt 1.\n hfs_bnode_put \u003c- decrease the refcnt\n\n\u003cwrite\u003e\n hfs_btree_write\n hfs_bnode_find\n __hfs_bnode_create\n hfs_bnode_findhash \u003c- find the node without refcnt increased.\n hfs_bnode_put\t \u003c- trigger the BUG_ON() since refcnt is 0.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.290.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2023-53862",
"url": "https://www.suse.com/security/cve/CVE-2023-53862"
},
{
"category": "external",
"summary": "SUSE Bug 1254994 for CVE-2023-53862",
"url": "https://bugzilla.suse.com/1254994"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.290.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.290.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-28T14:35:14Z",
"details": "moderate"
}
],
"title": "CVE-2023-53862"
},
{
"cve": "CVE-2023-54014",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2023-54014"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nscsi: qla2xxx: Check valid rport returned by fc_bsg_to_rport()\n\nKlocwork reported warning of rport maybe NULL and will be dereferenced.\nrport returned by call to fc_bsg_to_rport() could be NULL and dereferenced.\n\nCheck valid rport returned by fc_bsg_to_rport().",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.290.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2023-54014",
"url": "https://www.suse.com/security/cve/CVE-2023-54014"
},
{
"category": "external",
"summary": "SUSE Bug 1256300 for CVE-2023-54014",
"url": "https://bugzilla.suse.com/1256300"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.290.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.290.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-28T14:35:14Z",
"details": "moderate"
}
],
"title": "CVE-2023-54014"
},
{
"cve": "CVE-2023-54017",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2023-54017"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\npowerpc/pseries: fix possible memory leak in ibmebus_bus_init()\n\nIf device_register() returns error in ibmebus_bus_init(), name of kobject\nwhich is allocated in dev_set_name() called in device_add() is leaked.\n\nAs comment of device_add() says, it should call put_device() to drop\nthe reference count that was set in device_initialize() when it fails,\nso the name can be freed in kobject_cleanup().",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.290.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2023-54017",
"url": "https://www.suse.com/security/cve/CVE-2023-54017"
},
{
"category": "external",
"summary": "SUSE Bug 1255605 for CVE-2023-54017",
"url": "https://bugzilla.suse.com/1255605"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.290.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.3,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.290.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-28T14:35:14Z",
"details": "low"
}
],
"title": "CVE-2023-54017"
},
{
"cve": "CVE-2023-54021",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2023-54021"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\next4: set goal start correctly in ext4_mb_normalize_request\n\nWe need to set ac_g_ex to notify the goal start used in\next4_mb_find_by_goal. Set ac_g_ex instead of ac_f_ex in\next4_mb_normalize_request.\nBesides we should assure goal start is in range [first_data_block,\nblocks_count) as ext4_mb_initialize_context does.\n\n[ Added a check to make sure size is less than ar-\u003epright; otherwise\n we could end up passing an underflowed value of ar-\u003epright - size to\n ext4_get_group_no_and_offset(), which will trigger a BUG_ON later on.\n - TYT ]",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.290.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2023-54021",
"url": "https://www.suse.com/security/cve/CVE-2023-54021"
},
{
"category": "external",
"summary": "SUSE Bug 1255600 for CVE-2023-54021",
"url": "https://bugzilla.suse.com/1255600"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.290.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.290.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-28T14:35:14Z",
"details": "moderate"
}
],
"title": "CVE-2023-54021"
},
{
"cve": "CVE-2023-54032",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2023-54032"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nbtrfs: fix race when deleting quota root from the dirty cow roots list\n\nWhen disabling quotas we are deleting the quota root from the list\nfs_info-\u003edirty_cowonly_roots without taking the lock that protects it,\nwhich is struct btrfs_fs_info::trans_lock. This unsynchronized list\nmanipulation may cause chaos if there\u0027s another concurrent manipulation\nof this list, such as when adding a root to it with\nctree.c:add_root_to_dirty_list().\n\nThis can result in all sorts of weird failures caused by a race, such as\nthe following crash:\n\n [337571.278245] general protection fault, probably for non-canonical address 0xdead000000000108: 0000 [#1] PREEMPT SMP PTI\n [337571.278933] CPU: 1 PID: 115447 Comm: btrfs Tainted: G W 6.4.0-rc6-btrfs-next-134+ #1\n [337571.279153] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.14.0-0-g155821a1990b-prebuilt.qemu.org 04/01/2014\n [337571.279572] RIP: 0010:commit_cowonly_roots+0x11f/0x250 [btrfs]\n [337571.279928] Code: 85 38 06 00 (...)\n [337571.280363] RSP: 0018:ffff9f63446efba0 EFLAGS: 00010206\n [337571.280582] RAX: ffff942d98ec2638 RBX: ffff9430b82b4c30 RCX: 0000000449e1c000\n [337571.280798] RDX: dead000000000100 RSI: ffff9430021e4900 RDI: 0000000000036070\n [337571.281015] RBP: ffff942d98ec2000 R08: ffff942d98ec2000 R09: 000000000000015b\n [337571.281254] R10: 0000000000000009 R11: 0000000000000001 R12: ffff942fe8fbf600\n [337571.281476] R13: ffff942dabe23040 R14: ffff942dabe20800 R15: ffff942d92cf3b48\n [337571.281723] FS: 00007f478adb7340(0000) GS:ffff94349fa40000(0000) knlGS:0000000000000000\n [337571.281950] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033\n [337571.282184] CR2: 00007f478ab9a3d5 CR3: 000000001e02c001 CR4: 0000000000370ee0\n [337571.282416] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000\n [337571.282647] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400\n [337571.282874] Call Trace:\n [337571.283101] \u003cTASK\u003e\n [337571.283327] ? __die_body+0x1b/0x60\n [337571.283570] ? die_addr+0x39/0x60\n [337571.283796] ? exc_general_protection+0x22e/0x430\n [337571.284022] ? asm_exc_general_protection+0x22/0x30\n [337571.284251] ? commit_cowonly_roots+0x11f/0x250 [btrfs]\n [337571.284531] btrfs_commit_transaction+0x42e/0xf90 [btrfs]\n [337571.284803] ? _raw_spin_unlock+0x15/0x30\n [337571.285031] ? release_extent_buffer+0x103/0x130 [btrfs]\n [337571.285305] reset_balance_state+0x152/0x1b0 [btrfs]\n [337571.285578] btrfs_balance+0xa50/0x11e0 [btrfs]\n [337571.285864] ? __kmem_cache_alloc_node+0x14a/0x410\n [337571.286086] btrfs_ioctl+0x249a/0x3320 [btrfs]\n [337571.286358] ? mod_objcg_state+0xd2/0x360\n [337571.286577] ? refill_obj_stock+0xb0/0x160\n [337571.286798] ? seq_release+0x25/0x30\n [337571.287016] ? __rseq_handle_notify_resume+0x3ba/0x4b0\n [337571.287235] ? percpu_counter_add_batch+0x2e/0xa0\n [337571.287455] ? __x64_sys_ioctl+0x88/0xc0\n [337571.287675] __x64_sys_ioctl+0x88/0xc0\n [337571.287901] do_syscall_64+0x38/0x90\n [337571.288126] entry_SYSCALL_64_after_hwframe+0x72/0xdc\n [337571.288352] RIP: 0033:0x7f478aaffe9b\n\nSo fix this by locking struct btrfs_fs_info::trans_lock before deleting\nthe quota root from that list.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.290.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2023-54032",
"url": "https://www.suse.com/security/cve/CVE-2023-54032"
},
{
"category": "external",
"summary": "SUSE Bug 1255617 for CVE-2023-54032",
"url": "https://bugzilla.suse.com/1255617"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.290.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.290.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-28T14:35:14Z",
"details": "moderate"
}
],
"title": "CVE-2023-54032"
},
{
"cve": "CVE-2023-54045",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2023-54045"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\naudit: fix possible soft lockup in __audit_inode_child()\n\nTracefs or debugfs maybe cause hundreds to thousands of PATH records,\ntoo many PATH records maybe cause soft lockup.\n\nFor example:\n 1. CONFIG_KASAN=y \u0026\u0026 CONFIG_PREEMPTION=n\n 2. auditctl -a exit,always -S open -k key\n 3. sysctl -w kernel.watchdog_thresh=5\n 4. mkdir /sys/kernel/debug/tracing/instances/test\n\nThere may be a soft lockup as follows:\n watchdog: BUG: soft lockup - CPU#45 stuck for 7s! [mkdir:15498]\n Kernel panic - not syncing: softlockup: hung tasks\n Call trace:\n dump_backtrace+0x0/0x30c\n show_stack+0x20/0x30\n dump_stack+0x11c/0x174\n panic+0x27c/0x494\n watchdog_timer_fn+0x2bc/0x390\n __run_hrtimer+0x148/0x4fc\n __hrtimer_run_queues+0x154/0x210\n hrtimer_interrupt+0x2c4/0x760\n arch_timer_handler_phys+0x48/0x60\n handle_percpu_devid_irq+0xe0/0x340\n __handle_domain_irq+0xbc/0x130\n gic_handle_irq+0x78/0x460\n el1_irq+0xb8/0x140\n __audit_inode_child+0x240/0x7bc\n tracefs_create_file+0x1b8/0x2a0\n trace_create_file+0x18/0x50\n event_create_dir+0x204/0x30c\n __trace_add_new_event+0xac/0x100\n event_trace_add_tracer+0xa0/0x130\n trace_array_create_dir+0x60/0x140\n trace_array_create+0x1e0/0x370\n instance_mkdir+0x90/0xd0\n tracefs_syscall_mkdir+0x68/0xa0\n vfs_mkdir+0x21c/0x34c\n do_mkdirat+0x1b4/0x1d4\n __arm64_sys_mkdirat+0x4c/0x60\n el0_svc_common.constprop.0+0xa8/0x240\n do_el0_svc+0x8c/0xc0\n el0_svc+0x20/0x30\n el0_sync_handler+0xb0/0xb4\n el0_sync+0x160/0x180\n\nTherefore, we add cond_resched() to __audit_inode_child() to fix it.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.290.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2023-54045",
"url": "https://www.suse.com/security/cve/CVE-2023-54045"
},
{
"category": "external",
"summary": "SUSE Bug 1256285 for CVE-2023-54045",
"url": "https://bugzilla.suse.com/1256285"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.290.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.290.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-28T14:35:14Z",
"details": "moderate"
}
],
"title": "CVE-2023-54045"
},
{
"cve": "CVE-2023-54051",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2023-54051"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnet: do not allow gso_size to be set to GSO_BY_FRAGS\n\nOne missing check in virtio_net_hdr_to_skb() allowed\nsyzbot to crash kernels again [1]\n\nDo not allow gso_size to be set to GSO_BY_FRAGS (0xffff),\nbecause this magic value is used by the kernel.\n\n[1]\ngeneral protection fault, probably for non-canonical address 0xdffffc000000000e: 0000 [#1] PREEMPT SMP KASAN\nKASAN: null-ptr-deref in range [0x0000000000000070-0x0000000000000077]\nCPU: 0 PID: 5039 Comm: syz-executor401 Not tainted 6.5.0-rc5-next-20230809-syzkaller #0\nHardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/26/2023\nRIP: 0010:skb_segment+0x1a52/0x3ef0 net/core/skbuff.c:4500\nCode: 00 00 00 e9 ab eb ff ff e8 6b 96 5d f9 48 8b 84 24 00 01 00 00 48 8d 78 70 48 b8 00 00 00 00 00 fc ff df 48 89 fa 48 c1 ea 03 \u003c0f\u003e b6 04 02 84 c0 74 08 3c 03 0f 8e ea 21 00 00 48 8b 84 24 00 01\nRSP: 0018:ffffc90003d3f1c8 EFLAGS: 00010202\nRAX: dffffc0000000000 RBX: 000000000001fffe RCX: 0000000000000000\nRDX: 000000000000000e RSI: ffffffff882a3115 RDI: 0000000000000070\nRBP: ffffc90003d3f378 R08: 0000000000000005 R09: 000000000000ffff\nR10: 000000000000ffff R11: 5ee4a93e456187d6 R12: 000000000001ffc6\nR13: dffffc0000000000 R14: 0000000000000008 R15: 000000000000ffff\nFS: 00005555563f2380(0000) GS:ffff8880b9800000(0000) knlGS:0000000000000000\nCS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033\nCR2: 0000000020020000 CR3: 000000001626d000 CR4: 00000000003506f0\nDR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000\nDR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400\nCall Trace:\n\u003cTASK\u003e\nudp6_ufo_fragment+0x9d2/0xd50 net/ipv6/udp_offload.c:109\nipv6_gso_segment+0x5c4/0x17b0 net/ipv6/ip6_offload.c:120\nskb_mac_gso_segment+0x292/0x610 net/core/gso.c:53\n__skb_gso_segment+0x339/0x710 net/core/gso.c:124\nskb_gso_segment include/net/gso.h:83 [inline]\nvalidate_xmit_skb+0x3a5/0xf10 net/core/dev.c:3625\n__dev_queue_xmit+0x8f0/0x3d60 net/core/dev.c:4329\ndev_queue_xmit include/linux/netdevice.h:3082 [inline]\npacket_xmit+0x257/0x380 net/packet/af_packet.c:276\npacket_snd net/packet/af_packet.c:3087 [inline]\npacket_sendmsg+0x24c7/0x5570 net/packet/af_packet.c:3119\nsock_sendmsg_nosec net/socket.c:727 [inline]\nsock_sendmsg+0xd9/0x180 net/socket.c:750\n____sys_sendmsg+0x6ac/0x940 net/socket.c:2496\n___sys_sendmsg+0x135/0x1d0 net/socket.c:2550\n__sys_sendmsg+0x117/0x1e0 net/socket.c:2579\ndo_syscall_x64 arch/x86/entry/common.c:50 [inline]\ndo_syscall_64+0x38/0xb0 arch/x86/entry/common.c:80\nentry_SYSCALL_64_after_hwframe+0x63/0xcd\nRIP: 0033:0x7ff27cdb34d9",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.290.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2023-54051",
"url": "https://www.suse.com/security/cve/CVE-2023-54051"
},
{
"category": "external",
"summary": "SUSE Bug 1256394 for CVE-2023-54051",
"url": "https://bugzilla.suse.com/1256394"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.290.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.290.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-28T14:35:14Z",
"details": "moderate"
}
],
"title": "CVE-2023-54051"
},
{
"cve": "CVE-2023-54070",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2023-54070"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nigb: clean up in all error paths when enabling SR-IOV\n\nAfter commit 50f303496d92 (\"igb: Enable SR-IOV after reinit\"), removing\nthe igb module could hang or crash (depending on the machine) when the\nmodule has been loaded with the max_vfs parameter set to some value != 0.\n\nIn case of one test machine with a dual port 82580, this hang occurred:\n\n[ 232.480687] igb 0000:41:00.1: removed PHC on enp65s0f1\n[ 233.093257] igb 0000:41:00.1: IOV Disabled\n[ 233.329969] pcieport 0000:40:01.0: AER: Multiple Uncorrected (Non-Fatal) err0\n[ 233.340302] igb 0000:41:00.0: PCIe Bus Error: severity=Uncorrected (Non-Fata)\n[ 233.352248] igb 0000:41:00.0: device [8086:1516] error status/mask=00100000\n[ 233.361088] igb 0000:41:00.0: [20] UnsupReq (First)\n[ 233.368183] igb 0000:41:00.0: AER: TLP Header: 40000001 0000040f cdbfc00c c\n[ 233.376846] igb 0000:41:00.1: PCIe Bus Error: severity=Uncorrected (Non-Fata)\n[ 233.388779] igb 0000:41:00.1: device [8086:1516] error status/mask=00100000\n[ 233.397629] igb 0000:41:00.1: [20] UnsupReq (First)\n[ 233.404736] igb 0000:41:00.1: AER: TLP Header: 40000001 0000040f cdbfc00c c\n[ 233.538214] pci 0000:41:00.1: AER: can\u0027t recover (no error_detected callback)\n[ 233.538401] igb 0000:41:00.0: removed PHC on enp65s0f0\n[ 233.546197] pcieport 0000:40:01.0: AER: device recovery failed\n[ 234.157244] igb 0000:41:00.0: IOV Disabled\n[ 371.619705] INFO: task irq/35-aerdrv:257 blocked for more than 122 seconds.\n[ 371.627489] Not tainted 6.4.0-dirty #2\n[ 371.632257] \"echo 0 \u003e /proc/sys/kernel/hung_task_timeout_secs\" disables this.\n[ 371.641000] task:irq/35-aerdrv state:D stack:0 pid:257 ppid:2 f0\n[ 371.650330] Call Trace:\n[ 371.653061] \u003cTASK\u003e\n[ 371.655407] __schedule+0x20e/0x660\n[ 371.659313] schedule+0x5a/0xd0\n[ 371.662824] schedule_preempt_disabled+0x11/0x20\n[ 371.667983] __mutex_lock.constprop.0+0x372/0x6c0\n[ 371.673237] ? __pfx_aer_root_reset+0x10/0x10\n[ 371.678105] report_error_detected+0x25/0x1c0\n[ 371.682974] ? __pfx_report_normal_detected+0x10/0x10\n[ 371.688618] pci_walk_bus+0x72/0x90\n[ 371.692519] pcie_do_recovery+0xb2/0x330\n[ 371.696899] aer_process_err_devices+0x117/0x170\n[ 371.702055] aer_isr+0x1c0/0x1e0\n[ 371.705661] ? __set_cpus_allowed_ptr+0x54/0xa0\n[ 371.710723] ? __pfx_irq_thread_fn+0x10/0x10\n[ 371.715496] irq_thread_fn+0x20/0x60\n[ 371.719491] irq_thread+0xe6/0x1b0\n[ 371.723291] ? __pfx_irq_thread_dtor+0x10/0x10\n[ 371.728255] ? __pfx_irq_thread+0x10/0x10\n[ 371.732731] kthread+0xe2/0x110\n[ 371.736243] ? __pfx_kthread+0x10/0x10\n[ 371.740430] ret_from_fork+0x2c/0x50\n[ 371.744428] \u003c/TASK\u003e\n\nThe reproducer was a simple script:\n\n #!/bin/sh\n for i in `seq 1 5`; do\n modprobe -rv igb\n modprobe -v igb max_vfs=1\n sleep 1\n modprobe -rv igb\n done\n\nIt turned out that this could only be reproduce on 82580 (quad and\ndual-port), but not on 82576, i350 and i210. Further debugging showed\nthat igb_enable_sriov()\u0027s call to pci_enable_sriov() is failing, because\ndev-\u003eis_physfn is 0 on 82580.\n\nPrior to commit 50f303496d92 (\"igb: Enable SR-IOV after reinit\"),\nigb_enable_sriov() jumped into the \"err_out\" cleanup branch. After this\ncommit it only returned the error code.\n\nSo the cleanup didn\u0027t take place, and the incorrect VF setup in the\nigb_adapter structure fooled the igb driver into assuming that VFs have\nbeen set up where no VF actually existed.\n\nFix this problem by cleaning up again if pci_enable_sriov() fails.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.290.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2023-54070",
"url": "https://www.suse.com/security/cve/CVE-2023-54070"
},
{
"category": "external",
"summary": "SUSE Bug 1256364 for CVE-2023-54070",
"url": "https://bugzilla.suse.com/1256364"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.290.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.290.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-28T14:35:14Z",
"details": "moderate"
}
],
"title": "CVE-2023-54070"
},
{
"cve": "CVE-2023-54091",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2023-54091"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\ndrm/client: Fix memory leak in drm_client_target_cloned\n\ndmt_mode is allocated and never freed in this function.\nIt was found with the ast driver, but most drivers using generic fbdev\nsetup are probably affected.\n\nThis fixes the following kmemleak report:\n backtrace:\n [\u003c00000000b391296d\u003e] drm_mode_duplicate+0x45/0x220 [drm]\n [\u003c00000000e45bb5b3\u003e] drm_client_target_cloned.constprop.0+0x27b/0x480 [drm]\n [\u003c00000000ed2d3a37\u003e] drm_client_modeset_probe+0x6bd/0xf50 [drm]\n [\u003c0000000010e5cc9d\u003e] __drm_fb_helper_initial_config_and_unlock+0xb4/0x2c0 [drm_kms_helper]\n [\u003c00000000909f82ca\u003e] drm_fbdev_client_hotplug+0x2bc/0x4d0 [drm_kms_helper]\n [\u003c00000000063a69aa\u003e] drm_client_register+0x169/0x240 [drm]\n [\u003c00000000a8c61525\u003e] ast_pci_probe+0x142/0x190 [ast]\n [\u003c00000000987f19bb\u003e] local_pci_probe+0xdc/0x180\n [\u003c000000004fca231b\u003e] work_for_cpu_fn+0x4e/0xa0\n [\u003c0000000000b85301\u003e] process_one_work+0x8b7/0x1540\n [\u003c000000003375b17c\u003e] worker_thread+0x70a/0xed0\n [\u003c00000000b0d43cd9\u003e] kthread+0x29f/0x340\n [\u003c000000008d770833\u003e] ret_from_fork+0x1f/0x30\nunreferenced object 0xff11000333089a00 (size 128):",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.290.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2023-54091",
"url": "https://www.suse.com/security/cve/CVE-2023-54091"
},
{
"category": "external",
"summary": "SUSE Bug 1256274 for CVE-2023-54091",
"url": "https://bugzilla.suse.com/1256274"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.290.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.3,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.290.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-28T14:35:14Z",
"details": "low"
}
],
"title": "CVE-2023-54091"
},
{
"cve": "CVE-2023-54095",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2023-54095"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\npowerpc/iommu: Fix notifiers being shared by PCI and VIO buses\n\nfail_iommu_setup() registers the fail_iommu_bus_notifier struct to both\nPCI and VIO buses. struct notifier_block is a linked list node, so this\ncauses any notifiers later registered to either bus type to also be\nregistered to the other since they share the same node.\n\nThis causes issues in (at least) the vgaarb code, which registers a\nnotifier for PCI buses. pci_notify() ends up being called on a vio\ndevice, converted with to_pci_dev() even though it\u0027s not a PCI device,\nand finally makes a bad access in vga_arbiter_add_pci_device() as\ndiscovered with KASAN:\n\n BUG: KASAN: slab-out-of-bounds in vga_arbiter_add_pci_device+0x60/0xe00\n Read of size 4 at addr c000000264c26fdc by task swapper/0/1\n\n Call Trace:\n dump_stack_lvl+0x1bc/0x2b8 (unreliable)\n print_report+0x3f4/0xc60\n kasan_report+0x244/0x698\n __asan_load4+0xe8/0x250\n vga_arbiter_add_pci_device+0x60/0xe00\n pci_notify+0x88/0x444\n notifier_call_chain+0x104/0x320\n blocking_notifier_call_chain+0xa0/0x140\n device_add+0xac8/0x1d30\n device_register+0x58/0x80\n vio_register_device_node+0x9ac/0xce0\n vio_bus_scan_register_devices+0xc4/0x13c\n __machine_initcall_pseries_vio_device_init+0x94/0xf0\n do_one_initcall+0x12c/0xaa8\n kernel_init_freeable+0xa48/0xba8\n kernel_init+0x64/0x400\n ret_from_kernel_thread+0x5c/0x64\n\nFix this by creating separate notifier_block structs for each bus type.\n\n[mpe: Add #ifdef to fix CONFIG_IBMVIO=n build]",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.290.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2023-54095",
"url": "https://www.suse.com/security/cve/CVE-2023-54095"
},
{
"category": "external",
"summary": "SUSE Bug 1256271 for CVE-2023-54095",
"url": "https://bugzilla.suse.com/1256271"
},
{
"category": "external",
"summary": "SUSE Bug 1256272 for CVE-2023-54095",
"url": "https://bugzilla.suse.com/1256272"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.290.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.290.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-28T14:35:14Z",
"details": "moderate"
}
],
"title": "CVE-2023-54095"
},
{
"cve": "CVE-2023-54108",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2023-54108"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nscsi: qla2xxx: Fix DMA-API call trace on NVMe LS requests\n\nThe following message and call trace was seen with debug kernels:\n\nDMA-API: qla2xxx 0000:41:00.0: device driver failed to check map\nerror [device address=0x00000002a3ff38d8] [size=1024 bytes] [mapped as\nsingle]\nWARNING: CPU: 0 PID: 2930 at kernel/dma/debug.c:1017\n\t check_unmap+0xf42/0x1990\n\nCall Trace:\n\tdebug_dma_unmap_page+0xc9/0x100\n\tqla_nvme_ls_unmap+0x141/0x210 [qla2xxx]\n\nRemove DMA mapping from the driver altogether, as it is already done by FC\nlayer. This prevents the warning.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.290.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2023-54108",
"url": "https://www.suse.com/security/cve/CVE-2023-54108"
},
{
"category": "external",
"summary": "SUSE Bug 1256355 for CVE-2023-54108",
"url": "https://bugzilla.suse.com/1256355"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.290.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.290.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-28T14:35:14Z",
"details": "moderate"
}
],
"title": "CVE-2023-54108"
},
{
"cve": "CVE-2023-54110",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2023-54110"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nusb: rndis_host: Secure rndis_query check against int overflow\n\nVariables off and len typed as uint32 in rndis_query function\nare controlled by incoming RNDIS response message thus their\nvalue may be manipulated. Setting off to a unexpectetly large\nvalue will cause the sum with len and 8 to overflow and pass\nthe implemented validation step. Consequently the response\npointer will be referring to a location past the expected\nbuffer boundaries allowing information leakage e.g. via\nRNDIS_OID_802_3_PERMANENT_ADDRESS OID.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.290.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2023-54110",
"url": "https://www.suse.com/security/cve/CVE-2023-54110"
},
{
"category": "external",
"summary": "SUSE Bug 1256353 for CVE-2023-54110",
"url": "https://bugzilla.suse.com/1256353"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.290.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.290.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-28T14:35:14Z",
"details": "moderate"
}
],
"title": "CVE-2023-54110"
},
{
"cve": "CVE-2023-54119",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2023-54119"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\ninotify: Avoid reporting event with invalid wd\n\nWhen inotify_freeing_mark() races with inotify_handle_inode_event() it\ncan happen that inotify_handle_inode_event() sees that i_mark-\u003ewd got\nalready reset to -1 and reports this value to userspace which can\nconfuse the inotify listener. Avoid the problem by validating that wd is\nsensible (and pretend the mark got removed before the event got\ngenerated otherwise).",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.290.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2023-54119",
"url": "https://www.suse.com/security/cve/CVE-2023-54119"
},
{
"category": "external",
"summary": "SUSE Bug 1256349 for CVE-2023-54119",
"url": "https://bugzilla.suse.com/1256349"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.290.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.290.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-28T14:35:14Z",
"details": "moderate"
}
],
"title": "CVE-2023-54119"
},
{
"cve": "CVE-2023-54120",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2023-54120"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nBluetooth: Fix race condition in hidp_session_thread\n\nThere is a potential race condition in hidp_session_thread that may\nlead to use-after-free. For instance, the timer is active while\nhidp_del_timer is called in hidp_session_thread(). After hidp_session_put,\nthen \u0027session\u0027 will be freed, causing kernel panic when hidp_idle_timeout\nis running.\n\nThe solution is to use del_timer_sync instead of del_timer.\n\nHere is the call trace:\n\n? hidp_session_probe+0x780/0x780\ncall_timer_fn+0x2d/0x1e0\n__run_timers.part.0+0x569/0x940\nhidp_session_probe+0x780/0x780\ncall_timer_fn+0x1e0/0x1e0\nktime_get+0x5c/0xf0\nlapic_next_deadline+0x2c/0x40\nclockevents_program_event+0x205/0x320\nrun_timer_softirq+0xa9/0x1b0\n__do_softirq+0x1b9/0x641\n__irq_exit_rcu+0xdc/0x190\nirq_exit_rcu+0xe/0x20\nsysvec_apic_timer_interrupt+0xa1/0xc0",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.290.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2023-54120",
"url": "https://www.suse.com/security/cve/CVE-2023-54120"
},
{
"category": "external",
"summary": "SUSE Bug 1256133 for CVE-2023-54120",
"url": "https://bugzilla.suse.com/1256133"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.290.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.8,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.290.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-28T14:35:14Z",
"details": "moderate"
}
],
"title": "CVE-2023-54120"
},
{
"cve": "CVE-2023-54123",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2023-54123"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nmd/raid10: fix memleak for \u0027conf-\u003ebio_split\u0027\n\nIn the error path of raid10_run(), \u0027conf\u0027 need be freed, however,\n\u0027conf-\u003ebio_split\u0027 is missed and memory will be leaked.\n\nSince there are 3 places to free \u0027conf\u0027, factor out a helper to fix the\nproblem.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.290.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2023-54123",
"url": "https://www.suse.com/security/cve/CVE-2023-54123"
},
{
"category": "external",
"summary": "SUSE Bug 1256142 for CVE-2023-54123",
"url": "https://bugzilla.suse.com/1256142"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.290.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.7,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.290.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-28T14:35:14Z",
"details": "moderate"
}
],
"title": "CVE-2023-54123"
},
{
"cve": "CVE-2023-54130",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2023-54130"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nhfs/hfsplus: avoid WARN_ON() for sanity check, use proper error handling\n\nCommit 55d1cbbbb29e (\"hfs/hfsplus: use WARN_ON for sanity check\") fixed\na build warning by turning a comment into a WARN_ON(), but it turns out\nthat syzbot then complains because it can trigger said warning with a\ncorrupted hfs image.\n\nThe warning actually does warn about a bad situation, but we are much\nbetter off just handling it as the error it is. So rather than warn\nabout us doing bad things, stop doing the bad things and return -EIO.\n\nWhile at it, also fix a memory leak that was introduced by an earlier\nfix for a similar syzbot warning situation, and add a check for one case\nthat historically wasn\u0027t handled at all (ie neither comment nor\nsubsequent WARN_ON).",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.290.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2023-54130",
"url": "https://www.suse.com/security/cve/CVE-2023-54130"
},
{
"category": "external",
"summary": "SUSE Bug 1256114 for CVE-2023-54130",
"url": "https://bugzilla.suse.com/1256114"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.290.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.290.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-28T14:35:14Z",
"details": "moderate"
}
],
"title": "CVE-2023-54130"
},
{
"cve": "CVE-2023-54146",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2023-54146"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nx86/kexec: Fix double-free of elf header buffer\n\nAfter\n\n b3e34a47f989 (\"x86/kexec: fix memory leak of elf header buffer\"),\n\nfreeing image-\u003eelf_headers in the error path of crash_load_segments()\nis not needed because kimage_file_post_load_cleanup() will take\ncare of that later. And not clearing it could result in a double-free.\n\nDrop the superfluous vfree() call at the error path of\ncrash_load_segments().",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.290.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2023-54146",
"url": "https://www.suse.com/security/cve/CVE-2023-54146"
},
{
"category": "external",
"summary": "SUSE Bug 1256091 for CVE-2023-54146",
"url": "https://bugzilla.suse.com/1256091"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.290.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.290.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-28T14:35:14Z",
"details": "moderate"
}
],
"title": "CVE-2023-54146"
},
{
"cve": "CVE-2023-54168",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2023-54168"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nRDMA/mlx4: Prevent shift wrapping in set_user_sq_size()\n\nThe ucmd-\u003elog_sq_bb_count variable is controlled by the user so this\nshift can wrap. Fix it by using check_shl_overflow() in the same way\nthat it was done in commit 515f60004ed9 (\"RDMA/hns: Prevent undefined\nbehavior in hns_roce_set_user_sq_size()\").",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.290.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2023-54168",
"url": "https://www.suse.com/security/cve/CVE-2023-54168"
},
{
"category": "external",
"summary": "SUSE Bug 1256053 for CVE-2023-54168",
"url": "https://bugzilla.suse.com/1256053"
},
{
"category": "external",
"summary": "SUSE Bug 1256054 for CVE-2023-54168",
"url": "https://bugzilla.suse.com/1256054"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.290.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.290.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-28T14:35:14Z",
"details": "important"
}
],
"title": "CVE-2023-54168"
},
{
"cve": "CVE-2023-54170",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2023-54170"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nkeys: Fix linking a duplicate key to a keyring\u0027s assoc_array\n\nWhen making a DNS query inside the kernel using dns_query(), the request\ncode can in rare cases end up creating a duplicate index key in the\nassoc_array of the destination keyring. It is eventually found by\na BUG_ON() check in the assoc_array implementation and results in\na crash.\n\nExample report:\n[2158499.700025] kernel BUG at ../lib/assoc_array.c:652!\n[2158499.700039] invalid opcode: 0000 [#1] SMP PTI\n[2158499.700065] CPU: 3 PID: 31985 Comm: kworker/3:1 Kdump: loaded Not tainted 5.3.18-150300.59.90-default #1 SLE15-SP3\n[2158499.700096] Hardware name: VMware, Inc. VMware Virtual Platform/440BX Desktop Reference Platform, BIOS 6.00 11/12/2020\n[2158499.700351] Workqueue: cifsiod cifs_resolve_server [cifs]\n[2158499.700380] RIP: 0010:assoc_array_insert+0x85f/0xa40\n[2158499.700401] Code: ff 74 2b 48 8b 3b 49 8b 45 18 4c 89 e6 48 83 e7 fe e8 95 ec 74 00 3b 45 88 7d db 85 c0 79 d4 0f 0b 0f 0b 0f 0b e8 41 f2 be ff \u003c0f\u003e 0b 0f 0b 81 7d 88 ff ff ff 7f 4c 89 eb 4c 8b ad 58 ff ff ff 0f\n[2158499.700448] RSP: 0018:ffffc0bd6187faf0 EFLAGS: 00010282\n[2158499.700470] RAX: ffff9f1ea7da2fe8 RBX: ffff9f1ea7da2fc1 RCX: 0000000000000005\n[2158499.700492] RDX: 0000000000000000 RSI: 0000000000000005 RDI: 0000000000000000\n[2158499.700515] RBP: ffffc0bd6187fbb0 R08: ffff9f185faf1100 R09: 0000000000000000\n[2158499.700538] R10: ffff9f1ea7da2cc0 R11: 000000005ed8cec8 R12: ffffc0bd6187fc28\n[2158499.700561] R13: ffff9f15feb8d000 R14: ffff9f1ea7da2fc0 R15: ffff9f168dc0d740\n[2158499.700585] FS: 0000000000000000(0000) GS:ffff9f185fac0000(0000) knlGS:0000000000000000\n[2158499.700610] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033\n[2158499.700630] CR2: 00007fdd94fca238 CR3: 0000000809d8c006 CR4: 00000000003706e0\n[2158499.700702] Call Trace:\n[2158499.700741] ? key_alloc+0x447/0x4b0\n[2158499.700768] ? __key_link_begin+0x43/0xa0\n[2158499.700790] __key_link_begin+0x43/0xa0\n[2158499.700814] request_key_and_link+0x2c7/0x730\n[2158499.700847] ? dns_resolver_read+0x20/0x20 [dns_resolver]\n[2158499.700873] ? key_default_cmp+0x20/0x20\n[2158499.700898] request_key_tag+0x43/0xa0\n[2158499.700926] dns_query+0x114/0x2ca [dns_resolver]\n[2158499.701127] dns_resolve_server_name_to_ip+0x194/0x310 [cifs]\n[2158499.701164] ? scnprintf+0x49/0x90\n[2158499.701190] ? __switch_to_asm+0x40/0x70\n[2158499.701211] ? __switch_to_asm+0x34/0x70\n[2158499.701405] reconn_set_ipaddr_from_hostname+0x81/0x2a0 [cifs]\n[2158499.701603] cifs_resolve_server+0x4b/0xd0 [cifs]\n[2158499.701632] process_one_work+0x1f8/0x3e0\n[2158499.701658] worker_thread+0x2d/0x3f0\n[2158499.701682] ? process_one_work+0x3e0/0x3e0\n[2158499.701703] kthread+0x10d/0x130\n[2158499.701723] ? kthread_park+0xb0/0xb0\n[2158499.701746] ret_from_fork+0x1f/0x40\n\nThe situation occurs as follows:\n* Some kernel facility invokes dns_query() to resolve a hostname, for\n example, \"abcdef\". The function registers its global DNS resolver\n cache as current-\u003ecred.thread_keyring and passes the query to\n request_key_net() -\u003e request_key_tag() -\u003e request_key_and_link().\n* Function request_key_and_link() creates a keyring_search_context\n object. Its match_data.cmp method gets set via a call to\n type-\u003ematch_preparse() (resolves to dns_resolver_match_preparse()) to\n dns_resolver_cmp().\n* Function request_key_and_link() continues and invokes\n search_process_keyrings_rcu() which returns that a given key was not\n found. The control is then passed to request_key_and_link() -\u003e\n construct_alloc_key().\n* Concurrently to that, a second task similarly makes a DNS query for\n \"abcdef.\" and its result gets inserted into the DNS resolver cache.\n* Back on the first task, function construct_alloc_key() first runs\n __key_link_begin() to determine an assoc_array_edit operation to\n insert a new key. Index keys in the array are compared exactly as-is,\n using keyring_compare_object(). The operation \n---truncated---",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.290.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2023-54170",
"url": "https://www.suse.com/security/cve/CVE-2023-54170"
},
{
"category": "external",
"summary": "SUSE Bug 1256045 for CVE-2023-54170",
"url": "https://bugzilla.suse.com/1256045"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.290.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.290.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-28T14:35:14Z",
"details": "moderate"
}
],
"title": "CVE-2023-54170"
},
{
"cve": "CVE-2023-54177",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2023-54177"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nquota: fix warning in dqgrab()\n\nThere\u0027s issue as follows when do fault injection:\nWARNING: CPU: 1 PID: 14870 at include/linux/quotaops.h:51 dquot_disable+0x13b7/0x18c0\nModules linked in:\nCPU: 1 PID: 14870 Comm: fsconfig Not tainted 6.3.0-next-20230505-00006-g5107a9c821af-dirty #541\nRIP: 0010:dquot_disable+0x13b7/0x18c0\nRSP: 0018:ffffc9000acc79e0 EFLAGS: 00010246\nRAX: 0000000000000000 RBX: 0000000000000000 RCX: ffff88825e41b980\nRDX: 0000000000000000 RSI: ffff88825e41b980 RDI: 0000000000000002\nRBP: ffff888179f68000 R08: ffffffff82087ca7 R09: 0000000000000000\nR10: 0000000000000001 R11: ffffed102f3ed026 R12: ffff888179f68130\nR13: ffff888179f68110 R14: dffffc0000000000 R15: ffff888179f68118\nFS: 00007f450a073740(0000) GS:ffff88882fc00000(0000) knlGS:0000000000000000\nCS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033\nCR2: 00007ffe96f2efd8 CR3: 000000025c8ad000 CR4: 00000000000006e0\nDR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000\nDR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400\nCall Trace:\n \u003cTASK\u003e\n dquot_load_quota_sb+0xd53/0x1060\n dquot_resume+0x172/0x230\n ext4_reconfigure+0x1dc6/0x27b0\n reconfigure_super+0x515/0xa90\n __x64_sys_fsconfig+0xb19/0xd20\n do_syscall_64+0x39/0xb0\n entry_SYSCALL_64_after_hwframe+0x63/0xcd\n\nAbove issue may happens as follows:\nProcessA ProcessB ProcessC\nsys_fsconfig\n vfs_fsconfig_locked\n reconfigure_super\n ext4_remount\n dquot_suspend -\u003e suspend all type quota\n\n sys_fsconfig\n vfs_fsconfig_locked\n reconfigure_super\n ext4_remount\n dquot_resume\n ret = dquot_load_quota_sb\n add_dquot_ref\n do_open -\u003e open file O_RDWR\n vfs_open\n do_dentry_open\n get_write_access\n atomic_inc_unless_negative(\u0026inode-\u003ei_writecount)\n ext4_file_open\n dquot_file_open\n dquot_initialize\n __dquot_initialize\n dqget\n\t\t\t\t\t\t atomic_inc(\u0026dquot-\u003edq_count);\n\n __dquot_initialize\n __dquot_initialize\n dqget\n if (!test_bit(DQ_ACTIVE_B, \u0026dquot-\u003edq_flags))\n ext4_acquire_dquot\n\t\t\t -\u003e Return error DQ_ACTIVE_B flag isn\u0027t set\n dquot_disable\n\t\t\t invalidate_dquots\n\t\t\t if (atomic_read(\u0026dquot-\u003edq_count))\n\t dqgrab\n\t\t\t WARN_ON_ONCE(!test_bit(DQ_ACTIVE_B, \u0026dquot-\u003edq_flags))\n\t -\u003e Trigger warning\n\nIn the above scenario, \u0027dquot-\u003edq_flags\u0027 has no DQ_ACTIVE_B is normal when\ndqgrab().\nTo solve above issue just replace the dqgrab() use in invalidate_dquots() with\natomic_inc(\u0026dquot-\u003edq_count).",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.290.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2023-54177",
"url": "https://www.suse.com/security/cve/CVE-2023-54177"
},
{
"category": "external",
"summary": "SUSE Bug 1255993 for CVE-2023-54177",
"url": "https://bugzilla.suse.com/1255993"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.290.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.3,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.290.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-28T14:35:14Z",
"details": "low"
}
],
"title": "CVE-2023-54177"
},
{
"cve": "CVE-2023-54179",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2023-54179"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nscsi: qla2xxx: Array index may go out of bound\n\nKlocwork reports array \u0027vha-\u003ehost_str\u0027 of size 16 may use index value(s)\n16..19. Use snprintf() instead of sprintf().",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.290.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2023-54179",
"url": "https://www.suse.com/security/cve/CVE-2023-54179"
},
{
"category": "external",
"summary": "SUSE Bug 1255994 for CVE-2023-54179",
"url": "https://bugzilla.suse.com/1255994"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.290.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.6,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.290.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-28T14:35:14Z",
"details": "moderate"
}
],
"title": "CVE-2023-54179"
},
{
"cve": "CVE-2023-54186",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2023-54186"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nusb: typec: altmodes/displayport: fix pin_assignment_show\n\nThis patch fixes negative indexing of buf array in pin_assignment_show\nwhen get_current_pin_assignments returns 0 i.e. no compatible pin\nassignments are found.\n\nBUG: KASAN: use-after-free in pin_assignment_show+0x26c/0x33c\n...\nCall trace:\ndump_backtrace+0x110/0x204\ndump_stack_lvl+0x84/0xbc\nprint_report+0x358/0x974\nkasan_report+0x9c/0xfc\n__do_kernel_fault+0xd4/0x2d4\ndo_bad_area+0x48/0x168\ndo_tag_check_fault+0x24/0x38\ndo_mem_abort+0x6c/0x14c\nel1_abort+0x44/0x68\nel1h_64_sync_handler+0x64/0xa4\nel1h_64_sync+0x78/0x7c\npin_assignment_show+0x26c/0x33c\ndev_attr_show+0x50/0xc0",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.290.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2023-54186",
"url": "https://www.suse.com/security/cve/CVE-2023-54186"
},
{
"category": "external",
"summary": "SUSE Bug 1255985 for CVE-2023-54186",
"url": "https://bugzilla.suse.com/1255985"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.290.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.290.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-28T14:35:14Z",
"details": "moderate"
}
],
"title": "CVE-2023-54186"
},
{
"cve": "CVE-2023-54197",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2023-54197"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nRevert \"Bluetooth: btsdio: fix use after free bug in btsdio_remove due to unfinished work\"\n\nThis reverts commit 1e9ac114c4428fdb7ff4635b45d4f46017e8916f.\n\nThis patch introduces a possible null-ptr-def problem. Revert it. And the\nfixed bug by this patch have resolved by commit 73f7b171b7c0 (\"Bluetooth:\nbtsdio: fix use after free bug in btsdio_remove due to race condition\").",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.290.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2023-54197",
"url": "https://www.suse.com/security/cve/CVE-2023-54197"
},
{
"category": "external",
"summary": "SUSE Bug 1255969 for CVE-2023-54197",
"url": "https://bugzilla.suse.com/1255969"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.290.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.290.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-28T14:35:14Z",
"details": "moderate"
}
],
"title": "CVE-2023-54197"
},
{
"cve": "CVE-2023-54211",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2023-54211"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\ntracing: Fix warning in trace_buffered_event_disable()\n\nWarning happened in trace_buffered_event_disable() at\n WARN_ON_ONCE(!trace_buffered_event_ref)\n\n Call Trace:\n ? __warn+0xa5/0x1b0\n ? trace_buffered_event_disable+0x189/0x1b0\n __ftrace_event_enable_disable+0x19e/0x3e0\n free_probe_data+0x3b/0xa0\n unregister_ftrace_function_probe_func+0x6b8/0x800\n event_enable_func+0x2f0/0x3d0\n ftrace_process_regex.isra.0+0x12d/0x1b0\n ftrace_filter_write+0xe6/0x140\n vfs_write+0x1c9/0x6f0\n [...]\n\nThe cause of the warning is in __ftrace_event_enable_disable(),\ntrace_buffered_event_enable() was called once while\ntrace_buffered_event_disable() was called twice.\nReproduction script show as below, for analysis, see the comments:\n ```\n #!/bin/bash\n\n cd /sys/kernel/tracing/\n\n # 1. Register a \u0027disable_event\u0027 command, then:\n # 1) SOFT_DISABLED_BIT was set;\n # 2) trace_buffered_event_enable() was called first time;\n echo \u0027cmdline_proc_show:disable_event:initcall:initcall_finish\u0027 \u003e \\\n set_ftrace_filter\n\n # 2. Enable the event registered, then:\n # 1) SOFT_DISABLED_BIT was cleared;\n # 2) trace_buffered_event_disable() was called first time;\n echo 1 \u003e events/initcall/initcall_finish/enable\n\n # 3. Try to call into cmdline_proc_show(), then SOFT_DISABLED_BIT was\n # set again!!!\n cat /proc/cmdline\n\n # 4. Unregister the \u0027disable_event\u0027 command, then:\n # 1) SOFT_DISABLED_BIT was cleared again;\n # 2) trace_buffered_event_disable() was called second time!!!\n echo \u0027!cmdline_proc_show:disable_event:initcall:initcall_finish\u0027 \u003e \\\n set_ftrace_filter\n ```\n\nTo fix it, IIUC, we can change to call trace_buffered_event_enable() at\nfist time soft-mode enabled, and call trace_buffered_event_disable() at\nlast time soft-mode disabled.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.290.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2023-54211",
"url": "https://www.suse.com/security/cve/CVE-2023-54211"
},
{
"category": "external",
"summary": "SUSE Bug 1255843 for CVE-2023-54211",
"url": "https://bugzilla.suse.com/1255843"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.290.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.290.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-28T14:35:14Z",
"details": "moderate"
}
],
"title": "CVE-2023-54211"
},
{
"cve": "CVE-2023-54213",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2023-54213"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nUSB: sisusbvga: Add endpoint checks\n\nThe syzbot fuzzer was able to provoke a WARNING from the sisusbvga driver:\n\n------------[ cut here ]------------\nusb 1-1: BOGUS urb xfer, pipe 3 != type 1\nWARNING: CPU: 1 PID: 26 at drivers/usb/core/urb.c:504 usb_submit_urb+0xed6/0x1880 drivers/usb/core/urb.c:504\nModules linked in:\nCPU: 1 PID: 26 Comm: kworker/1:1 Not tainted 6.2.0-rc5-syzkaller-00199-g5af6ce704936 #0\nHardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/12/2023\nWorkqueue: usb_hub_wq hub_event\nRIP: 0010:usb_submit_urb+0xed6/0x1880 drivers/usb/core/urb.c:504\nCode: 7c 24 18 e8 6c 50 80 fb 48 8b 7c 24 18 e8 62 1a 01 ff 41 89 d8 44 89 e1 4c 89 ea 48 89 c6 48 c7 c7 60 b1 fa 8a e8 84 b0 be 03 \u003c0f\u003e 0b e9 58 f8 ff ff e8 3e 50 80 fb 48 81 c5 c0 05 00 00 e9 84 f7\nRSP: 0018:ffffc90000a1ed18 EFLAGS: 00010282\nRAX: 0000000000000000 RBX: 0000000000000001 RCX: 0000000000000000\nRDX: ffff888012783a80 RSI: ffffffff816680ec RDI: fffff52000143d95\nRBP: ffff888079020000 R08: 0000000000000005 R09: 0000000000000000\nR10: 0000000080000000 R11: 0000000000000000 R12: 0000000000000003\nR13: ffff888017d33370 R14: 0000000000000003 R15: ffff888021213600\nFS: 0000000000000000(0000) GS:ffff8880b9900000(0000) knlGS:0000000000000000\nCS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033\nCR2: 00005592753a60b0 CR3: 0000000022899000 CR4: 00000000003506e0\nDR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000\nDR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400\nCall Trace:\n \u003cTASK\u003e\n sisusb_bulkout_msg drivers/usb/misc/sisusbvga/sisusbvga.c:224 [inline]\n sisusb_send_bulk_msg.constprop.0+0x904/0x1230 drivers/usb/misc/sisusbvga/sisusbvga.c:379\n sisusb_send_bridge_packet drivers/usb/misc/sisusbvga/sisusbvga.c:567 [inline]\n sisusb_do_init_gfxdevice drivers/usb/misc/sisusbvga/sisusbvga.c:2077 [inline]\n sisusb_init_gfxdevice+0x87b/0x4000 drivers/usb/misc/sisusbvga/sisusbvga.c:2177\n sisusb_probe+0x9cd/0xbe2 drivers/usb/misc/sisusbvga/sisusbvga.c:2869\n...\n\nThe problem was caused by the fact that the driver does not check\nwhether the endpoints it uses are actually present and have the\nappropriate types. This can be fixed by adding a simple check of\nthe endpoints.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.290.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2023-54213",
"url": "https://www.suse.com/security/cve/CVE-2023-54213"
},
{
"category": "external",
"summary": "SUSE Bug 1255953 for CVE-2023-54213",
"url": "https://bugzilla.suse.com/1255953"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.290.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.290.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-28T14:35:14Z",
"details": "moderate"
}
],
"title": "CVE-2023-54213"
},
{
"cve": "CVE-2023-54214",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2023-54214"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nBluetooth: L2CAP: Fix potential user-after-free\n\nThis fixes all instances of which requires to allocate a buffer calling\nalloc_skb which may release the chan lock and reacquire later which\nmakes it possible that the chan is disconnected in the meantime.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.290.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2023-54214",
"url": "https://www.suse.com/security/cve/CVE-2023-54214"
},
{
"category": "external",
"summary": "SUSE Bug 1255954 for CVE-2023-54214",
"url": "https://bugzilla.suse.com/1255954"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.290.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.8,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.290.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-28T14:35:14Z",
"details": "moderate"
}
],
"title": "CVE-2023-54214"
},
{
"cve": "CVE-2023-54220",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2023-54220"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nserial: 8250: Fix oops for port-\u003epm on uart_change_pm()\n\nUnloading a hardware specific 8250 driver can produce error \"Unable to\nhandle kernel paging request at virtual address\" about ten seconds after\nunloading the driver. This happens on uart_hangup() calling\nuart_change_pm().\n\nTurns out commit 04e82793f068 (\"serial: 8250: Reinit port-\u003epm on port\nspecific driver unbind\") was only a partial fix. If the hardware specific\ndriver has initialized port-\u003epm function, we need to clear port-\u003epm too.\nJust reinitializing port-\u003eops does not do this. Otherwise serial8250_pm()\nwill call port-\u003epm() instead of serial8250_do_pm().",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.290.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2023-54220",
"url": "https://www.suse.com/security/cve/CVE-2023-54220"
},
{
"category": "external",
"summary": "SUSE Bug 1255949 for CVE-2023-54220",
"url": "https://bugzilla.suse.com/1255949"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.290.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.290.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-28T14:35:14Z",
"details": "moderate"
}
],
"title": "CVE-2023-54220"
},
{
"cve": "CVE-2023-54224",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2023-54224"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nbtrfs: fix lockdep splat and potential deadlock after failure running delayed items\n\nWhen running delayed items we are holding a delayed node\u0027s mutex and then\nwe will attempt to modify a subvolume btree to insert/update/delete the\ndelayed items. However if have an error during the insertions for example,\nbtrfs_insert_delayed_items() may return with a path that has locked extent\nbuffers (a leaf at the very least), and then we attempt to release the\ndelayed node at __btrfs_run_delayed_items(), which requires taking the\ndelayed node\u0027s mutex, causing an ABBA type of deadlock. This was reported\nby syzbot and the lockdep splat is the following:\n\n WARNING: possible circular locking dependency detected\n 6.5.0-rc7-syzkaller-00024-g93f5de5f648d #0 Not tainted\n ------------------------------------------------------\n syz-executor.2/13257 is trying to acquire lock:\n ffff88801835c0c0 (\u0026delayed_node-\u003emutex){+.+.}-{3:3}, at: __btrfs_release_delayed_node+0x9a/0xaa0 fs/btrfs/delayed-inode.c:256\n\n but task is already holding lock:\n ffff88802a5ab8e8 (btrfs-tree-00){++++}-{3:3}, at: __btrfs_tree_lock+0x3c/0x2a0 fs/btrfs/locking.c:198\n\n which lock already depends on the new lock.\n\n the existing dependency chain (in reverse order) is:\n\n -\u003e #1 (btrfs-tree-00){++++}-{3:3}:\n __lock_release kernel/locking/lockdep.c:5475 [inline]\n lock_release+0x36f/0x9d0 kernel/locking/lockdep.c:5781\n up_write+0x79/0x580 kernel/locking/rwsem.c:1625\n btrfs_tree_unlock_rw fs/btrfs/locking.h:189 [inline]\n btrfs_unlock_up_safe+0x179/0x3b0 fs/btrfs/locking.c:239\n search_leaf fs/btrfs/ctree.c:1986 [inline]\n btrfs_search_slot+0x2511/0x2f80 fs/btrfs/ctree.c:2230\n btrfs_insert_empty_items+0x9c/0x180 fs/btrfs/ctree.c:4376\n btrfs_insert_delayed_item fs/btrfs/delayed-inode.c:746 [inline]\n btrfs_insert_delayed_items fs/btrfs/delayed-inode.c:824 [inline]\n __btrfs_commit_inode_delayed_items+0xd24/0x2410 fs/btrfs/delayed-inode.c:1111\n __btrfs_run_delayed_items+0x1db/0x430 fs/btrfs/delayed-inode.c:1153\n flush_space+0x269/0xe70 fs/btrfs/space-info.c:723\n btrfs_async_reclaim_metadata_space+0x106/0x350 fs/btrfs/space-info.c:1078\n process_one_work+0x92c/0x12c0 kernel/workqueue.c:2600\n worker_thread+0xa63/0x1210 kernel/workqueue.c:2751\n kthread+0x2b8/0x350 kernel/kthread.c:389\n ret_from_fork+0x2e/0x60 arch/x86/kernel/process.c:145\n ret_from_fork_asm+0x11/0x20 arch/x86/entry/entry_64.S:304\n\n -\u003e #0 (\u0026delayed_node-\u003emutex){+.+.}-{3:3}:\n check_prev_add kernel/locking/lockdep.c:3142 [inline]\n check_prevs_add kernel/locking/lockdep.c:3261 [inline]\n validate_chain kernel/locking/lockdep.c:3876 [inline]\n __lock_acquire+0x39ff/0x7f70 kernel/locking/lockdep.c:5144\n lock_acquire+0x1e3/0x520 kernel/locking/lockdep.c:5761\n __mutex_lock_common+0x1d8/0x2530 kernel/locking/mutex.c:603\n __mutex_lock kernel/locking/mutex.c:747 [inline]\n mutex_lock_nested+0x1b/0x20 kernel/locking/mutex.c:799\n __btrfs_release_delayed_node+0x9a/0xaa0 fs/btrfs/delayed-inode.c:256\n btrfs_release_delayed_node fs/btrfs/delayed-inode.c:281 [inline]\n __btrfs_run_delayed_items+0x2b5/0x430 fs/btrfs/delayed-inode.c:1156\n btrfs_commit_transaction+0x859/0x2ff0 fs/btrfs/transaction.c:2276\n btrfs_sync_file+0xf56/0x1330 fs/btrfs/file.c:1988\n vfs_fsync_range fs/sync.c:188 [inline]\n vfs_fsync fs/sync.c:202 [inline]\n do_fsync fs/sync.c:212 [inline]\n __do_sys_fsync fs/sync.c:220 [inline]\n __se_sys_fsync fs/sync.c:218 [inline]\n __x64_sys_fsync+0x196/0x1e0 fs/sync.c:218\n do_syscall_x64 arch/x86/entry/common.c:50 [inline]\n do_syscall_64+0x41/0xc0 arch/x86/entry/common.c:80\n entry_SYSCALL_64_after_hwframe+0x63/0xcd\n\n other info that\n---truncated---",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.290.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2023-54224",
"url": "https://www.suse.com/security/cve/CVE-2023-54224"
},
{
"category": "external",
"summary": "SUSE Bug 1255951 for CVE-2023-54224",
"url": "https://bugzilla.suse.com/1255951"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.290.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.7,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.290.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-28T14:35:14Z",
"details": "moderate"
}
],
"title": "CVE-2023-54224"
},
{
"cve": "CVE-2023-54226",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2023-54226"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\naf_unix: Fix data races around sk-\u003esk_shutdown.\n\nKCSAN found a data race around sk-\u003esk_shutdown where unix_release_sock()\nand unix_shutdown() update it under unix_state_lock(), OTOH unix_poll()\nand unix_dgram_poll() read it locklessly.\n\nWe need to annotate the writes and reads with WRITE_ONCE() and READ_ONCE().\n\nBUG: KCSAN: data-race in unix_poll / unix_release_sock\n\nwrite to 0xffff88800d0f8aec of 1 bytes by task 264 on cpu 0:\n unix_release_sock+0x75c/0x910 net/unix/af_unix.c:631\n unix_release+0x59/0x80 net/unix/af_unix.c:1042\n __sock_release+0x7d/0x170 net/socket.c:653\n sock_close+0x19/0x30 net/socket.c:1397\n __fput+0x179/0x5e0 fs/file_table.c:321\n ____fput+0x15/0x20 fs/file_table.c:349\n task_work_run+0x116/0x1a0 kernel/task_work.c:179\n resume_user_mode_work include/linux/resume_user_mode.h:49 [inline]\n exit_to_user_mode_loop kernel/entry/common.c:171 [inline]\n exit_to_user_mode_prepare+0x174/0x180 kernel/entry/common.c:204\n __syscall_exit_to_user_mode_work kernel/entry/common.c:286 [inline]\n syscall_exit_to_user_mode+0x1a/0x30 kernel/entry/common.c:297\n do_syscall_64+0x4b/0x90 arch/x86/entry/common.c:86\n entry_SYSCALL_64_after_hwframe+0x72/0xdc\n\nread to 0xffff88800d0f8aec of 1 bytes by task 222 on cpu 1:\n unix_poll+0xa3/0x2a0 net/unix/af_unix.c:3170\n sock_poll+0xcf/0x2b0 net/socket.c:1385\n vfs_poll include/linux/poll.h:88 [inline]\n ep_item_poll.isra.0+0x78/0xc0 fs/eventpoll.c:855\n ep_send_events fs/eventpoll.c:1694 [inline]\n ep_poll fs/eventpoll.c:1823 [inline]\n do_epoll_wait+0x6c4/0xea0 fs/eventpoll.c:2258\n __do_sys_epoll_wait fs/eventpoll.c:2270 [inline]\n __se_sys_epoll_wait fs/eventpoll.c:2265 [inline]\n __x64_sys_epoll_wait+0xcc/0x190 fs/eventpoll.c:2265\n do_syscall_x64 arch/x86/entry/common.c:50 [inline]\n do_syscall_64+0x3b/0x90 arch/x86/entry/common.c:80\n entry_SYSCALL_64_after_hwframe+0x72/0xdc\n\nvalue changed: 0x00 -\u003e 0x03\n\nReported by Kernel Concurrency Sanitizer on:\nCPU: 1 PID: 222 Comm: dbus-broker Not tainted 6.3.0-rc7-02330-gca6270c12e20 #2\nHardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.16.0-0-gd239552ce722-prebuilt.qemu.org 04/01/2014",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.290.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2023-54226",
"url": "https://www.suse.com/security/cve/CVE-2023-54226"
},
{
"category": "external",
"summary": "SUSE Bug 1255841 for CVE-2023-54226",
"url": "https://bugzilla.suse.com/1255841"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.290.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.7,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.290.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-28T14:35:14Z",
"details": "moderate"
}
],
"title": "CVE-2023-54226"
},
{
"cve": "CVE-2023-54236",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2023-54236"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnet/net_failover: fix txq exceeding warning\n\nThe failover txq is inited as 16 queues.\nwhen a packet is transmitted from the failover device firstly,\nthe failover device will select the queue which is returned from\nthe primary device if the primary device is UP and running.\nIf the primary device txq is bigger than the default 16,\nit can lead to the following warning:\neth0 selects TX queue 18, but real number of TX queues is 16\n\nThe warning backtrace is:\n[ 32.146376] CPU: 18 PID: 9134 Comm: chronyd Tainted: G E 6.2.8-1.el7.centos.x86_64 #1\n[ 32.147175] Hardware name: Red Hat KVM, BIOS 1.10.2-3.el7_4.1 04/01/2014\n[ 32.147730] Call Trace:\n[ 32.147971] \u003cTASK\u003e\n[ 32.148183] dump_stack_lvl+0x48/0x70\n[ 32.148514] dump_stack+0x10/0x20\n[ 32.148820] netdev_core_pick_tx+0xb1/0xe0\n[ 32.149180] __dev_queue_xmit+0x529/0xcf0\n[ 32.149533] ? __check_object_size.part.0+0x21c/0x2c0\n[ 32.149967] ip_finish_output2+0x278/0x560\n[ 32.150327] __ip_finish_output+0x1fe/0x2f0\n[ 32.150690] ip_finish_output+0x2a/0xd0\n[ 32.151032] ip_output+0x7a/0x110\n[ 32.151337] ? __pfx_ip_finish_output+0x10/0x10\n[ 32.151733] ip_local_out+0x5e/0x70\n[ 32.152054] ip_send_skb+0x19/0x50\n[ 32.152366] udp_send_skb.isra.0+0x163/0x3a0\n[ 32.152736] udp_sendmsg+0xba8/0xec0\n[ 32.153060] ? __folio_memcg_unlock+0x25/0x60\n[ 32.153445] ? __pfx_ip_generic_getfrag+0x10/0x10\n[ 32.153854] ? sock_has_perm+0x85/0xa0\n[ 32.154190] inet_sendmsg+0x6d/0x80\n[ 32.154508] ? inet_sendmsg+0x6d/0x80\n[ 32.154838] sock_sendmsg+0x62/0x70\n[ 32.155152] ____sys_sendmsg+0x134/0x290\n[ 32.155499] ___sys_sendmsg+0x81/0xc0\n[ 32.155828] ? _get_random_bytes.part.0+0x79/0x1a0\n[ 32.156240] ? ip4_datagram_release_cb+0x5f/0x1e0\n[ 32.156649] ? get_random_u16+0x69/0xf0\n[ 32.156989] ? __fget_light+0xcf/0x110\n[ 32.157326] __sys_sendmmsg+0xc4/0x210\n[ 32.157657] ? __sys_connect+0xb7/0xe0\n[ 32.157995] ? __audit_syscall_entry+0xce/0x140\n[ 32.158388] ? syscall_trace_enter.isra.0+0x12c/0x1a0\n[ 32.158820] __x64_sys_sendmmsg+0x24/0x30\n[ 32.159171] do_syscall_64+0x38/0x90\n[ 32.159493] entry_SYSCALL_64_after_hwframe+0x72/0xdc\n\nFix that by reducing txq number as the non-existent primary-dev does.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.290.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2023-54236",
"url": "https://www.suse.com/security/cve/CVE-2023-54236"
},
{
"category": "external",
"summary": "SUSE Bug 1255922 for CVE-2023-54236",
"url": "https://bugzilla.suse.com/1255922"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.290.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.1,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.290.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-28T14:35:14Z",
"details": "moderate"
}
],
"title": "CVE-2023-54236"
},
{
"cve": "CVE-2023-54260",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2023-54260"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\ncifs: Fix lost destroy smbd connection when MR allocate failed\n\nIf the MR allocate failed, the smb direct connection info is NULL,\nthen smbd_destroy() will directly return, then the connection info\nwill be leaked.\n\nLet\u0027s set the smb direct connection info to the server before call\nsmbd_destroy().",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.290.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2023-54260",
"url": "https://www.suse.com/security/cve/CVE-2023-54260"
},
{
"category": "external",
"summary": "SUSE Bug 1255878 for CVE-2023-54260",
"url": "https://bugzilla.suse.com/1255878"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.290.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.7,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.290.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-28T14:35:14Z",
"details": "moderate"
}
],
"title": "CVE-2023-54260"
},
{
"cve": "CVE-2023-54264",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2023-54264"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nfs/sysv: Null check to prevent null-ptr-deref bug\n\nsb_getblk(inode-\u003ei_sb, parent) return a null ptr and taking lock on\nthat leads to the null-ptr-deref bug.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.290.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2023-54264",
"url": "https://www.suse.com/security/cve/CVE-2023-54264"
},
{
"category": "external",
"summary": "SUSE Bug 1255872 for CVE-2023-54264",
"url": "https://bugzilla.suse.com/1255872"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.290.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.290.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-28T14:35:14Z",
"details": "moderate"
}
],
"title": "CVE-2023-54264"
},
{
"cve": "CVE-2023-54266",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2023-54266"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nmedia: dvb-usb: m920x: Fix a potential memory leak in m920x_i2c_xfer()\n\n\u0027read\u0027 is freed when it is known to be NULL, but not when a read error\noccurs.\n\nRevert the logic to avoid a small leak, should a m920x_read() call fail.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.290.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2023-54266",
"url": "https://www.suse.com/security/cve/CVE-2023-54266"
},
{
"category": "external",
"summary": "SUSE Bug 1255875 for CVE-2023-54266",
"url": "https://bugzilla.suse.com/1255875"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.290.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.7,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.290.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-28T14:35:14Z",
"details": "moderate"
}
],
"title": "CVE-2023-54266"
},
{
"cve": "CVE-2023-54270",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2023-54270"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nmedia: usb: siano: Fix use after free bugs caused by do_submit_urb\n\nThere are UAF bugs caused by do_submit_urb(). One of the KASan reports\nis shown below:\n\n[ 36.403605] BUG: KASAN: use-after-free in worker_thread+0x4a2/0x890\n[ 36.406105] Read of size 8 at addr ffff8880059600e8 by task kworker/0:2/49\n[ 36.408316]\n[ 36.408867] CPU: 0 PID: 49 Comm: kworker/0:2 Not tainted 6.2.0-rc3-15798-g5a41237ad1d4-dir8\n[ 36.411696] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.14.0-0-g15584\n[ 36.416157] Workqueue: 0x0 (events)\n[ 36.417654] Call Trace:\n[ 36.418546] \u003cTASK\u003e\n[ 36.419320] dump_stack_lvl+0x96/0xd0\n[ 36.420522] print_address_description+0x75/0x350\n[ 36.421992] print_report+0x11b/0x250\n[ 36.423174] ? _raw_spin_lock_irqsave+0x87/0xd0\n[ 36.424806] ? __virt_addr_valid+0xcf/0x170\n[ 36.426069] ? worker_thread+0x4a2/0x890\n[ 36.427355] kasan_report+0x131/0x160\n[ 36.428556] ? worker_thread+0x4a2/0x890\n[ 36.430053] worker_thread+0x4a2/0x890\n[ 36.431297] ? worker_clr_flags+0x90/0x90\n[ 36.432479] kthread+0x166/0x190\n[ 36.433493] ? kthread_blkcg+0x50/0x50\n[ 36.434669] ret_from_fork+0x22/0x30\n[ 36.435923] \u003c/TASK\u003e\n[ 36.436684]\n[ 36.437215] Allocated by task 24:\n[ 36.438289] kasan_set_track+0x50/0x80\n[ 36.439436] __kasan_kmalloc+0x89/0xa0\n[ 36.440566] smsusb_probe+0x374/0xc90\n[ 36.441920] usb_probe_interface+0x2d1/0x4c0\n[ 36.443253] really_probe+0x1d5/0x580\n[ 36.444539] __driver_probe_device+0xe3/0x130\n[ 36.446085] driver_probe_device+0x49/0x220\n[ 36.447423] __device_attach_driver+0x19e/0x1b0\n[ 36.448931] bus_for_each_drv+0xcb/0x110\n[ 36.450217] __device_attach+0x132/0x1f0\n[ 36.451470] bus_probe_device+0x59/0xf0\n[ 36.452563] device_add+0x4ec/0x7b0\n[ 36.453830] usb_set_configuration+0xc63/0xe10\n[ 36.455230] usb_generic_driver_probe+0x3b/0x80\n[ 36.456166] printk: console [ttyGS0] disabled\n[ 36.456569] usb_probe_device+0x90/0x110\n[ 36.459523] really_probe+0x1d5/0x580\n[ 36.461027] __driver_probe_device+0xe3/0x130\n[ 36.462465] driver_probe_device+0x49/0x220\n[ 36.463847] __device_attach_driver+0x19e/0x1b0\n[ 36.465229] bus_for_each_drv+0xcb/0x110\n[ 36.466466] __device_attach+0x132/0x1f0\n[ 36.467799] bus_probe_device+0x59/0xf0\n[ 36.469010] device_add+0x4ec/0x7b0\n[ 36.470125] usb_new_device+0x863/0xa00\n[ 36.471374] hub_event+0x18c7/0x2220\n[ 36.472746] process_one_work+0x34c/0x5b0\n[ 36.474041] worker_thread+0x4b7/0x890\n[ 36.475216] kthread+0x166/0x190\n[ 36.476267] ret_from_fork+0x22/0x30\n[ 36.477447]\n[ 36.478160] Freed by task 24:\n[ 36.479239] kasan_set_track+0x50/0x80\n[ 36.480512] kasan_save_free_info+0x2b/0x40\n[ 36.481808] ____kasan_slab_free+0x122/0x1a0\n[ 36.483173] __kmem_cache_free+0xc4/0x200\n[ 36.484563] smsusb_term_device+0xcd/0xf0\n[ 36.485896] smsusb_probe+0xc85/0xc90\n[ 36.486976] usb_probe_interface+0x2d1/0x4c0\n[ 36.488303] really_probe+0x1d5/0x580\n[ 36.489498] __driver_probe_device+0xe3/0x130\n[ 36.491140] driver_probe_device+0x49/0x220\n[ 36.492475] __device_attach_driver+0x19e/0x1b0\n[ 36.493988] bus_for_each_drv+0xcb/0x110\n[ 36.495171] __device_attach+0x132/0x1f0\n[ 36.496617] bus_probe_device+0x59/0xf0\n[ 36.497875] device_add+0x4ec/0x7b0\n[ 36.498972] usb_set_configuration+0xc63/0xe10\n[ 36.500264] usb_generic_driver_probe+0x3b/0x80\n[ 36.501740] usb_probe_device+0x90/0x110\n[ 36.503084] really_probe+0x1d5/0x580\n[ 36.504241] __driver_probe_device+0xe3/0x130\n[ 36.505548] driver_probe_device+0x49/0x220\n[ 36.506766] __device_attach_driver+0x19e/0x1b0\n[ 36.508368] bus_for_each_drv+0xcb/0x110\n[ 36.509646] __device_attach+0x132/0x1f0\n[ 36.510911] bus_probe_device+0x59/0xf0\n[ 36.512103] device_add+0x4ec/0x7b0\n[ 36.513215] usb_new_device+0x863/0xa00\n[ 36.514736] hub_event+0x18c7/0x2220\n[ 36.516130] process_one_work+\n---truncated---",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.290.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2023-54270",
"url": "https://www.suse.com/security/cve/CVE-2023-54270"
},
{
"category": "external",
"summary": "SUSE Bug 1255901 for CVE-2023-54270",
"url": "https://bugzilla.suse.com/1255901"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.290.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:P/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.290.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-28T14:35:14Z",
"details": "moderate"
}
],
"title": "CVE-2023-54270"
},
{
"cve": "CVE-2023-54271",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2023-54271"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nblk-cgroup: Fix NULL deref caused by blkg_policy_data being installed before init\n\nblk-iocost sometimes causes the following crash:\n\n BUG: kernel NULL pointer dereference, address: 00000000000000e0\n ...\n RIP: 0010:_raw_spin_lock+0x17/0x30\n Code: be 01 02 00 00 e8 79 38 39 ff 31 d2 89 d0 5d c3 0f 1f 00 0f 1f 44 00 00 55 48 89 e5 65 ff 05 48 d0 34 7e b9 01 00 00 00 31 c0 \u003cf0\u003e 0f b1 0f 75 02 5d c3 89 c6 e8 ea 04 00 00 5d c3 0f 1f 84 00 00\n RSP: 0018:ffffc900023b3d40 EFLAGS: 00010046\n RAX: 0000000000000000 RBX: 00000000000000e0 RCX: 0000000000000001\n RDX: ffffc900023b3d20 RSI: ffffc900023b3cf0 RDI: 00000000000000e0\n RBP: ffffc900023b3d40 R08: ffffc900023b3c10 R09: 0000000000000003\n R10: 0000000000000064 R11: 000000000000000a R12: ffff888102337000\n R13: fffffffffffffff2 R14: ffff88810af408c8 R15: ffff8881070c3600\n FS: 00007faaaf364fc0(0000) GS:ffff88842fdc0000(0000) knlGS:0000000000000000\n CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033\n CR2: 00000000000000e0 CR3: 00000001097b1000 CR4: 0000000000350ea0\n Call Trace:\n \u003cTASK\u003e\n ioc_weight_write+0x13d/0x410\n cgroup_file_write+0x7a/0x130\n kernfs_fop_write_iter+0xf5/0x170\n vfs_write+0x298/0x370\n ksys_write+0x5f/0xb0\n __x64_sys_write+0x1b/0x20\n do_syscall_64+0x3d/0x80\n entry_SYSCALL_64_after_hwframe+0x46/0xb0\n\nThis happens because iocg-\u003eioc is NULL. The field is initialized by\nioc_pd_init() and never cleared. The NULL deref is caused by\nblkcg_activate_policy() installing blkg_policy_data before initializing it.\n\nblkcg_activate_policy() was doing the following:\n\n1. Allocate pd\u0027s for all existing blkg\u0027s and install them in blkg-\u003epd[].\n2. Initialize all pd\u0027s.\n3. Online all pd\u0027s.\n\nblkcg_activate_policy() only grabs the queue_lock and may release and\nre-acquire the lock as allocation may need to sleep. ioc_weight_write()\ngrabs blkcg-\u003elock and iterates all its blkg\u0027s. The two can race and if\nioc_weight_write() runs during #1 or between #1 and #2, it can encounter a\npd which is not initialized yet, leading to crash.\n\nThe crash can be reproduced with the following script:\n\n #!/bin/bash\n\n echo +io \u003e /sys/fs/cgroup/cgroup.subtree_control\n systemd-run --unit touch-sda --scope dd if=/dev/sda of=/dev/null bs=1M count=1 iflag=direct\n echo 100 \u003e /sys/fs/cgroup/system.slice/io.weight\n bash -c \"echo \u00278:0 enable=1\u0027 \u003e /sys/fs/cgroup/io.cost.qos\" \u0026\n sleep .2\n echo 100 \u003e /sys/fs/cgroup/system.slice/io.weight\n\nwith the following patch applied:\n\n\u003e diff --git a/block/blk-cgroup.c b/block/blk-cgroup.c\n\u003e index fc49be622e05..38d671d5e10c 100644\n\u003e --- a/block/blk-cgroup.c\n\u003e +++ b/block/blk-cgroup.c\n\u003e @@ -1553,6 +1553,12 @@ int blkcg_activate_policy(struct gendisk *disk, const struct blkcg_policy *pol)\n\u003e \t\tpd-\u003eonline = false;\n\u003e \t}\n\u003e\n\u003e + if (system_state == SYSTEM_RUNNING) {\n\u003e + spin_unlock_irq(\u0026q-\u003equeue_lock);\n\u003e + ssleep(1);\n\u003e + spin_lock_irq(\u0026q-\u003equeue_lock);\n\u003e + }\n\u003e +\n\u003e \t/* all allocated, init in the same order */\n\u003e \tif (pol-\u003epd_init_fn)\n\u003e \t\tlist_for_each_entry_reverse(blkg, \u0026q-\u003eblkg_list, q_node)\n\nI don\u0027t see a reason why all pd\u0027s should be allocated, initialized and\nonlined together. The only ordering requirement is that parent blkgs to be\ninitialized and onlined before children, which is guaranteed from the\nwalking order. Let\u0027s fix the bug by allocating, initializing and onlining pd\nfor each blkg and holding blkcg-\u003elock over initialization and onlining. This\nensures that an installed blkg is always fully initialized and onlined\nremoving the the race window.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.290.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2023-54271",
"url": "https://www.suse.com/security/cve/CVE-2023-54271"
},
{
"category": "external",
"summary": "SUSE Bug 1255902 for CVE-2023-54271",
"url": "https://bugzilla.suse.com/1255902"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.290.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.1,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.290.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-28T14:35:14Z",
"details": "moderate"
}
],
"title": "CVE-2023-54271"
},
{
"cve": "CVE-2023-54286",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2023-54286"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nwifi: iwlwifi: dvm: Fix memcpy: detected field-spanning write backtrace\n\nA received TKIP key may be up to 32 bytes because it may contain\nMIC rx/tx keys too. These are not used by iwl and copying these\nover overflows the iwl_keyinfo.key field.\n\nAdd a check to not copy more data to iwl_keyinfo.key then will fit.\n\nThis fixes backtraces like this one:\n\n memcpy: detected field-spanning write (size 32) of single field \"sta_cmd.key.key\" at drivers/net/wireless/intel/iwlwifi/dvm/sta.c:1103 (size 16)\n WARNING: CPU: 1 PID: 946 at drivers/net/wireless/intel/iwlwifi/dvm/sta.c:1103 iwlagn_send_sta_key+0x375/0x390 [iwldvm]\n \u003csnip\u003e\n Hardware name: Dell Inc. Latitude E6430/0H3MT5, BIOS A21 05/08/2017\n RIP: 0010:iwlagn_send_sta_key+0x375/0x390 [iwldvm]\n \u003csnip\u003e\n Call Trace:\n \u003cTASK\u003e\n iwl_set_dynamic_key+0x1f0/0x220 [iwldvm]\n iwlagn_mac_set_key+0x1e4/0x280 [iwldvm]\n drv_set_key+0xa4/0x1b0 [mac80211]\n ieee80211_key_enable_hw_accel+0xa8/0x2d0 [mac80211]\n ieee80211_key_replace+0x22d/0x8e0 [mac80211]\n \u003csnip\u003e",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.290.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2023-54286",
"url": "https://www.suse.com/security/cve/CVE-2023-54286"
},
{
"category": "external",
"summary": "SUSE Bug 1255803 for CVE-2023-54286",
"url": "https://bugzilla.suse.com/1255803"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.290.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.6,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.290.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-28T14:35:14Z",
"details": "moderate"
}
],
"title": "CVE-2023-54286"
},
{
"cve": "CVE-2023-54289",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2023-54289"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nscsi: qedf: Fix NULL dereference in error handling\n\nSmatch reported:\n\ndrivers/scsi/qedf/qedf_main.c:3056 qedf_alloc_global_queues()\nwarn: missing unwind goto?\n\nAt this point in the function, nothing has been allocated so we can return\ndirectly. In particular the \"qedf-\u003eglobal_queues\" have not been allocated\nso calling qedf_free_global_queues() will lead to a NULL dereference when\nwe check if (!gl[i]) and \"gl\" is NULL.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.290.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2023-54289",
"url": "https://www.suse.com/security/cve/CVE-2023-54289"
},
{
"category": "external",
"summary": "SUSE Bug 1255806 for CVE-2023-54289",
"url": "https://bugzilla.suse.com/1255806"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.290.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.290.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-28T14:35:14Z",
"details": "moderate"
}
],
"title": "CVE-2023-54289"
},
{
"cve": "CVE-2023-54294",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2023-54294"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nmd/raid10: fix memleak of md thread\n\nIn raid10_run(), if setup_conf() succeed and raid10_run() failed before\nsetting \u0027mddev-\u003ethread\u0027, then in the error path \u0027conf-\u003ethread\u0027 is not\nfreed.\n\nFix the problem by setting \u0027mddev-\u003ethread\u0027 right after setup_conf().",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.290.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2023-54294",
"url": "https://www.suse.com/security/cve/CVE-2023-54294"
},
{
"category": "external",
"summary": "SUSE Bug 1255802 for CVE-2023-54294",
"url": "https://bugzilla.suse.com/1255802"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.290.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.290.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-28T14:35:14Z",
"details": "moderate"
}
],
"title": "CVE-2023-54294"
},
{
"cve": "CVE-2023-54300",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2023-54300"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nwifi: ath9k: avoid referencing uninit memory in ath9k_wmi_ctrl_rx\n\nFor the reasons also described in commit b383e8abed41 (\"wifi: ath9k: avoid\nuninit memory read in ath9k_htc_rx_msg()\"), ath9k_htc_rx_msg() should\nvalidate pkt_len before accessing the SKB.\n\nFor example, the obtained SKB may have been badly constructed with\npkt_len = 8. In this case, the SKB can only contain a valid htc_frame_hdr\nbut after being processed in ath9k_htc_rx_msg() and passed to\nath9k_wmi_ctrl_rx() endpoint RX handler, it is expected to have a WMI\ncommand header which should be located inside its data payload.\n\nImplement sanity checking inside ath9k_wmi_ctrl_rx(). Otherwise, uninit\nmemory can be referenced.\n\nTested on Qualcomm Atheros Communications AR9271 802.11n .\n\nFound by Linux Verification Center (linuxtesting.org) with Syzkaller.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.290.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2023-54300",
"url": "https://www.suse.com/security/cve/CVE-2023-54300"
},
{
"category": "external",
"summary": "SUSE Bug 1255790 for CVE-2023-54300",
"url": "https://bugzilla.suse.com/1255790"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.290.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.6,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.290.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-28T14:35:14Z",
"details": "moderate"
}
],
"title": "CVE-2023-54300"
},
{
"cve": "CVE-2023-54309",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2023-54309"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\ntpm: tpm_vtpm_proxy: fix a race condition in /dev/vtpmx creation\n\n/dev/vtpmx is made visible before \u0027workqueue\u0027 is initialized, which can\nlead to a memory corruption in the worst case scenario.\n\nAddress this by initializing \u0027workqueue\u0027 as the very first step of the\ndriver initialization.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.290.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2023-54309",
"url": "https://www.suse.com/security/cve/CVE-2023-54309"
},
{
"category": "external",
"summary": "SUSE Bug 1255780 for CVE-2023-54309",
"url": "https://bugzilla.suse.com/1255780"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.290.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.290.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-28T14:35:14Z",
"details": "moderate"
}
],
"title": "CVE-2023-54309"
},
{
"cve": "CVE-2023-54317",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2023-54317"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\ndm flakey: don\u0027t corrupt the zero page\n\nWhen we need to zero some range on a block device, the function\n__blkdev_issue_zero_pages submits a write bio with the bio vector pointing\nto the zero page. If we use dm-flakey with corrupt bio writes option, it\nwill corrupt the content of the zero page which results in crashes of\nvarious userspace programs. Glibc assumes that memory returned by mmap is\nzeroed and it uses it for calloc implementation; if the newly mapped\nmemory is not zeroed, calloc will return non-zeroed memory.\n\nFix this bug by testing if the page is equal to ZERO_PAGE(0) and\navoiding the corruption in this case.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.290.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2023-54317",
"url": "https://www.suse.com/security/cve/CVE-2023-54317"
},
{
"category": "external",
"summary": "SUSE Bug 1255771 for CVE-2023-54317",
"url": "https://bugzilla.suse.com/1255771"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.290.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.1,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.290.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-28T14:35:14Z",
"details": "moderate"
}
],
"title": "CVE-2023-54317"
},
{
"cve": "CVE-2025-38085",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-38085"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nmm/hugetlb: fix huge_pmd_unshare() vs GUP-fast race\n\nhuge_pmd_unshare() drops a reference on a page table that may have\npreviously been shared across processes, potentially turning it into a\nnormal page table used in another process in which unrelated VMAs can\nafterwards be installed.\n\nIf this happens in the middle of a concurrent gup_fast(), gup_fast() could\nend up walking the page tables of another process. While I don\u0027t see any\nway in which that immediately leads to kernel memory corruption, it is\nreally weird and unexpected.\n\nFix it with an explicit broadcast IPI through tlb_remove_table_sync_one(),\njust like we do in khugepaged when removing page tables for a THP\ncollapse.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.290.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-38085",
"url": "https://www.suse.com/security/cve/CVE-2025-38085"
},
{
"category": "external",
"summary": "SUSE Bug 1245499 for CVE-2025-38085",
"url": "https://bugzilla.suse.com/1245499"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.290.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.6,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.290.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-28T14:35:14Z",
"details": "moderate"
}
],
"title": "CVE-2025-38085"
},
{
"cve": "CVE-2025-38336",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-38336"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nata: pata_via: Force PIO for ATAPI devices on VT6415/VT6330\n\nThe controller has a hardware bug that can hard hang the system when\ndoing ATAPI DMAs without any trace of what happened. Depending on the\ndevice attached, it can also prevent the system from booting.\n\nIn this case, the system hangs when reading the ATIP from optical media\nwith cdrecord -vvv -atip on an _NEC DVD_RW ND-4571A 1-01 and an\nOptiarc DVD RW AD-7200A 1.06 attached to an ASRock 990FX Extreme 4,\nrunning at UDMA/33.\n\nThe issue can be reproduced by running the same command with a cygwin\nbuild of cdrecord on WinXP, although it requires more attempts to cause\nit. The hang in that case is also resolved by forcing PIO. It doesn\u0027t\nappear that VIA has produced any drivers for that OS, thus no known\nworkaround exists.\n\nHDDs attached to the controller do not suffer from any DMA issues.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.290.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-38336",
"url": "https://www.suse.com/security/cve/CVE-2025-38336"
},
{
"category": "external",
"summary": "SUSE Bug 1246370 for CVE-2025-38336",
"url": "https://bugzilla.suse.com/1246370"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.290.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.1,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.290.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-28T14:35:14Z",
"details": "moderate"
}
],
"title": "CVE-2025-38336"
},
{
"cve": "CVE-2025-38728",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-38728"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nsmb3: fix for slab out of bounds on mount to ksmbd\n\nWith KASAN enabled, it is possible to get a slab out of bounds\nduring mount to ksmbd due to missing check in parse_server_interfaces()\n(see below):\n\n BUG: KASAN: slab-out-of-bounds in\n parse_server_interfaces+0x14ee/0x1880 [cifs]\n Read of size 4 at addr ffff8881433dba98 by task mount/9827\n\n CPU: 5 UID: 0 PID: 9827 Comm: mount Tainted: G\n OE 6.16.0-rc2-kasan #2 PREEMPT(voluntary)\n Tainted: [O]=OOT_MODULE, [E]=UNSIGNED_MODULE\n Hardware name: Dell Inc. Precision Tower 3620/0MWYPT,\n BIOS 2.13.1 06/14/2019\n Call Trace:\n \u003cTASK\u003e\n dump_stack_lvl+0x9f/0xf0\n print_report+0xd1/0x670\n __virt_addr_valid+0x22c/0x430\n ? parse_server_interfaces+0x14ee/0x1880 [cifs]\n ? kasan_complete_mode_report_info+0x2a/0x1f0\n ? parse_server_interfaces+0x14ee/0x1880 [cifs]\n kasan_report+0xd6/0x110\n parse_server_interfaces+0x14ee/0x1880 [cifs]\n __asan_report_load_n_noabort+0x13/0x20\n parse_server_interfaces+0x14ee/0x1880 [cifs]\n ? __pfx_parse_server_interfaces+0x10/0x10 [cifs]\n ? trace_hardirqs_on+0x51/0x60\n SMB3_request_interfaces+0x1ad/0x3f0 [cifs]\n ? __pfx_SMB3_request_interfaces+0x10/0x10 [cifs]\n ? SMB2_tcon+0x23c/0x15d0 [cifs]\n smb3_qfs_tcon+0x173/0x2b0 [cifs]\n ? __pfx_smb3_qfs_tcon+0x10/0x10 [cifs]\n ? cifs_get_tcon+0x105d/0x2120 [cifs]\n ? do_raw_spin_unlock+0x5d/0x200\n ? cifs_get_tcon+0x105d/0x2120 [cifs]\n ? __pfx_smb3_qfs_tcon+0x10/0x10 [cifs]\n cifs_mount_get_tcon+0x369/0xb90 [cifs]\n ? dfs_cache_find+0xe7/0x150 [cifs]\n dfs_mount_share+0x985/0x2970 [cifs]\n ? check_path.constprop.0+0x28/0x50\n ? save_trace+0x54/0x370\n ? __pfx_dfs_mount_share+0x10/0x10 [cifs]\n ? __lock_acquire+0xb82/0x2ba0\n ? __kasan_check_write+0x18/0x20\n cifs_mount+0xbc/0x9e0 [cifs]\n ? __pfx_cifs_mount+0x10/0x10 [cifs]\n ? do_raw_spin_unlock+0x5d/0x200\n ? cifs_setup_cifs_sb+0x29d/0x810 [cifs]\n cifs_smb3_do_mount+0x263/0x1990 [cifs]",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.290.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-38728",
"url": "https://www.suse.com/security/cve/CVE-2025-38728"
},
{
"category": "external",
"summary": "SUSE Bug 1249256 for CVE-2025-38728",
"url": "https://bugzilla.suse.com/1249256"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.290.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.290.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-28T14:35:14Z",
"details": "moderate"
}
],
"title": "CVE-2025-38728"
},
{
"cve": "CVE-2025-40006",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40006"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nmm/hugetlb: fix folio is still mapped when deleted\n\nMigration may be raced with fallocating hole. remove_inode_single_folio\nwill unmap the folio if the folio is still mapped. However, it\u0027s called\nwithout folio lock. If the folio is migrated and the mapped pte has been\nconverted to migration entry, folio_mapped() returns false, and won\u0027t\nunmap it. Due to extra refcount held by remove_inode_single_folio,\nmigration fails, restores migration entry to normal pte, and the folio is\nmapped again. As a result, we triggered BUG in filemap_unaccount_folio.\n\nThe log is as follows:\n BUG: Bad page cache in process hugetlb pfn:156c00\n page: refcount:515 mapcount:0 mapping:0000000099fef6e1 index:0x0 pfn:0x156c00\n head: order:9 mapcount:1 entire_mapcount:1 nr_pages_mapped:0 pincount:0\n aops:hugetlbfs_aops ino:dcc dentry name(?):\"my_hugepage_file\"\n flags: 0x17ffffc00000c1(locked|waiters|head|node=0|zone=2|lastcpupid=0x1fffff)\n page_type: f4(hugetlb)\n page dumped because: still mapped when deleted\n CPU: 1 UID: 0 PID: 395 Comm: hugetlb Not tainted 6.17.0-rc5-00044-g7aac71907bde-dirty #484 NONE\n Hardware name: QEMU Ubuntu 24.04 PC (i440FX + PIIX, 1996), BIOS 0.0.0 02/06/2015\n Call Trace:\n \u003cTASK\u003e\n dump_stack_lvl+0x4f/0x70\n filemap_unaccount_folio+0xc4/0x1c0\n __filemap_remove_folio+0x38/0x1c0\n filemap_remove_folio+0x41/0xd0\n remove_inode_hugepages+0x142/0x250\n hugetlbfs_fallocate+0x471/0x5a0\n vfs_fallocate+0x149/0x380\n\nHold folio lock before checking if the folio is mapped to avold race with\nmigration.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.290.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40006",
"url": "https://www.suse.com/security/cve/CVE-2025-40006"
},
{
"category": "external",
"summary": "SUSE Bug 1252342 for CVE-2025-40006",
"url": "https://bugzilla.suse.com/1252342"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.290.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.7,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.290.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-28T14:35:14Z",
"details": "moderate"
}
],
"title": "CVE-2025-40006"
},
{
"cve": "CVE-2025-40035",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40035"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nInput: uinput - zero-initialize uinput_ff_upload_compat to avoid info leak\n\nStruct ff_effect_compat is embedded twice inside\nuinput_ff_upload_compat, contains internal padding. In particular, there\nis a hole after struct ff_replay to satisfy alignment requirements for\nthe following union member. Without clearing the structure,\ncopy_to_user() may leak stack data to userspace.\n\nInitialize ff_up_compat to zero before filling valid fields.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.290.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40035",
"url": "https://www.suse.com/security/cve/CVE-2025-40035"
},
{
"category": "external",
"summary": "SUSE Bug 1252866 for CVE-2025-40035",
"url": "https://bugzilla.suse.com/1252866"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.290.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.290.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-28T14:35:14Z",
"details": "moderate"
}
],
"title": "CVE-2025-40035"
},
{
"cve": "CVE-2025-40053",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40053"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnet: dlink: handle copy_thresh allocation failure\n\nThe driver did not handle failure of `netdev_alloc_skb_ip_align()`.\nIf the allocation failed, dereferencing `skb-\u003eprotocol` could lead to\na NULL pointer dereference.\n\nThis patch tries to allocate `skb`. If the allocation fails, it falls\nback to the normal path.\n\nTested-on: D-Link DGE-550T Rev-A3",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.290.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40053",
"url": "https://www.suse.com/security/cve/CVE-2025-40053"
},
{
"category": "external",
"summary": "SUSE Bug 1252808 for CVE-2025-40053",
"url": "https://bugzilla.suse.com/1252808"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.290.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.290.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-28T14:35:14Z",
"details": "moderate"
}
],
"title": "CVE-2025-40053"
},
{
"cve": "CVE-2025-40064",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40064"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nsmc: Fix use-after-free in __pnet_find_base_ndev().\n\nsyzbot reported use-after-free of net_device in __pnet_find_base_ndev(),\nwhich was called during connect(). [0]\n\nsmc_pnet_find_ism_resource() fetches sk_dst_get(sk)-\u003edev and passes\ndown to pnet_find_base_ndev(), where RTNL is held. Then, UAF happened\nat __pnet_find_base_ndev() when the dev is first used.\n\nThis means dev had already been freed before acquiring RTNL in\npnet_find_base_ndev().\n\nWhile dev is going away, dst-\u003edev could be swapped with blackhole_netdev,\nand the dev\u0027s refcnt by dst will be released.\n\nWe must hold dev\u0027s refcnt before calling smc_pnet_find_ism_resource().\n\nAlso, smc_pnet_find_roce_resource() has the same problem.\n\nLet\u0027s use __sk_dst_get() and dst_dev_rcu() in the two functions.\n\n[0]:\nBUG: KASAN: use-after-free in __pnet_find_base_ndev+0x1b1/0x1c0 net/smc/smc_pnet.c:926\nRead of size 1 at addr ffff888036bac33a by task syz.0.3632/18609\n\nCPU: 1 UID: 0 PID: 18609 Comm: syz.0.3632 Not tainted syzkaller #0 PREEMPT(full)\nHardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/18/2025\nCall Trace:\n \u003cTASK\u003e\n dump_stack_lvl+0x189/0x250 lib/dump_stack.c:120\n print_address_description mm/kasan/report.c:378 [inline]\n print_report+0xca/0x240 mm/kasan/report.c:482\n kasan_report+0x118/0x150 mm/kasan/report.c:595\n __pnet_find_base_ndev+0x1b1/0x1c0 net/smc/smc_pnet.c:926\n pnet_find_base_ndev net/smc/smc_pnet.c:946 [inline]\n smc_pnet_find_ism_by_pnetid net/smc/smc_pnet.c:1103 [inline]\n smc_pnet_find_ism_resource+0xef/0x390 net/smc/smc_pnet.c:1154\n smc_find_ism_device net/smc/af_smc.c:1030 [inline]\n smc_find_proposal_devices net/smc/af_smc.c:1115 [inline]\n __smc_connect+0x372/0x1890 net/smc/af_smc.c:1545\n smc_connect+0x877/0xd90 net/smc/af_smc.c:1715\n __sys_connect_file net/socket.c:2086 [inline]\n __sys_connect+0x313/0x440 net/socket.c:2105\n __do_sys_connect net/socket.c:2111 [inline]\n __se_sys_connect net/socket.c:2108 [inline]\n __x64_sys_connect+0x7a/0x90 net/socket.c:2108\n do_syscall_x64 arch/x86/entry/syscall_64.c:63 [inline]\n do_syscall_64+0xfa/0x3b0 arch/x86/entry/syscall_64.c:94\n entry_SYSCALL_64_after_hwframe+0x77/0x7f\nRIP: 0033:0x7f47cbf8eba9\nCode: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 \u003c48\u003e 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48\nRSP: 002b:00007f47ccdb1038 EFLAGS: 00000246 ORIG_RAX: 000000000000002a\nRAX: ffffffffffffffda RBX: 00007f47cc1d5fa0 RCX: 00007f47cbf8eba9\nRDX: 0000000000000010 RSI: 0000200000000280 RDI: 000000000000000b\nRBP: 00007f47cc011e19 R08: 0000000000000000 R09: 0000000000000000\nR10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000\nR13: 00007f47cc1d6038 R14: 00007f47cc1d5fa0 R15: 00007ffc512f8aa8\n \u003c/TASK\u003e\n\nThe buggy address belongs to the physical page:\npage: refcount:0 mapcount:0 mapping:0000000000000000 index:0xffff888036bacd00 pfn:0x36bac\nflags: 0xfff00000000000(node=0|zone=1|lastcpupid=0x7ff)\nraw: 00fff00000000000 ffffea0001243d08 ffff8880b863fdc0 0000000000000000\nraw: ffff888036bacd00 0000000000000000 00000000ffffffff 0000000000000000\npage dumped because: kasan: bad access detected\npage_owner tracks the page as freed\npage last allocated via order 2, migratetype Unmovable, gfp_mask 0x446dc0(GFP_KERNEL_ACCOUNT|__GFP_ZERO|__GFP_NOWARN|__GFP_RETRY_MAYFAIL|__GFP_COMP), pid 16741, tgid 16741 (syz-executor), ts 343313197788, free_ts 380670750466\n set_page_owner include/linux/page_owner.h:32 [inline]\n post_alloc_hook+0x240/0x2a0 mm/page_alloc.c:1851\n prep_new_page mm/page_alloc.c:1859 [inline]\n get_page_from_freelist+0x21e4/0x22c0 mm/page_alloc.c:3858\n __alloc_frozen_pages_noprof+0x181/0x370 mm/page_alloc.c:5148\n alloc_pages_mpol+0x232/0x4a0 mm/mempolicy.c:2416\n ___kmalloc_large_node+0x5f/0x1b0 mm/slub.c:4317\n __kmalloc_large_node_noprof+0x18/0x90 mm/slub.c:4348\n __do_kmalloc_node mm/slub.c:4364 [inline]\n __kvmalloc_node\n---truncated---",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.290.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40064",
"url": "https://www.suse.com/security/cve/CVE-2025-40064"
},
{
"category": "external",
"summary": "SUSE Bug 1252845 for CVE-2025-40064",
"url": "https://bugzilla.suse.com/1252845"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.290.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.290.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-28T14:35:14Z",
"details": "moderate"
}
],
"title": "CVE-2025-40064"
},
{
"cve": "CVE-2025-40075",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40075"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\ntcp_metrics: use dst_dev_net_rcu()\n\nReplace three dst_dev() with a lockdep enabled helper.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.290.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40075",
"url": "https://www.suse.com/security/cve/CVE-2025-40075"
},
{
"category": "external",
"summary": "SUSE Bug 1252795 for CVE-2025-40075",
"url": "https://bugzilla.suse.com/1252795"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.290.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.290.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-28T14:35:14Z",
"details": "moderate"
}
],
"title": "CVE-2025-40075"
},
{
"cve": "CVE-2025-40081",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40081"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nperf: arm_spe: Prevent overflow in PERF_IDX2OFF()\n\nCast nr_pages to unsigned long to avoid overflow when handling large\nAUX buffer sizes (\u003e= 2 GiB).",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.290.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40081",
"url": "https://www.suse.com/security/cve/CVE-2025-40081"
},
{
"category": "external",
"summary": "SUSE Bug 1252776 for CVE-2025-40081",
"url": "https://bugzilla.suse.com/1252776"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.290.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.290.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-28T14:35:14Z",
"details": "moderate"
}
],
"title": "CVE-2025-40081"
},
{
"cve": "CVE-2025-40110",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40110"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\ndrm/vmwgfx: Fix a null-ptr access in the cursor snooper\n\nCheck that the resource which is converted to a surface exists before\ntrying to use the cursor snooper on it.\n\nvmw_cmd_res_check allows explicit invalid (SVGA3D_INVALID_ID) identifiers\nbecause some svga commands accept SVGA3D_INVALID_ID to mean \"no surface\",\nunfortunately functions that accept the actual surfaces as objects might\n(and in case of the cursor snooper, do not) be able to handle null\nobjects. Make sure that we validate not only the identifier (via the\nvmw_cmd_res_check) but also check that the actual resource exists before\ntrying to do something with it.\n\nFixes unchecked null-ptr reference in the snooping code.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.290.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40110",
"url": "https://www.suse.com/security/cve/CVE-2025-40110"
},
{
"category": "external",
"summary": "SUSE Bug 1253275 for CVE-2025-40110",
"url": "https://bugzilla.suse.com/1253275"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.290.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.1,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.290.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-28T14:35:14Z",
"details": "moderate"
}
],
"title": "CVE-2025-40110"
},
{
"cve": "CVE-2025-40123",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40123"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nbpf: Enforce expected_attach_type for tailcall compatibility\n\nYinhao et al. recently reported:\n\n Our fuzzer tool discovered an uninitialized pointer issue in the\n bpf_prog_test_run_xdp() function within the Linux kernel\u0027s BPF subsystem.\n This leads to a NULL pointer dereference when a BPF program attempts to\n deference the txq member of struct xdp_buff object.\n\nThe test initializes two programs of BPF_PROG_TYPE_XDP: progA acts as the\nentry point for bpf_prog_test_run_xdp() and its expected_attach_type can\nneither be of be BPF_XDP_DEVMAP nor BPF_XDP_CPUMAP. progA calls into a slot\nof a tailcall map it owns. progB\u0027s expected_attach_type must be BPF_XDP_DEVMAP\nto pass xdp_is_valid_access() validation. The program returns struct xdp_md\u0027s\negress_ifindex, and the latter is only allowed to be accessed under mentioned\nexpected_attach_type. progB is then inserted into the tailcall which progA\ncalls.\n\nThe underlying issue goes beyond XDP though. Another example are programs\nof type BPF_PROG_TYPE_CGROUP_SOCK_ADDR. sock_addr_is_valid_access() as well\nas sock_addr_func_proto() have different logic depending on the programs\u0027\nexpected_attach_type. Similarly, a program attached to BPF_CGROUP_INET4_GETPEERNAME\nshould not be allowed doing a tailcall into a program which calls bpf_bind()\nout of BPF which is only enabled for BPF_CGROUP_INET4_CONNECT.\n\nIn short, specifying expected_attach_type allows to open up additional\nfunctionality or restrictions beyond what the basic bpf_prog_type enables.\nThe use of tailcalls must not violate these constraints. Fix it by enforcing\nexpected_attach_type in __bpf_prog_map_compatible().\n\nNote that we only enforce this for tailcall maps, but not for BPF devmaps or\ncpumaps: There, the programs are invoked through dev_map_bpf_prog_run*() and\ncpu_map_bpf_prog_run*() which set up a new environment / context and therefore\nthese situations are not prone to this issue.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.290.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40123",
"url": "https://www.suse.com/security/cve/CVE-2025-40123"
},
{
"category": "external",
"summary": "SUSE Bug 1253365 for CVE-2025-40123",
"url": "https://bugzilla.suse.com/1253365"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.290.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.290.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-28T14:35:14Z",
"details": "moderate"
}
],
"title": "CVE-2025-40123"
},
{
"cve": "CVE-2025-40135",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40135"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nipv6: use RCU in ip6_xmit()\n\nUse RCU in ip6_xmit() in order to use dst_dev_rcu() to prevent\npossible UAF.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.290.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40135",
"url": "https://www.suse.com/security/cve/CVE-2025-40135"
},
{
"category": "external",
"summary": "SUSE Bug 1253342 for CVE-2025-40135",
"url": "https://bugzilla.suse.com/1253342"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.290.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.1,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.290.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-28T14:35:14Z",
"details": "moderate"
}
],
"title": "CVE-2025-40135"
},
{
"cve": "CVE-2025-40139",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40139"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nsmc: Use __sk_dst_get() and dst_dev_rcu() in in smc_clc_prfx_set().\n\nsmc_clc_prfx_set() is called during connect() and not under RCU\nnor RTNL.\n\nUsing sk_dst_get(sk)-\u003edev could trigger UAF.\n\nLet\u0027s use __sk_dst_get() and dev_dst_rcu() under rcu_read_lock()\nafter kernel_getsockname().\n\nNote that the returned value of smc_clc_prfx_set() is not used\nin the caller.\n\nWhile at it, we change the 1st arg of smc_clc_prfx_set[46]_rcu()\nnot to touch dst there.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.290.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40139",
"url": "https://www.suse.com/security/cve/CVE-2025-40139"
},
{
"category": "external",
"summary": "SUSE Bug 1253409 for CVE-2025-40139",
"url": "https://bugzilla.suse.com/1253409"
},
{
"category": "external",
"summary": "SUSE Bug 1253411 for CVE-2025-40139",
"url": "https://bugzilla.suse.com/1253411"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.290.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.290.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-28T14:35:14Z",
"details": "important"
}
],
"title": "CVE-2025-40139"
},
{
"cve": "CVE-2025-40149",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40149"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\ntls: Use __sk_dst_get() and dst_dev_rcu() in get_netdev_for_sock().\n\nget_netdev_for_sock() is called during setsockopt(),\nso not under RCU.\n\nUsing sk_dst_get(sk)-\u003edev could trigger UAF.\n\nLet\u0027s use __sk_dst_get() and dst_dev_rcu().\n\nNote that the only -\u003endo_sk_get_lower_dev() user is\nbond_sk_get_lower_dev(), which uses RCU.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.290.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40149",
"url": "https://www.suse.com/security/cve/CVE-2025-40149"
},
{
"category": "external",
"summary": "SUSE Bug 1253355 for CVE-2025-40149",
"url": "https://bugzilla.suse.com/1253355"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.290.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.290.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-28T14:35:14Z",
"details": "moderate"
}
],
"title": "CVE-2025-40149"
},
{
"cve": "CVE-2025-40153",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40153"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nmm: hugetlb: avoid soft lockup when mprotect to large memory area\n\nWhen calling mprotect() to a large hugetlb memory area in our customer\u0027s\nworkload (~300GB hugetlb memory), soft lockup was observed:\n\nwatchdog: BUG: soft lockup - CPU#98 stuck for 23s! [t2_new_sysv:126916]\n\nCPU: 98 PID: 126916 Comm: t2_new_sysv Kdump: loaded Not tainted 6.17-rc7\nHardware name: GIGACOMPUTING R2A3-T40-AAV1/Jefferson CIO, BIOS 5.4.4.1 07/15/2025\npstate: 20400009 (nzCv daif +PAN -UAO -TCO -DIT -SSBS BTYPE=--)\npc : mte_clear_page_tags+0x14/0x24\nlr : mte_sync_tags+0x1c0/0x240\nsp : ffff80003150bb80\nx29: ffff80003150bb80 x28: ffff00739e9705a8 x27: 0000ffd2d6a00000\nx26: 0000ff8e4bc00000 x25: 00e80046cde00f45 x24: 0000000000022458\nx23: 0000000000000000 x22: 0000000000000004 x21: 000000011b380000\nx20: ffff000000000000 x19: 000000011b379f40 x18: 0000000000000000\nx17: 0000000000000000 x16: 0000000000000000 x15: 0000000000000000\nx14: 0000000000000000 x13: 0000000000000000 x12: 0000000000000000\nx11: 0000000000000000 x10: 0000000000000000 x9 : ffffc875e0aa5e2c\nx8 : 0000000000000000 x7 : 0000000000000000 x6 : 0000000000000000\nx5 : fffffc01ce7a5c00 x4 : 00000000046cde00 x3 : fffffc0000000000\nx2 : 0000000000000004 x1 : 0000000000000040 x0 : ffff0046cde7c000\n\nCall trace:\n mte_clear_page_tags+0x14/0x24\n set_huge_pte_at+0x25c/0x280\n hugetlb_change_protection+0x220/0x430\n change_protection+0x5c/0x8c\n mprotect_fixup+0x10c/0x294\n do_mprotect_pkey.constprop.0+0x2e0/0x3d4\n __arm64_sys_mprotect+0x24/0x44\n invoke_syscall+0x50/0x160\n el0_svc_common+0x48/0x144\n do_el0_svc+0x30/0xe0\n el0_svc+0x30/0xf0\n el0t_64_sync_handler+0xc4/0x148\n el0t_64_sync+0x1a4/0x1a8\n\nSoft lockup is not triggered with THP or base page because there is\ncond_resched() called for each PMD size.\n\nAlthough the soft lockup was triggered by MTE, it should be not MTE\nspecific. The other processing which takes long time in the loop may\ntrigger soft lockup too.\n\nSo add cond_resched() for hugetlb to avoid soft lockup.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.290.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40153",
"url": "https://www.suse.com/security/cve/CVE-2025-40153"
},
{
"category": "external",
"summary": "SUSE Bug 1253408 for CVE-2025-40153",
"url": "https://bugzilla.suse.com/1253408"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.290.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.3,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.290.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-28T14:35:14Z",
"details": "low"
}
],
"title": "CVE-2025-40153"
},
{
"cve": "CVE-2025-40158",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40158"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nipv6: use RCU in ip6_output()\n\nUse RCU in ip6_output() in order to use dst_dev_rcu() to prevent\npossible UAF.\n\nWe can remove rcu_read_lock()/rcu_read_unlock() pairs\nfrom ip6_finish_output2().",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.290.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40158",
"url": "https://www.suse.com/security/cve/CVE-2025-40158"
},
{
"category": "external",
"summary": "SUSE Bug 1253402 for CVE-2025-40158",
"url": "https://bugzilla.suse.com/1253402"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.290.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.290.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-28T14:35:14Z",
"details": "moderate"
}
],
"title": "CVE-2025-40158"
},
{
"cve": "CVE-2025-40160",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40160"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nxen/events: Return -EEXIST for bound VIRQs\n\nChange find_virq() to return -EEXIST when a VIRQ is bound to a\ndifferent CPU than the one passed in. With that, remove the BUG_ON()\nfrom bind_virq_to_irq() to propogate the error upwards.\n\nSome VIRQs are per-cpu, but others are per-domain or global. Those must\nbe bound to CPU0 and can then migrate elsewhere. The lookup for\nper-domain and global will probably fail when migrated off CPU 0,\nespecially when the current CPU is tracked. This now returns -EEXIST\ninstead of BUG_ON().\n\nA second call to bind a per-domain or global VIRQ is not expected, but\nmake it non-fatal to avoid trying to look up the irq, since we don\u0027t\nknow which per_cpu(virq_to_irq) it will be in.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.290.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40160",
"url": "https://www.suse.com/security/cve/CVE-2025-40160"
},
{
"category": "external",
"summary": "SUSE Bug 1253400 for CVE-2025-40160",
"url": "https://bugzilla.suse.com/1253400"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.290.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.3,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.290.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-28T14:35:14Z",
"details": "low"
}
],
"title": "CVE-2025-40160"
},
{
"cve": "CVE-2025-40164",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40164"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nusbnet: Fix using smp_processor_id() in preemptible code warnings\n\nSyzbot reported the following warning:\n\nBUG: using smp_processor_id() in preemptible [00000000] code: dhcpcd/2879\ncaller is usbnet_skb_return+0x74/0x490 drivers/net/usb/usbnet.c:331\nCPU: 1 UID: 0 PID: 2879 Comm: dhcpcd Not tainted 6.15.0-rc4-syzkaller-00098-g615dca38c2ea #0 PREEMPT(voluntary)\nCall Trace:\n \u003cTASK\u003e\n __dump_stack lib/dump_stack.c:94 [inline]\n dump_stack_lvl+0x16c/0x1f0 lib/dump_stack.c:120\n check_preemption_disabled+0xd0/0xe0 lib/smp_processor_id.c:49\n usbnet_skb_return+0x74/0x490 drivers/net/usb/usbnet.c:331\n usbnet_resume_rx+0x4b/0x170 drivers/net/usb/usbnet.c:708\n usbnet_change_mtu+0x1be/0x220 drivers/net/usb/usbnet.c:417\n __dev_set_mtu net/core/dev.c:9443 [inline]\n netif_set_mtu_ext+0x369/0x5c0 net/core/dev.c:9496\n netif_set_mtu+0xb0/0x160 net/core/dev.c:9520\n dev_set_mtu+0xae/0x170 net/core/dev_api.c:247\n dev_ifsioc+0xa31/0x18d0 net/core/dev_ioctl.c:572\n dev_ioctl+0x223/0x10e0 net/core/dev_ioctl.c:821\n sock_do_ioctl+0x19d/0x280 net/socket.c:1204\n sock_ioctl+0x42f/0x6a0 net/socket.c:1311\n vfs_ioctl fs/ioctl.c:51 [inline]\n __do_sys_ioctl fs/ioctl.c:906 [inline]\n __se_sys_ioctl fs/ioctl.c:892 [inline]\n __x64_sys_ioctl+0x190/0x200 fs/ioctl.c:892\n do_syscall_x64 arch/x86/entry/syscall_64.c:63 [inline]\n do_syscall_64+0xcd/0x260 arch/x86/entry/syscall_64.c:94\n entry_SYSCALL_64_after_hwframe+0x77/0x7f\n\nFor historical and portability reasons, the netif_rx() is usually\nrun in the softirq or interrupt context, this commit therefore add\nlocal_bh_disable/enable() protection in the usbnet_resume_rx().",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.290.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40164",
"url": "https://www.suse.com/security/cve/CVE-2025-40164"
},
{
"category": "external",
"summary": "SUSE Bug 1253407 for CVE-2025-40164",
"url": "https://bugzilla.suse.com/1253407"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.290.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.7,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.290.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-28T14:35:14Z",
"details": "moderate"
}
],
"title": "CVE-2025-40164"
},
{
"cve": "CVE-2025-40167",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40167"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\next4: detect invalid INLINE_DATA + EXTENTS flag combination\n\nsyzbot reported a BUG_ON in ext4_es_cache_extent() when opening a verity\nfile on a corrupted ext4 filesystem mounted without a journal.\n\nThe issue is that the filesystem has an inode with both the INLINE_DATA\nand EXTENTS flags set:\n\n EXT4-fs error (device loop0): ext4_cache_extents:545: inode #15:\n comm syz.0.17: corrupted extent tree: lblk 0 \u003c prev 66\n\nInvestigation revealed that the inode has both flags set:\n DEBUG: inode 15 - flag=1, i_inline_off=164, has_inline=1, extents_flag=1\n\nThis is an invalid combination since an inode should have either:\n- INLINE_DATA: data stored directly in the inode\n- EXTENTS: data stored in extent-mapped blocks\n\nHaving both flags causes ext4_has_inline_data() to return true, skipping\nextent tree validation in __ext4_iget(). The unvalidated out-of-order\nextents then trigger a BUG_ON in ext4_es_cache_extent() due to integer\nunderflow when calculating hole sizes.\n\nFix this by detecting this invalid flag combination early in ext4_iget()\nand rejecting the corrupted inode.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.290.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40167",
"url": "https://www.suse.com/security/cve/CVE-2025-40167"
},
{
"category": "external",
"summary": "SUSE Bug 1253458 for CVE-2025-40167",
"url": "https://bugzilla.suse.com/1253458"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.290.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.290.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-28T14:35:14Z",
"details": "moderate"
}
],
"title": "CVE-2025-40167"
},
{
"cve": "CVE-2025-40168",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40168"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nsmc: Use __sk_dst_get() and dst_dev_rcu() in smc_clc_prfx_match().\n\nsmc_clc_prfx_match() is called from smc_listen_work() and\nnot under RCU nor RTNL.\n\nUsing sk_dst_get(sk)-\u003edev could trigger UAF.\n\nLet\u0027s use __sk_dst_get() and dst_dev_rcu().\n\nNote that the returned value of smc_clc_prfx_match() is not\nused in the caller.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.290.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40168",
"url": "https://www.suse.com/security/cve/CVE-2025-40168"
},
{
"category": "external",
"summary": "SUSE Bug 1253427 for CVE-2025-40168",
"url": "https://bugzilla.suse.com/1253427"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.290.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.290.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-28T14:35:14Z",
"details": "moderate"
}
],
"title": "CVE-2025-40168"
},
{
"cve": "CVE-2025-40170",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40170"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnet: use dst_dev_rcu() in sk_setup_caps()\n\nUse RCU to protect accesses to dst-\u003edev from sk_setup_caps()\nand sk_dst_gso_max_size().\n\nAlso use dst_dev_rcu() in ip6_dst_mtu_maybe_forward(),\nand ip_dst_mtu_maybe_forward().\n\nip4_dst_hoplimit() can use dst_dev_net_rcu().",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.290.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40170",
"url": "https://www.suse.com/security/cve/CVE-2025-40170"
},
{
"category": "external",
"summary": "SUSE Bug 1253413 for CVE-2025-40170",
"url": "https://bugzilla.suse.com/1253413"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.290.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.290.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-28T14:35:14Z",
"details": "moderate"
}
],
"title": "CVE-2025-40170"
},
{
"cve": "CVE-2025-40178",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40178"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\npid: Add a judgment for ns null in pid_nr_ns\n\n__task_pid_nr_ns\n ns = task_active_pid_ns(current);\n pid_nr_ns(rcu_dereference(*task_pid_ptr(task, type)), ns);\n if (pid \u0026\u0026 ns-\u003elevel \u003c= pid-\u003elevel) {\n\nSometimes null is returned for task_active_pid_ns. Then it will trigger kernel panic in pid_nr_ns.\n\nFor example:\n\tUnable to handle kernel NULL pointer dereference at virtual address 0000000000000058\n\tMem abort info:\n\tESR = 0x0000000096000007\n\tEC = 0x25: DABT (current EL), IL = 32 bits\n\tSET = 0, FnV = 0\n\tEA = 0, S1PTW = 0\n\tFSC = 0x07: level 3 translation fault\n\tData abort info:\n\tISV = 0, ISS = 0x00000007, ISS2 = 0x00000000\n\tCM = 0, WnR = 0, TnD = 0, TagAccess = 0\n\tGCS = 0, Overlay = 0, DirtyBit = 0, Xs = 0\n\tuser pgtable: 4k pages, 39-bit VAs, pgdp=00000002175aa000\n\t[0000000000000058] pgd=08000002175ab003, p4d=08000002175ab003, pud=08000002175ab003, pmd=08000002175be003, pte=0000000000000000\n\tpstate: 834000c5 (Nzcv daIF +PAN -UAO +TCO +DIT -SSBS BTYPE=--)\n\tpc : __task_pid_nr_ns+0x74/0xd0\n\tlr : __task_pid_nr_ns+0x24/0xd0\n\tsp : ffffffc08001bd10\n\tx29: ffffffc08001bd10 x28: ffffffd4422b2000 x27: 0000000000000001\n\tx26: ffffffd442821168 x25: ffffffd442821000 x24: 00000f89492eab31\n\tx23: 00000000000000c0 x22: ffffff806f5693c0 x21: ffffff806f5693c0\n\tx20: 0000000000000001 x19: 0000000000000000 x18: 0000000000000000\n\tx17: 00000000529c6ef0 x16: 00000000529c6ef0 x15: 00000000023a1adc\n\tx14: 0000000000000003 x13: 00000000007ef6d8 x12: 001167c391c78800\n\tx11: 00ffffffffffffff x10: 0000000000000000 x9 : 0000000000000001\n\tx8 : ffffff80816fa3c0 x7 : 0000000000000000 x6 : 49534d702d535449\n\tx5 : ffffffc080c4c2c0 x4 : ffffffd43ee128c8 x3 : ffffffd43ee124dc\n\tx2 : 0000000000000000 x1 : 0000000000000001 x0 : ffffff806f5693c0\n\tCall trace:\n\t__task_pid_nr_ns+0x74/0xd0\n\t...\n\t__handle_irq_event_percpu+0xd4/0x284\n\thandle_irq_event+0x48/0xb0\n\thandle_fasteoi_irq+0x160/0x2d8\n\tgeneric_handle_domain_irq+0x44/0x60\n\tgic_handle_irq+0x4c/0x114\n\tcall_on_irq_stack+0x3c/0x74\n\tdo_interrupt_handler+0x4c/0x84\n\tel1_interrupt+0x34/0x58\n\tel1h_64_irq_handler+0x18/0x24\n\tel1h_64_irq+0x68/0x6c\n\taccount_kernel_stack+0x60/0x144\n\texit_task_stack_account+0x1c/0x80\n\tdo_exit+0x7e4/0xaf8\n\t...\n\tget_signal+0x7bc/0x8d8\n\tdo_notify_resume+0x128/0x828\n\tel0_svc+0x6c/0x70\n\tel0t_64_sync_handler+0x68/0xbc\n\tel0t_64_sync+0x1a8/0x1ac\n\tCode: 35fffe54 911a02a8 f9400108 b4000128 (b9405a69)\n\t---[ end trace 0000000000000000 ]---\n\tKernel panic - not syncing: Oops: Fatal exception in interrupt",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.290.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40178",
"url": "https://www.suse.com/security/cve/CVE-2025-40178"
},
{
"category": "external",
"summary": "SUSE Bug 1253463 for CVE-2025-40178",
"url": "https://bugzilla.suse.com/1253463"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.290.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.290.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-28T14:35:14Z",
"details": "moderate"
}
],
"title": "CVE-2025-40178"
},
{
"cve": "CVE-2025-40198",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40198"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\next4: avoid potential buffer over-read in parse_apply_sb_mount_options()\n\nUnlike other strings in the ext4 superblock, we rely on tune2fs to\nmake sure s_mount_opts is NUL terminated. Harden\nparse_apply_sb_mount_options() by treating s_mount_opts as a potential\n__nonstring.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.290.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40198",
"url": "https://www.suse.com/security/cve/CVE-2025-40198"
},
{
"category": "external",
"summary": "SUSE Bug 1253453 for CVE-2025-40198",
"url": "https://bugzilla.suse.com/1253453"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.290.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.290.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-28T14:35:14Z",
"details": "moderate"
}
],
"title": "CVE-2025-40198"
},
{
"cve": "CVE-2025-40200",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40200"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nSquashfs: reject negative file sizes in squashfs_read_inode()\n\nSyskaller reports a \"WARNING in ovl_copy_up_file\" in overlayfs.\n\nThis warning is ultimately caused because the underlying Squashfs file\nsystem returns a file with a negative file size.\n\nThis commit checks for a negative file size and returns EINVAL.\n\n[phillip@squashfs.org.uk: only need to check 64 bit quantity]",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.290.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40200",
"url": "https://www.suse.com/security/cve/CVE-2025-40200"
},
{
"category": "external",
"summary": "SUSE Bug 1253448 for CVE-2025-40200",
"url": "https://bugzilla.suse.com/1253448"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.290.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.290.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-28T14:35:14Z",
"details": "moderate"
}
],
"title": "CVE-2025-40200"
},
{
"cve": "CVE-2025-40215",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40215"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nxfrm: delete x-\u003etunnel as we delete x\n\nThe ipcomp fallback tunnels currently get deleted (from the various\nlists and hashtables) as the last user state that needed that fallback\nis destroyed (not deleted). If a reference to that user state still\nexists, the fallback state will remain on the hashtables/lists,\ntriggering the WARN in xfrm_state_fini. Because of those remaining\nreferences, the fix in commit f75a2804da39 (\"xfrm: destroy xfrm_state\nsynchronously on net exit path\") is not complete.\n\nWe recently fixed one such situation in TCP due to defered freeing of\nskbs (commit 9b6412e6979f (\"tcp: drop secpath at the same time as we\ncurrently drop dst\")). This can also happen due to IP reassembly: skbs\nwith a secpath remain on the reassembly queue until netns\ndestruction. If we can\u0027t guarantee that the queues are flushed by the\ntime xfrm_state_fini runs, there may still be references to a (user)\nxfrm_state, preventing the timely deletion of the corresponding\nfallback state.\n\nInstead of chasing each instance of skbs holding a secpath one by one,\nthis patch fixes the issue directly within xfrm, by deleting the\nfallback state as soon as the last user state depending on it has been\ndeleted. Destruction will still happen when the final reference is\ndropped.\n\nA separate lockdep class for the fallback state is required since\nwe\u0027re going to lock x-\u003etunnel while x is locked.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.290.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40215",
"url": "https://www.suse.com/security/cve/CVE-2025-40215"
},
{
"category": "external",
"summary": "SUSE Bug 1254959 for CVE-2025-40215",
"url": "https://bugzilla.suse.com/1254959"
},
{
"category": "external",
"summary": "SUSE Bug 1255054 for CVE-2025-40215",
"url": "https://bugzilla.suse.com/1255054"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.290.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.290.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-28T14:35:14Z",
"details": "important"
}
],
"title": "CVE-2025-40215"
},
{
"cve": "CVE-2025-40219",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40219"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nPCI/IOV: Add PCI rescan-remove locking when enabling/disabling SR-IOV\n\nBefore disabling SR-IOV via config space accesses to the parent PF,\nsriov_disable() first removes the PCI devices representing the VFs.\n\nSince commit 9d16947b7583 (\"PCI: Add global pci_lock_rescan_remove()\")\nsuch removal operations are serialized against concurrent remove and\nrescan using the pci_rescan_remove_lock. No such locking was ever added\nin sriov_disable() however. In particular when commit 18f9e9d150fc\n(\"PCI/IOV: Factor out sriov_add_vfs()\") factored out the PCI device\nremoval into sriov_del_vfs() there was still no locking around the\npci_iov_remove_virtfn() calls.\n\nOn s390 the lack of serialization in sriov_disable() may cause double\nremove and list corruption with the below (amended) trace being observed:\n\n PSW: 0704c00180000000 0000000c914e4b38 (klist_put+56)\n GPRS: 000003800313fb48 0000000000000000 0000000100000001 0000000000000001\n\t00000000f9b520a8 0000000000000000 0000000000002fbd 00000000f4cc9480\n\t0000000000000001 0000000000000000 0000000000000000 0000000180692828\n\t00000000818e8000 000003800313fe2c 000003800313fb20 000003800313fad8\n #0 [3800313fb20] device_del at c9158ad5c\n #1 [3800313fb88] pci_remove_bus_device at c915105ba\n #2 [3800313fbd0] pci_iov_remove_virtfn at c9152f198\n #3 [3800313fc28] zpci_iov_remove_virtfn at c90fb67c0\n #4 [3800313fc60] zpci_bus_remove_device at c90fb6104\n #5 [3800313fca0] __zpci_event_availability at c90fb3dca\n #6 [3800313fd08] chsc_process_sei_nt0 at c918fe4a2\n #7 [3800313fd60] crw_collect_info at c91905822\n #8 [3800313fe10] kthread at c90feb390\n #9 [3800313fe68] __ret_from_fork at c90f6aa64\n #10 [3800313fe98] ret_from_fork at c9194f3f2.\n\nThis is because in addition to sriov_disable() removing the VFs, the\nplatform also generates hot-unplug events for the VFs. This being the\nreverse operation to the hotplug events generated by sriov_enable() and\nhandled via pdev-\u003eno_vf_scan. And while the event processing takes\npci_rescan_remove_lock and checks whether the struct pci_dev still exists,\nthe lack of synchronization makes this checking racy.\n\nOther races may also be possible of course though given that this lack of\nlocking persisted so long observable races seem very rare. Even on s390 the\nlist corruption was only observed with certain devices since the platform\nevents are only triggered by config accesses after the removal, so as long\nas the removal finished synchronously they would not race. Either way the\nlocking is missing so fix this by adding it to the sriov_del_vfs() helper.\n\nJust like PCI rescan-remove, locking is also missing in sriov_add_vfs()\nincluding for the error case where pci_stop_and_remove_bus_device() is\ncalled without the PCI rescan-remove lock being held. Even in the non-error\ncase, adding new PCI devices and buses should be serialized via the PCI\nrescan-remove lock. Add the necessary locking.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.290.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40219",
"url": "https://www.suse.com/security/cve/CVE-2025-40219"
},
{
"category": "external",
"summary": "SUSE Bug 1254518 for CVE-2025-40219",
"url": "https://bugzilla.suse.com/1254518"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.290.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.6,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.290.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-28T14:35:14Z",
"details": "moderate"
}
],
"title": "CVE-2025-40219"
},
{
"cve": "CVE-2025-40233",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40233"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nocfs2: clear extent cache after moving/defragmenting extents\n\nThe extent map cache can become stale when extents are moved or\ndefragmented, causing subsequent operations to see outdated extent flags. \nThis triggers a BUG_ON in ocfs2_refcount_cal_cow_clusters().\n\nThe problem occurs when:\n1. copy_file_range() creates a reflinked extent with OCFS2_EXT_REFCOUNTED\n2. ioctl(FITRIM) triggers ocfs2_move_extents()\n3. __ocfs2_move_extents_range() reads and caches the extent (flags=0x2)\n4. ocfs2_move_extent()/ocfs2_defrag_extent() calls __ocfs2_move_extent()\n which clears OCFS2_EXT_REFCOUNTED flag on disk (flags=0x0)\n5. The extent map cache is not invalidated after the move\n6. Later write() operations read stale cached flags (0x2) but disk has\n updated flags (0x0), causing a mismatch\n7. BUG_ON(!(rec-\u003ee_flags \u0026 OCFS2_EXT_REFCOUNTED)) triggers\n\nFix by clearing the extent map cache after each extent move/defrag\noperation in __ocfs2_move_extents_range(). This ensures subsequent\noperations read fresh extent data from disk.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.290.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40233",
"url": "https://www.suse.com/security/cve/CVE-2025-40233"
},
{
"category": "external",
"summary": "SUSE Bug 1254813 for CVE-2025-40233",
"url": "https://bugzilla.suse.com/1254813"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.290.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.290.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-28T14:35:14Z",
"details": "moderate"
}
],
"title": "CVE-2025-40233"
},
{
"cve": "CVE-2025-40240",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40240"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nsctp: avoid NULL dereference when chunk data buffer is missing\n\nchunk-\u003eskb pointer is dereferenced in the if-block where it\u0027s supposed\nto be NULL only.\n\nchunk-\u003eskb can only be NULL if chunk-\u003ehead_skb is not. Check for frag_list\ninstead and do it just before replacing chunk-\u003eskb. We\u0027re sure that\notherwise chunk-\u003eskb is non-NULL because of outer if() condition.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.290.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40240",
"url": "https://www.suse.com/security/cve/CVE-2025-40240"
},
{
"category": "external",
"summary": "SUSE Bug 1254869 for CVE-2025-40240",
"url": "https://bugzilla.suse.com/1254869"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.290.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.290.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-28T14:35:14Z",
"details": "moderate"
}
],
"title": "CVE-2025-40240"
},
{
"cve": "CVE-2025-40244",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40244"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nhfsplus: fix KMSAN uninit-value issue in __hfsplus_ext_cache_extent()\n\nThe syzbot reported issue in __hfsplus_ext_cache_extent():\n\n[ 70.194323][ T9350] BUG: KMSAN: uninit-value in __hfsplus_ext_cache_extent+0x7d0/0x990\n[ 70.195022][ T9350] __hfsplus_ext_cache_extent+0x7d0/0x990\n[ 70.195530][ T9350] hfsplus_file_extend+0x74f/0x1cf0\n[ 70.195998][ T9350] hfsplus_get_block+0xe16/0x17b0\n[ 70.196458][ T9350] __block_write_begin_int+0x962/0x2ce0\n[ 70.196959][ T9350] cont_write_begin+0x1000/0x1950\n[ 70.197416][ T9350] hfsplus_write_begin+0x85/0x130\n[ 70.197873][ T9350] generic_perform_write+0x3e8/0x1060\n[ 70.198374][ T9350] __generic_file_write_iter+0x215/0x460\n[ 70.198892][ T9350] generic_file_write_iter+0x109/0x5e0\n[ 70.199393][ T9350] vfs_write+0xb0f/0x14e0\n[ 70.199771][ T9350] ksys_write+0x23e/0x490\n[ 70.200149][ T9350] __x64_sys_write+0x97/0xf0\n[ 70.200570][ T9350] x64_sys_call+0x3015/0x3cf0\n[ 70.201065][ T9350] do_syscall_64+0xd9/0x1d0\n[ 70.201506][ T9350] entry_SYSCALL_64_after_hwframe+0x77/0x7f\n[ 70.202054][ T9350]\n[ 70.202279][ T9350] Uninit was created at:\n[ 70.202693][ T9350] __kmalloc_noprof+0x621/0xf80\n[ 70.203149][ T9350] hfsplus_find_init+0x8d/0x1d0\n[ 70.203602][ T9350] hfsplus_file_extend+0x6ca/0x1cf0\n[ 70.204087][ T9350] hfsplus_get_block+0xe16/0x17b0\n[ 70.204561][ T9350] __block_write_begin_int+0x962/0x2ce0\n[ 70.205074][ T9350] cont_write_begin+0x1000/0x1950\n[ 70.205547][ T9350] hfsplus_write_begin+0x85/0x130\n[ 70.206017][ T9350] generic_perform_write+0x3e8/0x1060\n[ 70.206519][ T9350] __generic_file_write_iter+0x215/0x460\n[ 70.207042][ T9350] generic_file_write_iter+0x109/0x5e0\n[ 70.207552][ T9350] vfs_write+0xb0f/0x14e0\n[ 70.207961][ T9350] ksys_write+0x23e/0x490\n[ 70.208375][ T9350] __x64_sys_write+0x97/0xf0\n[ 70.208810][ T9350] x64_sys_call+0x3015/0x3cf0\n[ 70.209255][ T9350] do_syscall_64+0xd9/0x1d0\n[ 70.209680][ T9350] entry_SYSCALL_64_after_hwframe+0x77/0x7f\n[ 70.210230][ T9350]\n[ 70.210454][ T9350] CPU: 2 UID: 0 PID: 9350 Comm: repro Not tainted 6.12.0-rc5 #5\n[ 70.211174][ T9350] Hardware name: QEMU Ubuntu 24.04 PC (i440FX + PIIX, 1996), BIOS 1.16.3-debian-1.16.3-2 04/01/2014\n[ 70.212115][ T9350] =====================================================\n[ 70.212734][ T9350] Disabling lock debugging due to kernel taint\n[ 70.213284][ T9350] Kernel panic - not syncing: kmsan.panic set ...\n[ 70.213858][ T9350] CPU: 2 UID: 0 PID: 9350 Comm: repro Tainted: G B 6.12.0-rc5 #5\n[ 70.214679][ T9350] Tainted: [B]=BAD_PAGE\n[ 70.215057][ T9350] Hardware name: QEMU Ubuntu 24.04 PC (i440FX + PIIX, 1996), BIOS 1.16.3-debian-1.16.3-2 04/01/2014\n[ 70.215999][ T9350] Call Trace:\n[ 70.216309][ T9350] \u003cTASK\u003e\n[ 70.216585][ T9350] dump_stack_lvl+0x1fd/0x2b0\n[ 70.217025][ T9350] dump_stack+0x1e/0x30\n[ 70.217421][ T9350] panic+0x502/0xca0\n[ 70.217803][ T9350] ? kmsan_get_metadata+0x13e/0x1c0\n\n[ 70.218294][ Message fromT sy9350] kmsan_report+0x296/slogd@syzkaller 0x2aat Aug 18 22:11:058 ...\n kernel\n:[ 70.213284][ T9350] Kernel panic - not syncing: kmsan.panic [ 70.220179][ T9350] ? kmsan_get_metadata+0x13e/0x1c0\nset ...\n[ 70.221254][ T9350] ? __msan_warning+0x96/0x120\n[ 70.222066][ T9350] ? __hfsplus_ext_cache_extent+0x7d0/0x990\n[ 70.223023][ T9350] ? hfsplus_file_extend+0x74f/0x1cf0\n[ 70.224120][ T9350] ? hfsplus_get_block+0xe16/0x17b0\n[ 70.224946][ T9350] ? __block_write_begin_int+0x962/0x2ce0\n[ 70.225756][ T9350] ? cont_write_begin+0x1000/0x1950\n[ 70.226337][ T9350] ? hfsplus_write_begin+0x85/0x130\n[ 70.226852][ T9350] ? generic_perform_write+0x3e8/0x1060\n[ 70.227405][ T9350] ? __generic_file_write_iter+0x215/0x460\n[ 70.227979][ T9350] ? generic_file_write_iter+0x109/0x5e0\n[ 70.228540][ T9350] ? vfs_write+0xb0f/0x14e0\n[ 70.228997][ T9350] ? ksys_write+0x23e/0x490\n---truncated---",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.290.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40244",
"url": "https://www.suse.com/security/cve/CVE-2025-40244"
},
{
"category": "external",
"summary": "SUSE Bug 1255033 for CVE-2025-40244",
"url": "https://bugzilla.suse.com/1255033"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.290.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.290.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-28T14:35:14Z",
"details": "moderate"
}
],
"title": "CVE-2025-40244"
},
{
"cve": "CVE-2025-40248",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40248"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nvsock: Ignore signal/timeout on connect() if already established\n\nDuring connect(), acting on a signal/timeout by disconnecting an already\nestablished socket leads to several issues:\n\n1. connect() invoking vsock_transport_cancel_pkt() -\u003e\n virtio_transport_purge_skbs() may race with sendmsg() invoking\n virtio_transport_get_credit(). This results in a permanently elevated\n `vvs-\u003ebytes_unsent`. Which, in turn, confuses the SOCK_LINGER handling.\n\n2. connect() resetting a connected socket\u0027s state may race with socket\n being placed in a sockmap. A disconnected socket remaining in a sockmap\n breaks sockmap\u0027s assumptions. And gives rise to WARNs.\n\n3. connect() transitioning SS_CONNECTED -\u003e SS_UNCONNECTED allows for a\n transport change/drop after TCP_ESTABLISHED. Which poses a problem for\n any simultaneous sendmsg() or connect() and may result in a\n use-after-free/null-ptr-deref.\n\nDo not disconnect socket on signal/timeout. Keep the logic for unconnected\nsockets: they don\u0027t linger, can\u0027t be placed in a sockmap, are rejected by\nsendmsg().\n\n[1]: https://lore.kernel.org/netdev/e07fd95c-9a38-4eea-9638-133e38c2ec9b@rbox.co/\n[2]: https://lore.kernel.org/netdev/20250317-vsock-trans-signal-race-v4-0-fc8837f3f1d4@rbox.co/\n[3]: https://lore.kernel.org/netdev/60f1b7db-3099-4f6a-875e-af9f6ef194f6@rbox.co/",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.290.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40248",
"url": "https://www.suse.com/security/cve/CVE-2025-40248"
},
{
"category": "external",
"summary": "SUSE Bug 1254864 for CVE-2025-40248",
"url": "https://bugzilla.suse.com/1254864"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.290.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.290.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-28T14:35:14Z",
"details": "moderate"
}
],
"title": "CVE-2025-40248"
},
{
"cve": "CVE-2025-40252",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40252"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnet: qlogic/qede: fix potential out-of-bounds read in qede_tpa_cont() and qede_tpa_end()\n\nThe loops in \u0027qede_tpa_cont()\u0027 and \u0027qede_tpa_end()\u0027, iterate\nover \u0027cqe-\u003elen_list[]\u0027 using only a zero-length terminator as\nthe stopping condition. If the terminator was missing or\nmalformed, the loop could run past the end of the fixed-size array.\n\nAdd an explicit bound check using ARRAY_SIZE() in both loops to prevent\na potential out-of-bounds access.\n\nFound by Linux Verification Center (linuxtesting.org) with SVACE.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.290.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40252",
"url": "https://www.suse.com/security/cve/CVE-2025-40252"
},
{
"category": "external",
"summary": "SUSE Bug 1254849 for CVE-2025-40252",
"url": "https://bugzilla.suse.com/1254849"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.290.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.290.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-28T14:35:14Z",
"details": "moderate"
}
],
"title": "CVE-2025-40252"
},
{
"cve": "CVE-2025-40256",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40256"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nxfrm: also call xfrm_state_delete_tunnel at destroy time for states that were never added\n\nIn commit b441cf3f8c4b (\"xfrm: delete x-\u003etunnel as we delete x\"), I\nmissed the case where state creation fails between full\ninitialization (-\u003einit_state has been called) and being inserted on\nthe lists.\n\nIn this situation, -\u003einit_state has been called, so for IPcomp\ntunnels, the fallback tunnel has been created and added onto the\nlists, but the user state never gets added, because we fail before\nthat. The user state doesn\u0027t go through __xfrm_state_delete, so we\ndon\u0027t call xfrm_state_delete_tunnel for those states, and we end up\nleaking the FB tunnel.\n\nThere are several codepaths affected by this: the add/update paths, in\nboth net/key and xfrm, and the migrate code (xfrm_migrate,\nxfrm_state_migrate). A \"proper\" rollback of the init_state work would\nprobably be doable in the add/update code, but for migrate it gets\nmore complicated as multiple states may be involved.\n\nAt some point, the new (not-inserted) state will be destroyed, so call\nxfrm_state_delete_tunnel during xfrm_state_gc_destroy. Most states\nwill have their fallback tunnel cleaned up during __xfrm_state_delete,\nwhich solves the issue that b441cf3f8c4b (and other patches before it)\naimed at. All states (including FB tunnels) will be removed from the\nlists once xfrm_state_fini has called flush_work(\u0026xfrm_state_gc_work).",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.290.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40256",
"url": "https://www.suse.com/security/cve/CVE-2025-40256"
},
{
"category": "external",
"summary": "SUSE Bug 1254851 for CVE-2025-40256",
"url": "https://bugzilla.suse.com/1254851"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.290.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.290.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-28T14:35:14Z",
"details": "moderate"
}
],
"title": "CVE-2025-40256"
},
{
"cve": "CVE-2025-40269",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40269"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nALSA: usb-audio: Fix potential overflow of PCM transfer buffer\n\nThe PCM stream data in USB-audio driver is transferred over USB URB\npacket buffers, and each packet size is determined dynamically. The\npacket sizes are limited by some factors such as wMaxPacketSize USB\ndescriptor. OTOH, in the current code, the actually used packet sizes\nare determined only by the rate and the PPS, which may be bigger than\nthe size limit above. This results in a buffer overflow, as reported\nby syzbot.\n\nBasically when the limit is smaller than the calculated packet size,\nit implies that something is wrong, most likely a weird USB\ndescriptor. So the best option would be just to return an error at\nthe parameter setup time before doing any further operations.\n\nThis patch introduces such a sanity check, and returns -EINVAL when\nthe packet size is greater than maxpacksize. The comparison with\nep-\u003epacksize[1] alone should suffice since it\u0027s always equal or\ngreater than ep-\u003epacksize[0].",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.290.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40269",
"url": "https://www.suse.com/security/cve/CVE-2025-40269"
},
{
"category": "external",
"summary": "SUSE Bug 1255035 for CVE-2025-40269",
"url": "https://bugzilla.suse.com/1255035"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.290.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.290.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-28T14:35:14Z",
"details": "moderate"
}
],
"title": "CVE-2025-40269"
},
{
"cve": "CVE-2025-40275",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40275"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nALSA: usb-audio: Fix NULL pointer dereference in snd_usb_mixer_controls_badd\n\nIn snd_usb_create_streams(), for UAC version 3 devices, the Interface\nAssociation Descriptor (IAD) is retrieved via usb_ifnum_to_if(). If this\ncall fails, a fallback routine attempts to obtain the IAD from the next\ninterface and sets a BADD profile. However, snd_usb_mixer_controls_badd()\nassumes that the IAD retrieved from usb_ifnum_to_if() is always valid,\nwithout performing a NULL check. This can lead to a NULL pointer\ndereference when usb_ifnum_to_if() fails to find the interface descriptor.\n\nThis patch adds a NULL pointer check after calling usb_ifnum_to_if() in\nsnd_usb_mixer_controls_badd() to prevent the dereference.\n\nThis issue was discovered by syzkaller, which triggered the bug by sending\na crafted USB device descriptor.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.290.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40275",
"url": "https://www.suse.com/security/cve/CVE-2025-40275"
},
{
"category": "external",
"summary": "SUSE Bug 1254829 for CVE-2025-40275",
"url": "https://bugzilla.suse.com/1254829"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.290.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.290.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-28T14:35:14Z",
"details": "moderate"
}
],
"title": "CVE-2025-40275"
},
{
"cve": "CVE-2025-40278",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40278"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnet: sched: act_ife: initialize struct tc_ife to fix KMSAN kernel-infoleak\n\nFix a KMSAN kernel-infoleak detected by the syzbot .\n\n[net?] KMSAN: kernel-infoleak in __skb_datagram_iter\n\nIn tcf_ife_dump(), the variable \u0027opt\u0027 was partially initialized using a\ndesignatied initializer. While the padding bytes are reamined\nuninitialized. nla_put() copies the entire structure into a\nnetlink message, these uninitialized bytes leaked to userspace.\n\nInitialize the structure with memset before assigning its fields\nto ensure all members and padding are cleared prior to beign copied.\n\nThis change silences the KMSAN report and prevents potential information\nleaks from the kernel memory.\n\nThis fix has been tested and validated by syzbot. This patch closes the\nbug reported at the following syzkaller link and ensures no infoleak.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.290.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40278",
"url": "https://www.suse.com/security/cve/CVE-2025-40278"
},
{
"category": "external",
"summary": "SUSE Bug 1254825 for CVE-2025-40278",
"url": "https://bugzilla.suse.com/1254825"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.290.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.290.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-28T14:35:14Z",
"details": "moderate"
}
],
"title": "CVE-2025-40278"
},
{
"cve": "CVE-2025-40279",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40279"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnet: sched: act_connmark: initialize struct tc_ife to fix kernel leak\n\nIn tcf_connmark_dump(), the variable \u0027opt\u0027 was partially initialized using a\ndesignatied initializer. While the padding bytes are reamined\nuninitialized. nla_put() copies the entire structure into a\nnetlink message, these uninitialized bytes leaked to userspace.\n\nInitialize the structure with memset before assigning its fields\nto ensure all members and padding are cleared prior to beign copied.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.290.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40279",
"url": "https://www.suse.com/security/cve/CVE-2025-40279"
},
{
"category": "external",
"summary": "SUSE Bug 1254846 for CVE-2025-40279",
"url": "https://bugzilla.suse.com/1254846"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.290.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.290.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-28T14:35:14Z",
"details": "moderate"
}
],
"title": "CVE-2025-40279"
},
{
"cve": "CVE-2025-40283",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40283"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nBluetooth: btusb: reorder cleanup in btusb_disconnect to avoid UAF\n\nThere is a KASAN: slab-use-after-free read in btusb_disconnect().\nCalling \"usb_driver_release_interface(\u0026btusb_driver, data-\u003eintf)\" will\nfree the btusb data associated with the interface. The same data is\nthen used later in the function, hence the UAF.\n\nFix by moving the accesses to btusb data to before the data is free\u0027d.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.290.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40283",
"url": "https://www.suse.com/security/cve/CVE-2025-40283"
},
{
"category": "external",
"summary": "SUSE Bug 1254858 for CVE-2025-40283",
"url": "https://bugzilla.suse.com/1254858"
},
{
"category": "external",
"summary": "SUSE Bug 1254859 for CVE-2025-40283",
"url": "https://bugzilla.suse.com/1254859"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.290.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.6,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.290.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-28T14:35:14Z",
"details": "moderate"
}
],
"title": "CVE-2025-40283"
},
{
"cve": "CVE-2025-40304",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40304"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nfbdev: Add bounds checking in bit_putcs to fix vmalloc-out-of-bounds\n\nAdd bounds checking to prevent writes past framebuffer boundaries when\nrendering text near screen edges. Return early if the Y position is off-screen\nand clip image height to screen boundary. Break from the rendering loop if the\nX position is off-screen. When clipping image width to fit the screen, update\nthe character count to match the clipped width to prevent buffer size\nmismatches.\n\nWithout the character count update, bit_putcs_aligned and bit_putcs_unaligned\nreceive mismatched parameters where the buffer is allocated for the clipped\nwidth but cnt reflects the original larger count, causing out-of-bounds writes.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.290.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40304",
"url": "https://www.suse.com/security/cve/CVE-2025-40304"
},
{
"category": "external",
"summary": "SUSE Bug 1255034 for CVE-2025-40304",
"url": "https://bugzilla.suse.com/1255034"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.290.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.290.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-28T14:35:14Z",
"details": "moderate"
}
],
"title": "CVE-2025-40304"
},
{
"cve": "CVE-2025-40308",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40308"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nBluetooth: bcsp: receive data only if registered\n\nCurrently, bcsp_recv() can be called even when the BCSP protocol has not\nbeen registered. This leads to a NULL pointer dereference, as shown in\nthe following stack trace:\n\n KASAN: null-ptr-deref in range [0x0000000000000108-0x000000000000010f]\n RIP: 0010:bcsp_recv+0x13d/0x1740 drivers/bluetooth/hci_bcsp.c:590\n Call Trace:\n \u003cTASK\u003e\n hci_uart_tty_receive+0x194/0x220 drivers/bluetooth/hci_ldisc.c:627\n tiocsti+0x23c/0x2c0 drivers/tty/tty_io.c:2290\n tty_ioctl+0x626/0xde0 drivers/tty/tty_io.c:2706\n vfs_ioctl fs/ioctl.c:51 [inline]\n __do_sys_ioctl fs/ioctl.c:907 [inline]\n __se_sys_ioctl+0xfc/0x170 fs/ioctl.c:893\n do_syscall_x64 arch/x86/entry/syscall_64.c:63 [inline]\n do_syscall_64+0xfa/0x3b0 arch/x86/entry/syscall_64.c:94\n entry_SYSCALL_64_after_hwframe+0x77/0x7f\n\nTo prevent this, ensure that the HCI_UART_REGISTERED flag is set before\nprocessing received data. If the protocol is not registered, return\n-EUNATCH.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.290.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40308",
"url": "https://www.suse.com/security/cve/CVE-2025-40308"
},
{
"category": "external",
"summary": "SUSE Bug 1255064 for CVE-2025-40308",
"url": "https://bugzilla.suse.com/1255064"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.290.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.290.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-28T14:35:14Z",
"details": "moderate"
}
],
"title": "CVE-2025-40308"
},
{
"cve": "CVE-2025-40321",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40321"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nwifi: brcmfmac: fix crash while sending Action Frames in standalone AP Mode\n\nCurrently, whenever there is a need to transmit an Action frame,\nthe brcmfmac driver always uses the P2P vif to send the \"actframe\" IOVAR to\nfirmware. The P2P interfaces were available when wpa_supplicant is managing\nthe wlan interface.\n\nHowever, the P2P interfaces are not created/initialized when only hostapd\nis managing the wlan interface. And if hostapd receives an ANQP Query REQ\nAction frame even from an un-associated STA, the brcmfmac driver tries\nto use an uninitialized P2P vif pointer for sending the IOVAR to firmware.\nThis NULL pointer dereferencing triggers a driver crash.\n\n [ 1417.074538] Unable to handle kernel NULL pointer dereference at virtual\n address 0000000000000000\n [...]\n [ 1417.075188] Hardware name: Raspberry Pi 4 Model B Rev 1.5 (DT)\n [...]\n [ 1417.075653] Call trace:\n [ 1417.075662] brcmf_p2p_send_action_frame+0x23c/0xc58 [brcmfmac]\n [ 1417.075738] brcmf_cfg80211_mgmt_tx+0x304/0x5c0 [brcmfmac]\n [ 1417.075810] cfg80211_mlme_mgmt_tx+0x1b0/0x428 [cfg80211]\n [ 1417.076067] nl80211_tx_mgmt+0x238/0x388 [cfg80211]\n [ 1417.076281] genl_family_rcv_msg_doit+0xe0/0x158\n [ 1417.076302] genl_rcv_msg+0x220/0x2a0\n [ 1417.076317] netlink_rcv_skb+0x68/0x140\n [ 1417.076330] genl_rcv+0x40/0x60\n [ 1417.076343] netlink_unicast+0x330/0x3b8\n [ 1417.076357] netlink_sendmsg+0x19c/0x3f8\n [ 1417.076370] __sock_sendmsg+0x64/0xc0\n [ 1417.076391] ____sys_sendmsg+0x268/0x2a0\n [ 1417.076408] ___sys_sendmsg+0xb8/0x118\n [ 1417.076427] __sys_sendmsg+0x90/0xf8\n [ 1417.076445] __arm64_sys_sendmsg+0x2c/0x40\n [ 1417.076465] invoke_syscall+0x50/0x120\n [ 1417.076486] el0_svc_common.constprop.0+0x48/0xf0\n [ 1417.076506] do_el0_svc+0x24/0x38\n [ 1417.076525] el0_svc+0x30/0x100\n [ 1417.076548] el0t_64_sync_handler+0x100/0x130\n [ 1417.076569] el0t_64_sync+0x190/0x198\n [ 1417.076589] Code: f9401e80 aa1603e2 f9403be1 5280e483 (f9400000)\n\nFix this, by always using the vif corresponding to the wdev on which the\nAction frame Transmission request was initiated by the userspace. This way,\neven if P2P vif is not available, the IOVAR is sent to firmware on AP vif\nand the ANQP Query RESP Action frame is transmitted without crashing the\ndriver.\n\nMove init_completion() for \"send_af_done\" from brcmf_p2p_create_p2pdev()\nto brcmf_p2p_attach(). Because the former function would not get executed\nwhen only hostapd is managing wlan interface, and it is not safe to do\nreinit_completion() later in brcmf_p2p_tx_action_frame(), without any prior\ninit_completion().\n\nAnd in the brcmf_p2p_tx_action_frame() function, the condition check for\nP2P Presence response frame is not needed, since the wpa_supplicant is\nproperly sending the P2P Presense Response frame on the P2P-GO vif instead\nof the P2P-Device vif.\n\n[Cc stable]",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.290.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40321",
"url": "https://www.suse.com/security/cve/CVE-2025-40321"
},
{
"category": "external",
"summary": "SUSE Bug 1254795 for CVE-2025-40321",
"url": "https://bugzilla.suse.com/1254795"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.290.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.290.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-28T14:35:14Z",
"details": "moderate"
}
],
"title": "CVE-2025-40321"
},
{
"cve": "CVE-2025-40322",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40322"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nfbdev: bitblit: bound-check glyph index in bit_putcs*\n\nbit_putcs_aligned()/unaligned() derived the glyph pointer from the\ncharacter value masked by 0xff/0x1ff, which may exceed the actual font\u0027s\nglyph count and read past the end of the built-in font array.\nClamp the index to the actual glyph count before computing the address.\n\nThis fixes a global out-of-bounds read reported by syzbot.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.290.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40322",
"url": "https://www.suse.com/security/cve/CVE-2025-40322"
},
{
"category": "external",
"summary": "SUSE Bug 1255092 for CVE-2025-40322",
"url": "https://bugzilla.suse.com/1255092"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.290.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.290.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-28T14:35:14Z",
"details": "moderate"
}
],
"title": "CVE-2025-40322"
},
{
"cve": "CVE-2025-40331",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40331"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nsctp: Prevent TOCTOU out-of-bounds write\n\nFor the following path not holding the sock lock,\n\n sctp_diag_dump() -\u003e sctp_for_each_endpoint() -\u003e sctp_ep_dump()\n\nmake sure not to exceed bounds in case the address list has grown\nbetween buffer allocation (time-of-check) and write (time-of-use).",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.290.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40331",
"url": "https://www.suse.com/security/cve/CVE-2025-40331"
},
{
"category": "external",
"summary": "SUSE Bug 1254615 for CVE-2025-40331",
"url": "https://bugzilla.suse.com/1254615"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.290.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.290.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-28T14:35:14Z",
"details": "moderate"
}
],
"title": "CVE-2025-40331"
},
{
"cve": "CVE-2025-40337",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40337"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnet: stmmac: Correctly handle Rx checksum offload errors\n\nThe stmmac_rx function would previously set skb-\u003eip_summed to\nCHECKSUM_UNNECESSARY if hardware checksum offload (CoE) was enabled\nand the packet was of a known IP ethertype.\n\nHowever, this logic failed to check if the hardware had actually\nreported a checksum error. The hardware status, indicating a header or\npayload checksum failure, was being ignored at this stage. This could\ncause corrupt packets to be passed up the network stack as valid.\n\nThis patch corrects the logic by checking the `csum_none` status flag,\nwhich is set when the hardware reports a checksum error. If this flag\nis set, skb-\u003eip_summed is now correctly set to CHECKSUM_NONE,\nensuring the kernel\u0027s network stack will perform its own validation and\nproperly handle the corrupt packet.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.290.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40337",
"url": "https://www.suse.com/security/cve/CVE-2025-40337"
},
{
"category": "external",
"summary": "SUSE Bug 1255081 for CVE-2025-40337",
"url": "https://bugzilla.suse.com/1255081"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.290.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.290.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-28T14:35:14Z",
"details": "moderate"
}
],
"title": "CVE-2025-40337"
},
{
"cve": "CVE-2025-40349",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40349"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nhfs: validate record offset in hfsplus_bmap_alloc\n\nhfsplus_bmap_alloc can trigger a crash if a\nrecord offset or length is larger than node_size\n\n[ 15.264282] BUG: KASAN: slab-out-of-bounds in hfsplus_bmap_alloc+0x887/0x8b0\n[ 15.265192] Read of size 8 at addr ffff8881085ca188 by task test/183\n[ 15.265949]\n[ 15.266163] CPU: 0 UID: 0 PID: 183 Comm: test Not tainted 6.17.0-rc2-gc17b750b3ad9 #14 PREEMPT(voluntary)\n[ 15.266165] Hardware name: QEMU Ubuntu 24.04 PC (i440FX + PIIX, 1996), BIOS 1.16.3-debian-1.16.3-2 04/01/2014\n[ 15.266167] Call Trace:\n[ 15.266168] \u003cTASK\u003e\n[ 15.266169] dump_stack_lvl+0x53/0x70\n[ 15.266173] print_report+0xd0/0x660\n[ 15.266181] kasan_report+0xce/0x100\n[ 15.266185] hfsplus_bmap_alloc+0x887/0x8b0\n[ 15.266208] hfs_btree_inc_height.isra.0+0xd5/0x7c0\n[ 15.266217] hfsplus_brec_insert+0x870/0xb00\n[ 15.266222] __hfsplus_ext_write_extent+0x428/0x570\n[ 15.266225] __hfsplus_ext_cache_extent+0x5e/0x910\n[ 15.266227] hfsplus_ext_read_extent+0x1b2/0x200\n[ 15.266233] hfsplus_file_extend+0x5a7/0x1000\n[ 15.266237] hfsplus_get_block+0x12b/0x8c0\n[ 15.266238] __block_write_begin_int+0x36b/0x12c0\n[ 15.266251] block_write_begin+0x77/0x110\n[ 15.266252] cont_write_begin+0x428/0x720\n[ 15.266259] hfsplus_write_begin+0x51/0x100\n[ 15.266262] cont_write_begin+0x272/0x720\n[ 15.266270] hfsplus_write_begin+0x51/0x100\n[ 15.266274] generic_perform_write+0x321/0x750\n[ 15.266285] generic_file_write_iter+0xc3/0x310\n[ 15.266289] __kernel_write_iter+0x2fd/0x800\n[ 15.266296] dump_user_range+0x2ea/0x910\n[ 15.266301] elf_core_dump+0x2a94/0x2ed0\n[ 15.266320] vfs_coredump+0x1d85/0x45e0\n[ 15.266349] get_signal+0x12e3/0x1990\n[ 15.266357] arch_do_signal_or_restart+0x89/0x580\n[ 15.266362] irqentry_exit_to_user_mode+0xab/0x110\n[ 15.266364] asm_exc_page_fault+0x26/0x30\n[ 15.266366] RIP: 0033:0x41bd35\n[ 15.266367] Code: bc d1 f3 0f 7f 27 f3 0f 7f 6f 10 f3 0f 7f 77 20 f3 0f 7f 7f 30 49 83 c0 0f 49 29 d0 48 8d 7c 17 31 e9 9f 0b 00 00 66 0f ef c0 \u003cf3\u003e 0f 6f 0e f3 0f 6f 56 10 66 0f 74 c1 66 0f d7 d0 49 83 f8f\n[ 15.266369] RSP: 002b:00007ffc9e62d078 EFLAGS: 00010283\n[ 15.266371] RAX: 00007ffc9e62d100 RBX: 0000000000000000 RCX: 0000000000000000\n[ 15.266372] RDX: 00000000000000e0 RSI: 0000000000000000 RDI: 00007ffc9e62d100\n[ 15.266373] RBP: 0000400000000040 R08: 00000000000000e0 R09: 0000000000000000\n[ 15.266374] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000\n[ 15.266375] R13: 0000000000000000 R14: 0000000000000000 R15: 0000400000000000\n[ 15.266376] \u003c/TASK\u003e\n\nWhen calling hfsplus_bmap_alloc to allocate a free node, this function\nfirst retrieves the bitmap from header node and map node using node-\u003epage\ntogether with the offset and length from hfs_brec_lenoff\n\n```\nlen = hfs_brec_lenoff(node, 2, \u0026off16);\noff = off16;\n\noff += node-\u003epage_offset;\npagep = node-\u003epage + (off \u003e\u003e PAGE_SHIFT);\ndata = kmap_local_page(*pagep);\n```\n\nHowever, if the retrieved offset or length is invalid(i.e. exceeds\nnode_size), the code may end up accessing pages outside the allocated\nrange for this node.\n\nThis patch adds proper validation of both offset and length before use,\npreventing out-of-bounds page access. Move is_bnode_offset_valid and\ncheck_and_correct_requested_length to hfsplus_fs.h, as they may be\nrequired by other functions.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.290.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40349",
"url": "https://www.suse.com/security/cve/CVE-2025-40349"
},
{
"category": "external",
"summary": "SUSE Bug 1255280 for CVE-2025-40349",
"url": "https://bugzilla.suse.com/1255280"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.290.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.290.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-28T14:35:14Z",
"details": "moderate"
}
],
"title": "CVE-2025-40349"
},
{
"cve": "CVE-2025-40351",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40351"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nhfsplus: fix KMSAN uninit-value issue in hfsplus_delete_cat()\n\nThe syzbot reported issue in hfsplus_delete_cat():\n\n[ 70.682285][ T9333] =====================================================\n[ 70.682943][ T9333] BUG: KMSAN: uninit-value in hfsplus_subfolders_dec+0x1d7/0x220\n[ 70.683640][ T9333] hfsplus_subfolders_dec+0x1d7/0x220\n[ 70.684141][ T9333] hfsplus_delete_cat+0x105d/0x12b0\n[ 70.684621][ T9333] hfsplus_rmdir+0x13d/0x310\n[ 70.685048][ T9333] vfs_rmdir+0x5ba/0x810\n[ 70.685447][ T9333] do_rmdir+0x964/0xea0\n[ 70.685833][ T9333] __x64_sys_rmdir+0x71/0xb0\n[ 70.686260][ T9333] x64_sys_call+0xcd8/0x3cf0\n[ 70.686695][ T9333] do_syscall_64+0xd9/0x1d0\n[ 70.687119][ T9333] entry_SYSCALL_64_after_hwframe+0x77/0x7f\n[ 70.687646][ T9333]\n[ 70.687856][ T9333] Uninit was stored to memory at:\n[ 70.688311][ T9333] hfsplus_subfolders_inc+0x1c2/0x1d0\n[ 70.688779][ T9333] hfsplus_create_cat+0x148e/0x1800\n[ 70.689231][ T9333] hfsplus_mknod+0x27f/0x600\n[ 70.689730][ T9333] hfsplus_mkdir+0x5a/0x70\n[ 70.690146][ T9333] vfs_mkdir+0x483/0x7a0\n[ 70.690545][ T9333] do_mkdirat+0x3f2/0xd30\n[ 70.690944][ T9333] __x64_sys_mkdir+0x9a/0xf0\n[ 70.691380][ T9333] x64_sys_call+0x2f89/0x3cf0\n[ 70.691816][ T9333] do_syscall_64+0xd9/0x1d0\n[ 70.692229][ T9333] entry_SYSCALL_64_after_hwframe+0x77/0x7f\n[ 70.692773][ T9333]\n[ 70.692990][ T9333] Uninit was stored to memory at:\n[ 70.693469][ T9333] hfsplus_subfolders_inc+0x1c2/0x1d0\n[ 70.693960][ T9333] hfsplus_create_cat+0x148e/0x1800\n[ 70.694438][ T9333] hfsplus_fill_super+0x21c1/0x2700\n[ 70.694911][ T9333] mount_bdev+0x37b/0x530\n[ 70.695320][ T9333] hfsplus_mount+0x4d/0x60\n[ 70.695729][ T9333] legacy_get_tree+0x113/0x2c0\n[ 70.696167][ T9333] vfs_get_tree+0xb3/0x5c0\n[ 70.696588][ T9333] do_new_mount+0x73e/0x1630\n[ 70.697013][ T9333] path_mount+0x6e3/0x1eb0\n[ 70.697425][ T9333] __se_sys_mount+0x733/0x830\n[ 70.697857][ T9333] __x64_sys_mount+0xe4/0x150\n[ 70.698269][ T9333] x64_sys_call+0x2691/0x3cf0\n[ 70.698704][ T9333] do_syscall_64+0xd9/0x1d0\n[ 70.699117][ T9333] entry_SYSCALL_64_after_hwframe+0x77/0x7f\n[ 70.699730][ T9333]\n[ 70.699946][ T9333] Uninit was created at:\n[ 70.700378][ T9333] __alloc_pages_noprof+0x714/0xe60\n[ 70.700843][ T9333] alloc_pages_mpol_noprof+0x2a2/0x9b0\n[ 70.701331][ T9333] alloc_pages_noprof+0xf8/0x1f0\n[ 70.701774][ T9333] allocate_slab+0x30e/0x1390\n[ 70.702194][ T9333] ___slab_alloc+0x1049/0x33a0\n[ 70.702635][ T9333] kmem_cache_alloc_lru_noprof+0x5ce/0xb20\n[ 70.703153][ T9333] hfsplus_alloc_inode+0x5a/0xd0\n[ 70.703598][ T9333] alloc_inode+0x82/0x490\n[ 70.703984][ T9333] iget_locked+0x22e/0x1320\n[ 70.704428][ T9333] hfsplus_iget+0x5c/0xba0\n[ 70.704827][ T9333] hfsplus_btree_open+0x135/0x1dd0\n[ 70.705291][ T9333] hfsplus_fill_super+0x1132/0x2700\n[ 70.705776][ T9333] mount_bdev+0x37b/0x530\n[ 70.706171][ T9333] hfsplus_mount+0x4d/0x60\n[ 70.706579][ T9333] legacy_get_tree+0x113/0x2c0\n[ 70.707019][ T9333] vfs_get_tree+0xb3/0x5c0\n[ 70.707444][ T9333] do_new_mount+0x73e/0x1630\n[ 70.707865][ T9333] path_mount+0x6e3/0x1eb0\n[ 70.708270][ T9333] __se_sys_mount+0x733/0x830\n[ 70.708711][ T9333] __x64_sys_mount+0xe4/0x150\n[ 70.709158][ T9333] x64_sys_call+0x2691/0x3cf0\n[ 70.709630][ T9333] do_syscall_64+0xd9/0x1d0\n[ 70.710053][ T9333] entry_SYSCALL_64_after_hwframe+0x77/0x7f\n[ 70.710611][ T9333]\n[ 70.710842][ T9333] CPU: 3 UID: 0 PID: 9333 Comm: repro Not tainted 6.12.0-rc6-dirty #17\n[ 70.711568][ T9333] Hardware name: QEMU Ubuntu 24.04 PC (i440FX + PIIX, 1996), BIOS 1.16.3-debian-1.16.3-2 04/01/2014\n[ 70.712490][ T9333] =====================================================\n[ 70.713085][ T9333] Disabling lock debugging due to kernel taint\n[ 70.713618][ T9333] Kernel panic - not syncing: kmsan.panic set ...\n[ 70.714159][ T9333] \n---truncated---",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.290.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40351",
"url": "https://www.suse.com/security/cve/CVE-2025-40351"
},
{
"category": "external",
"summary": "SUSE Bug 1255281 for CVE-2025-40351",
"url": "https://bugzilla.suse.com/1255281"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.290.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.290.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-28T14:35:14Z",
"details": "moderate"
}
],
"title": "CVE-2025-40351"
},
{
"cve": "CVE-2025-68206",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-68206"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnetfilter: nft_ct: add seqadj extension for natted connections\n\nSequence adjustment may be required for FTP traffic with PASV/EPSV modes.\ndue to need to re-write packet payload (IP, port) on the ftp control\nconnection. This can require changes to the TCP length and expected\nseq / ack_seq.\n\nThe easiest way to reproduce this issue is with PASV mode.\nExample ruleset:\ntable inet ftp_nat {\n ct helper ftp_helper {\n type \"ftp\" protocol tcp\n l3proto inet\n }\n\n chain prerouting {\n type filter hook prerouting priority 0; policy accept;\n tcp dport 21 ct state new ct helper set \"ftp_helper\"\n }\n}\ntable ip nat {\n chain prerouting {\n type nat hook prerouting priority -100; policy accept;\n tcp dport 21 dnat ip prefix to ip daddr map {\n\t\t\t192.168.100.1 : 192.168.13.2/32 }\n }\n\n chain postrouting {\n type nat hook postrouting priority 100 ; policy accept;\n tcp sport 21 snat ip prefix to ip saddr map {\n\t\t\t192.168.13.2 : 192.168.100.1/32 }\n }\n}\n\nNote that the ftp helper gets assigned *after* the dnat setup.\n\nThe inverse (nat after helper assign) is handled by an existing\ncheck in nf_nat_setup_info() and will not show the problem.\n\nTopoloy:\n\n +-------------------+ +----------------------------------+\n | FTP: 192.168.13.2 | \u003c-\u003e | NAT: 192.168.13.3, 192.168.100.1 |\n +-------------------+ +----------------------------------+\n |\n +-----------------------+\n | Client: 192.168.100.2 |\n +-----------------------+\n\nftp nat changes do not work as expected in this case:\nConnected to 192.168.100.1.\n[..]\nftp\u003e epsv\nEPSV/EPRT on IPv4 off.\nftp\u003e ls\n227 Entering passive mode (192,168,100,1,209,129).\n421 Service not available, remote server has closed connection.\n\nKernel logs:\nMissing nfct_seqadj_ext_add() setup call\nWARNING: CPU: 1 PID: 0 at net/netfilter/nf_conntrack_seqadj.c:41\n[..]\n __nf_nat_mangle_tcp_packet+0x100/0x160 [nf_nat]\n nf_nat_ftp+0x142/0x280 [nf_nat_ftp]\n help+0x4d1/0x880 [nf_conntrack_ftp]\n nf_confirm+0x122/0x2e0 [nf_conntrack]\n nf_hook_slow+0x3c/0xb0\n ..\n\nFix this by adding the required extension when a conntrack helper is assigned\nto a connection that has a nat binding.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.290.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-68206",
"url": "https://www.suse.com/security/cve/CVE-2025-68206"
},
{
"category": "external",
"summary": "SUSE Bug 1255142 for CVE-2025-68206",
"url": "https://bugzilla.suse.com/1255142"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.290.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.290.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-28T14:35:14Z",
"details": "moderate"
}
],
"title": "CVE-2025-68206"
},
{
"cve": "CVE-2025-68340",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-68340"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nteam: Move team device type change at the end of team_port_add\n\nAttempting to add a port device that is already up will expectedly fail,\nbut not before modifying the team device header_ops.\n\nIn the case of the syzbot reproducer the gre0 device is\nalready in state UP when it attempts to add it as a\nport device of team0, this fails but before that\nheader_ops-\u003ecreate of team0 is changed from eth_header to ipgre_header\nin the call to team_dev_type_check_change.\n\nLater when we end up in ipgre_header() struct ip_tunnel* points to nonsense\nas the private data of the device still holds a struct team.\n\nExample sequence of iproute2 commands to reproduce the hang/BUG():\nip link add dev team0 type team\nip link add dev gre0 type gre\nip link set dev gre0 up\nip link set dev gre0 master team0\nip link set dev team0 up\nping -I team0 1.1.1.1\n\nMove team_dev_type_check_change down where all other checks have passed\nas it changes the dev type with no way to restore it in case\none of the checks that follow it fail.\n\nAlso make sure to preserve the origial mtu assignment:\n - If port_dev is not the same type as dev, dev takes mtu from port_dev\n - If port_dev is the same type as dev, port_dev takes mtu from dev\n\nThis is done by adding a conditional before the call to dev_set_mtu\nto prevent it from assigning port_dev-\u003emtu = dev-\u003emtu and instead\nletting team_dev_type_check_change assign dev-\u003emtu = port_dev-\u003emtu.\nThe conditional is needed because the patch moves the call to\nteam_dev_type_check_change past dev_set_mtu.\n\nTesting:\n - team device driver in-tree selftests\n - Add/remove various devices as slaves of team device\n - syzbot",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.290.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-68340",
"url": "https://www.suse.com/security/cve/CVE-2025-68340"
},
{
"category": "external",
"summary": "SUSE Bug 1255507 for CVE-2025-68340",
"url": "https://bugzilla.suse.com/1255507"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.290.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.6,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.290.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-28T14:35:14Z",
"details": "moderate"
}
],
"title": "CVE-2025-68340"
}
]
}
SUSE-SU-2026:20059-1
Vulnerability from csaf_suse - Published: 2026-01-07 10:55 - Updated: 2026-01-07 10:55Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Security update for the Linux Kernel",
"title": "Title of the patch"
},
{
"category": "description",
"text": "\nThe SUSE Linux Enterprise Micro 6.0 and 6.1 RT kernel was updated to receive various security bugfixes.\n\n\nThe following security bugs were fixed:\n\n- CVE-2022-50253: bpf: make sure skb-\u003elen != 0 when redirecting to a tunneling device (bsc#1249912).\n- CVE-2023-53676: scsi: target: iscsi: Fix buffer overflow in lio_target_nacl_info_show() (bsc#1251786).\n- CVE-2025-21710: tcp: correct handling of extreme memory squeeze (bsc#1237888).\n- CVE-2025-37916: pds_core: remove write-after-free of client_id (bsc#1243474).\n- CVE-2025-38359: s390/mm: Fix in_atomic() handling in do_secure_storage_access() (bsc#1247076).\n- CVE-2025-38361: drm/amd/display: Check dce_hwseq before dereferencing it (bsc#1247079).\n- CVE-2025-39788: scsi: ufs: exynos: Fix programming of HCI_UTRL_NEXUS_TYPE (bsc#1249547).\n- CVE-2025-39805: net: macb: fix unregister_netdev call order in macb_remove() (bsc#1249982).\n- CVE-2025-39819: fs/smb: Fix inconsistent refcnt update (bsc#1250176).\n- CVE-2025-39859: ptp: ocp: fix use-after-free bugs causing by ptp_ocp_watchdog (bsc#1250252).\n- CVE-2025-39944: octeontx2-pf: Fix use-after-free bugs in otx2_sync_tstamp() (bsc#1251120).\n- CVE-2025-39980: nexthop: Forbid FDB status change while nexthop is in a group (bsc#1252063).\n- CVE-2025-40001: scsi: mvsas: Fix use-after-free bugs in mvs_work_queue (bsc#1252303).\n- CVE-2025-40021: tracing: dynevent: Add a missing lockdown check on dynevent (bsc#1252681).\n- CVE-2025-40027: net/9p: fix double req put in p9_fd_cancelled (bsc#1252763).\n- CVE-2025-40030: pinctrl: check the return value of pinmux_ops::get_function_name() (bsc#1252773).\n- CVE-2025-40038: KVM: SVM: Skip fastpath emulation on VM-Exit if next RIP isn\u0027t valid (bsc#1252817).\n- CVE-2025-40040: mm/ksm: fix flag-dropping behavior in ksm_madvise (bsc#1252780).\n- CVE-2025-40048: uio_hv_generic: Let userspace take care of interrupt mask (bsc#1252862).\n- CVE-2025-40055: ocfs2: fix double free in user_cluster_connect() (bsc#1252821).\n- CVE-2025-40059: coresight: Fix incorrect handling for return value of devm_kzalloc (bsc#1252809).\n- CVE-2025-40064: smc: Fix use-after-free in __pnet_find_base_ndev() (bsc#1252845).\n- CVE-2025-40070: pps: fix warning in pps_register_cdev when register device fail (bsc#1252836).\n- CVE-2025-40074: net: dst_cache: annotate data-races around dst_cache-\u003ereset_ts (bsc#1252794).\n- CVE-2025-40075: tcp_metrics: use dst_dev_net_rcu() (bsc#1252795).\n- CVE-2025-40083: net/sched: sch_qfq: Fix null-deref in agg_dequeue (bsc#1252912).\n- CVE-2025-40098: ALSA: hda: cs35l41: Fix NULL pointer dereference in cs35l41_get_acpi_mute_state() (bsc#1252917).\n- CVE-2025-40105: vfs: Don\u0027t leak disconnected dentries on umount (bsc#1252928).\n- CVE-2025-40139: smc: Use __sk_dst_get() and dst_dev_rcu() in in smc_clc_prfx_set() (bsc#1253409).\n- CVE-2025-40149: tls: Use __sk_dst_get() and dst_dev_rcu() in get_netdev_for_sock() (bsc#1253355).\n- CVE-2025-40159: xsk: Harden userspace-supplied xdp_desc validation (bsc#1253403).\n- CVE-2025-40168: smc: Use __sk_dst_get() and dst_dev_rcu() in smc_clc_prfx_match() (bsc#1253427).\n- CVE-2025-40169: bpf: Reject negative offsets for ALU ops (bsc#1253416).\n- CVE-2025-40173: net/ip6_tunnel: Prevent perpetual tunnel growth (bsc#1253421).\n- CVE-2025-40176: tls: wait for pending async decryptions if tls_strp_msg_hold fails (bsc#1253425).\n- CVE-2025-40204: sctp: Fix MAC comparison to be constant-time (bsc#1253436).\n- CVE-2025-40206: Add missing bugzilla reference to net fix (bsc#1250237 bsc#1253393).\n\nThe following non-security bugs were fixed:\n\n- ACPI: CPPC: Check _CPC validity for only the online CPUs (git-fixes).\n- ACPI: CPPC: Limit perf ctrs in PCC check only to online CPUs (git-fixes).\n- ACPI: CPPC: Perform fast check switch only for online CPUs (git-fixes).\n- ACPI: PRM: Skip handlers with NULL handler_address or NULL VA (stable-fixes).\n- ACPI: SBS: Fix present test in acpi_battery_read() (git-fixes).\n- ACPI: property: Return present device nodes only on fwnode interface (stable-fixes).\n- ACPI: scan: Add Intel CVS ACPI HIDs to acpi_ignore_dep_ids (stable-fixes).\n- ACPICA: Update dsmethod.c to get rid of unused variable warning (stable-fixes).\n- ACPICA: dispatcher: Use acpi_ds_clear_operands() in acpi_ds_call_control_method() (stable-fixes).\n- ALSA: hda: Fix missing pointer check in hda_component_manager_init function (git-fixes).\n- ALSA: serial-generic: remove shared static buffer (stable-fixes).\n- ALSA: usb-audio: Add validation of UAC2/UAC3 effect units (stable-fixes).\n- ALSA: usb-audio: Fix NULL pointer dereference in snd_usb_mixer_controls_badd (git-fixes).\n- ALSA: usb-audio: Fix potential overflow of PCM transfer buffer (stable-fixes).\n- ALSA: usb-audio: add mono main switch to Presonus S1824c (stable-fixes).\n- ALSA: usb-audio: apply quirk for MOONDROP Quark2 (stable-fixes).\n- ALSA: usb-audio: do not log messages meant for 1810c when initializing 1824c (git-fixes).\n- ALSA: usb-audio: fix uac2 clock source at terminal parser (git-fixes).\n- ASoC: codecs: va-macro: fix resource leak in probe error path (git-fixes).\n- ASoC: cs4271: Fix regulator leak on probe failure (git-fixes).\n- ASoC: max98090/91: fixed max98091 ALSA widget powering up/down (stable-fixes).\n- ASoC: meson: aiu-encoder-i2s: fix bit clock polarity (stable-fixes).\n- ASoC: qcom: sc8280xp: explicitly set S16LE format in sc8280xp_be_hw_params_fixup() (stable-fixes).\n- ASoC: stm32: sai: manage context in set_sysclk callback (stable-fixes).\n- ASoC: tlv320aic3x: Fix class-D initialization for tlv320aic3007 (stable-fixes).\n- Bluetooth: 6lowpan: Do not hold spin lock over sleeping functions (git-fixes).\n- Bluetooth: 6lowpan: add missing l2cap_chan_lock() (git-fixes).\n- Bluetooth: 6lowpan: fix BDADDR_LE vs ADDR_LE_DEV address type confusion (git-fixes).\n- Bluetooth: 6lowpan: reset link-local header on ipv6 recv path (git-fixes).\n- Bluetooth: L2CAP: export l2cap_chan_hold for modules (stable-fixes).\n- Bluetooth: MGMT: cancel mesh send timer when hdev removed (git-fixes).\n- Bluetooth: SCO: Fix UAF on sco_conn_free (stable-fixes).\n- Bluetooth: bcsp: receive data only if registered (stable-fixes).\n- Bluetooth: btrtl: Fix memory leak in rtlbt_parse_firmware_v2() (git-fixes).\n- Bluetooth: btusb: Check for unexpected bytes when defragmenting HCI frames (stable-fixes).\n- Bluetooth: btusb: reorder cleanup in btusb_disconnect to avoid UAF (git-fixes).\n- Bluetooth: hci_event: validate skb length for unknown CC opcode (git-fixes).\n- Documentation: ACPI: i2c-muxes: fix I2C device references (git-fixes).\n- Drivers: hv: vmbus: Add utility function for querying ring size (git-fixes).\n- HID: amd_sfh: Stop sensor before starting (git-fixes).\n- HID: hid-ntrig: Prevent memory leak in ntrig_report_version() (git-fixes).\n- HID: quirks: avoid Cooler Master MM712 dongle wakeup bug (stable-fixes).\n- HID: quirks: work around VID/PID conflict for 0x4c4a/0x4155 (git-fixes).\n- HID: uclogic: Fix potential memory leak in error path (git-fixes).\n- Input: atmel_mxt_ts - allow reset GPIO to sleep (stable-fixes).\n- Input: imx_sc_key - fix memory corruption on unload (git-fixes).\n- Input: pegasus-notetaker - fix potential out-of-bounds access (git-fixes).\n- KVM: Pass new routing entries and irqfd when updating IRTEs (git-fixes).\n- KVM: SVM: Delete IRTE link from previous vCPU before setting new IRTE (git-fixes).\n- KVM: SVM: Delete IRTE link from previous vCPU irrespective of new routing (git-fixes).\n- KVM: SVM: Emulate PERF_CNTR_GLOBAL_STATUS_SET for PerfMonV2 (git-fixes).\n- KVM: SVM: Mark VMCB_LBR dirty when MSR_IA32_DEBUGCTLMSR is updated (git-fixes).\n- KVM: SVM: Re-load current, not host, TSC_AUX on #VMEXIT from SEV-ES guest (git-fixes).\n- KVM: SVM: Track per-vCPU IRTEs using kvm_kernel_irqfd structure (git-fixes).\n- KVM: SVM: WARN if an invalid posted interrupt IRTE entry is added (git-fixes).\n- KVM: VMX: Allow guest to set DEBUGCTL.RTM_DEBUG if RTM is supported (git-fixes).\n- KVM: VMX: Apply MMIO Stale Data mitigation if KVM maps MMIO into the guest (git-fixes).\n- KVM: VMX: Fix check for valid GVA on an EPT violation (git-fixes).\n- KVM: VMX: Preserve host\u0027s DEBUGCTLMSR_FREEZE_IN_SMM while running the guest (git-fixes).\n- KVM: VMX: Wrap all accesses to IA32_DEBUGCTL with getter/setter APIs (git-fixes).\n- KVM: nVMX: Check vmcs12-\u003eguest_ia32_debugctl on nested VM-Enter (git-fixes).\n- KVM: x86/mmu: Locally cache whether a PFN is host MMIO when making a SPTE (git-fixes).\n- KVM: x86: Add helper to retrieve current value of user return MSR (git-fixes).\n- KVM: x86: Convert vcpu_run()\u0027s immediate exit param into a generic bitmap (git-fixes).\n- KVM: x86: Do not treat ENTER and LEAVE as branches, because they are not (git-fixes).\n- KVM: x86: Drop kvm_x86_ops.set_dr6() in favor of a new KVM_RUN flag (git-fixes).\n- NFS4: Fix state renewals missing after boot (git-fixes).\n- NFS: check if suid/sgid was cleared after a write as needed (git-fixes).\n- NFSD: Never cache a COMPOUND when the SEQUENCE operation fails (git-fixes).\n- NFSD: Skip close replay processing if XDR encoding fails (git-fixes).\n- NFSD: free copynotify stateid in nfs4_free_ol_stateid() (git-fixes).\n- NFSv4.1: fix mount hang after CREATE_SESSION failure (git-fixes).\n- NFSv4: handle ERR_GRACE on delegation recalls (git-fixes).\n- PCI/P2PDMA: Fix incorrect pointer usage in devm_kfree() call (stable-fixes).\n- PCI/PM: Skip resuming to D0 if device is disconnected (stable-fixes).\n- PCI: Disable MSI on RDC PCI to PCIe bridges (stable-fixes).\n- PCI: cadence: Check for the existence of cdns_pcie::ops before using it (stable-fixes).\n- PCI: dwc: Verify the single eDMA IRQ in dw_pcie_edma_irq_verify() (stable-fixes).\n- PCI: j721e: Fix incorrect error message in probe() (git-fixes).\n- PCI: rcar-host: Convert struct rcar_msi mask_lock into raw spinlock (git-fixes).\n- PCI: tegra194: Reset BARs when running in PCIe endpoint mode (git-fixes).\n- RDMA/bnxt_re: Do not fail destroy QP and cleanup debugfs earlier (git-fixes)\n- RDMA/bnxt_re: Fix a potential memory leak in destroy_gsi_sqp (git-fixes)\n- RDMA/hns: Fix recv CQ and QP cache affinity (git-fixes)\n- RDMA/hns: Fix the modification of max_send_sge (git-fixes)\n- RDMA/hns: Fix wrong WQE data when QP wraps around (git-fixes)\n- RDMA/irdma: Fix SD index calculation (git-fixes)\n- RDMA/irdma: Set irdma_cq cq_num field during CQ create (git-fixes)\n- Revert \"drm/tegra: dsi: Clear enable register if powered by bootloader\" (git-fixes).\n- Revert \"wifi: ath10k: avoid unnecessary wait for service ready message\" (git-fixes).\n- accel/habanalabs/gaudi2: fix BMON disable configuration (stable-fixes).\n- accel/habanalabs/gaudi2: read preboot status after recovering from dirty state (stable-fixes).\n- accel/habanalabs: return ENOMEM if less than requested pages were pinned (stable-fixes).\n- accel/habanalabs: support mapping cb with vmalloc-backed coherent memory (stable-fixes).\n- acpi,srat: Fix incorrect device handle check for Generic Initiator (git-fixes).\n- amd/amdkfd: resolve a race in amdgpu_amdkfd_device_fini_sw (stable-fixes).\n- block: avoid possible overflow for chunk_sectors check in blk_stack_limits() (git-fixes).\n- block: fix kobject double initialization in add_disk (git-fixes).\n- btrfs: abort transaction on failure to add link to inode (git-fixes).\n- btrfs: avoid page_lockend underflow in btrfs_punch_hole_lock_range() (git-fix).\n- btrfs: avoid using fixed char array size for tree names (git-fix).\n- btrfs: do not update last_log_commit when logging inode due to a new name (git-fixes).\n- btrfs: fix COW handling in run_delalloc_nocow() (git-fix).\n- btrfs: fix inode leak on failure to add link to inode (git-fixes).\n- btrfs: make btrfs_clear_delalloc_extent() free delalloc reserve (git-fix).\n- btrfs: mark dirty extent range for out of bound prealloc extents (git-fixes).\n- btrfs: qgroup: correctly model root qgroup rsv in convert (git-fix).\n- btrfs: rename err to ret in btrfs_link() (git-fixes).\n- btrfs: run btrfs_error_commit_super() early (git-fix).\n- btrfs: scrub: put bio after errors in scrub_raid56_parity_stripe() (git-fix).\n- btrfs: scrub: put bio after errors in scrub_raid56_parity_stripe() (git-fixes).\n- btrfs: send: fix duplicated rmdir operations when using extrefs (git-fixes).\n- btrfs: set inode flag BTRFS_INODE_COPY_EVERYTHING when logging new name (git-fixes).\n- btrfs: simplify error handling logic for btrfs_link() (git-fixes).\n- btrfs: tree-checker: add dev extent item checks (git-fix).\n- btrfs: tree-checker: add type and sequence check for inline backrefs (git-fix).\n- btrfs: tree-checker: fix the wrong output of data backref objectid (git-fix).\n- btrfs: tree-checker: reject BTRFS_FT_UNKNOWN dir type (git-fix).\n- btrfs: tree-checker: validate dref root and objectid (git-fix).\n- btrfs: use smp_mb__after_atomic() when forcing COW in create_pending_snapshot() (git-fixes).\n- char: misc: Does not request module for miscdevice with dynamic minor (stable-fixes).\n- char: misc: Make misc_register() reentry for miscdevice who wants dynamic minor (stable-fixes).\n- char: misc: restrict the dynamic range to exclude reserved minors (stable-fixes).\n- cramfs: Verify inode mode when loading from disk (git-fixes).\n- crypto: aspeed - fix double free caused by devm (git-fixes).\n- crypto: aspeed-acry - Convert to platform remove callback returning void (stable-fixes).\n- crypto: hisilicon/qm - Fix device reference leak in qm_get_qos_value (git-fixes).\n- crypto: iaa - Do not clobber req-\u003ebase.data (git-fixes).\n- crypto: qat - use kcalloc() in qat_uclo_map_objs_from_mof() (stable-fixes).\n- dmaengine: dw-edma: Set status for callback_result (stable-fixes).\n- dmaengine: mv_xor: match alloc_wc and free_wc (stable-fixes).\n- drm/amd/display: Add AVI infoframe copy in copy_stream_update_to_stream (stable-fixes).\n- drm/amd/display: Disable VRR on DCE 6 (stable-fixes).\n- drm/amd/display: Fix DVI-D/HDMI adapters (stable-fixes).\n- drm/amd/display: Fix NULL deref in debugfs odm_combine_segments (git-fixes).\n- drm/amd/display: Fix black screen with HDMI outputs (git-fixes).\n- drm/amd/display: Increase AUX Intra-Hop Done Max Wait Duration (stable-fixes).\n- drm/amd/display: add more cyan skillfish devices (stable-fixes).\n- drm/amd/display: ensure committing streams is seamless (stable-fixes).\n- drm/amd/display: update dpp/disp clock from smu clock table (stable-fixes).\n- drm/amd/pm: Disable MCLK switching on SI at high pixel clocks (stable-fixes).\n- drm/amd/pm: Use cached metrics data on aldebaran (stable-fixes).\n- drm/amd/pm: Use cached metrics data on arcturus (stable-fixes).\n- drm/amd: Avoid evicting resources at S5 (stable-fixes).\n- drm/amd: Fix suspend failure with secure display TA (git-fixes).\n- drm/amd: add more cyan skillfish PCI ids (stable-fixes).\n- drm/amdgpu/jpeg: Hold pg_lock before jpeg poweroff (stable-fixes).\n- drm/amdgpu: Allow kfd CRIU with no buffer objects (stable-fixes).\n- drm/amdgpu: Fix NULL pointer dereference in VRAM logic for APU devices (stable-fixes).\n- drm/amdgpu: Use memdup_array_user in amdgpu_cs_wait_fences_ioctl (stable-fixes).\n- drm/amdgpu: add support for cyan skillfish gpu_info (stable-fixes).\n- drm/amdgpu: do not enable SMU on cyan skillfish (stable-fixes).\n- drm/amdgpu: reject gang submissions under SRIOV (stable-fixes).\n- drm/amdkfd: Handle lack of READ permissions in SVM mapping (stable-fixes).\n- drm/amdkfd: Tie UNMAP_LATENCY to queue_preemption (stable-fixes).\n- drm/amdkfd: fix vram allocation failure for a special case (stable-fixes).\n- drm/amdkfd: return -ENOTTY for unsupported IOCTLs (stable-fixes).\n- drm/bridge: cdns-dsi: Do not fail on MIPI_DSI_MODE_VIDEO_BURST (stable-fixes).\n- drm/bridge: cdns-dsi: Fix REG_WAKEUP_TIME value (stable-fixes).\n- drm/bridge: display-connector: do not set OP_DETECT for DisplayPorts (stable-fixes).\n- drm/i915: Avoid lock inversion when pinning to GGTT on CHV/BXT+VTD (git-fixes).\n- drm/i915: Fix conversion between clock ticks and nanoseconds (git-fixes).\n- drm/msm/dsi/phy: Toggle back buffer resync after preparing PLL (stable-fixes).\n- drm/msm/dsi/phy_7nm: Fix missing initial VCO rate (stable-fixes).\n- drm/msm: make sure to not queue up recovery more than once (stable-fixes).\n- drm/nouveau: replace snprintf() with scnprintf() in nvkm_snprintbf() (stable-fixes).\n- drm/sched: Fix deadlock in drm_sched_entity_kill_jobs_cb (git-fixes).\n- drm/tegra: Add call to put_pid() (git-fixes).\n- drm/tegra: dc: Fix reference leak in tegra_dc_couple() (git-fixes).\n- drm/tidss: Set crtc modesetting parameters with adjusted mode (stable-fixes).\n- drm/tidss: Use the crtc_* timings when programming the HW (stable-fixes).\n- drm/vmwgfx: Validate command header size against SVGA_CMD_MAX_DATASIZE (git-fixes).\n- exfat: limit log print for IO error (git-fixes).\n- extcon: adc-jack: Cleanup wakeup source only if it was enabled (git-fixes).\n- extcon: adc-jack: Fix wakeup source leaks on device unbind (stable-fixes).\n- fbcon: Set fb_display[i]-\u003emode to NULL when the mode is released (stable-fixes).\n- fbdev: Add bounds checking in bit_putcs to fix vmalloc-out-of-bounds (stable-fixes).\n- fbdev: bitblit: bound-check glyph index in bit_putcs* (stable-fixes).\n- fbdev: pvr2fb: Fix leftover reference to ONCHIP_NR_DMA_CHANNELS (stable-fixes).\n- hwmon: (asus-ec-sensors) increase timeout for locking ACPI mutex (stable-fixes).\n- hwmon: (dell-smm) Add support for Dell OptiPlex 7040 (stable-fixes).\n- hwmon: (k10temp) Add device ID for Strix Halo (stable-fixes).\n- hwmon: (k10temp) Add thermal support for AMD Family 1Ah-based models (stable-fixes).\n- hwmon: (sbtsi_temp) AMD CPU extended temperature range support (stable-fixes).\n- hwmon: sy7636a: add alias (stable-fixes).\n- iio: adc: imx93_adc: load calibrated values even calibration failed (stable-fixes).\n- iio: adc: spear_adc: mask SPEAR_ADC_STATUS channel and avg sample before setting register (stable-fixes).\n- ima: do not clear IMA_DIGSIG flag when setting or removing non-IMA xattr (stable-fixes).\n- iommu/amd: Return an error if vCPU affinity is set for non-vCPU IRTE (git-fixes).\n- isdn: mISDN: hfcsusb: fix memory leak in hfcsusb_probe() (git-fixes).\n- jfs: Verify inode mode when loading from disk (git-fixes).\n- jfs: fix uninitialized waitqueue in transaction manager (git-fixes).\n- kABI fix for KVM: VMX: Apply MMIO Stale Data mitigation if KVM maps MMIO into the guest (git-fixes) (git-fixes).\n- lib/crypto: curve25519-hacl64: Fix older clang KASAN workaround for GCC (git-fixes).\n- md/raid1: fix data lost for writemostly rdev (git-fixes).\n- md: fix mssing blktrace bio split events (git-fixes).\n- media: adv7180: Add missing lock in suspend callback (stable-fixes).\n- media: adv7180: Do not write format to device in set_fmt (stable-fixes).\n- media: adv7180: Only validate format in querystd (stable-fixes).\n- media: amphion: Delete v4l2_fh synchronously in .release() (stable-fixes).\n- media: fix uninitialized symbol warnings (stable-fixes).\n- media: i2c: Kconfig: Ensure a dependency on HAVE_CLK for VIDEO_CAMERA_SENSOR (stable-fixes).\n- media: i2c: og01a1b: Specify monochrome media bus format instead of Bayer (stable-fixes).\n- media: imon: make send_packet() more robust (stable-fixes).\n- media: ov08x40: Fix the horizontal flip control (stable-fixes).\n- media: redrat3: use int type to store negative error codes (stable-fixes).\n- media: uvcvideo: Use heuristic to find stream entity (git-fixes).\n- memstick: Add timeout to prevent indefinite waiting (stable-fixes).\n- mfd: da9063: Split chip variant reading in two bus transactions (stable-fixes).\n- mfd: madera: Work around false-positive -Wininitialized warning (stable-fixes).\n- mfd: stmpe-i2c: Add missing MODULE_LICENSE (stable-fixes).\n- mfd: stmpe: Remove IRQ domain upon removal (stable-fixes).\n- minixfs: Verify inode mode when loading from disk (git-fixes).\n- mm/mm_init: fix hash table order logging in alloc_large_system_hash() (git-fixes).\n- mm/secretmem: fix use-after-free race in fault handler (git-fixes).\n- mmc: host: renesas_sdhi: Fix the actual clock (stable-fixes).\n- mmc: sdhci-msm: Enable tuning for SDR50 mode for SD card (stable-fixes).\n- mmc: sdhci-of-dwcmshc: Change DLL_STRBIN_TAPNUM_DEFAULT to 0x4 (git-fixes).\n- mtd: onenand: Pass correct pointer to IRQ handler (git-fixes).\n- mtd: rawnand: cadence: fix DMA device NULL pointer dereference (git-fixes).\n- mtdchar: fix integer overflow in read/write ioctls (git-fixes).\n- net/mana: fix warning in the writer of client oob (git-fixes).\n- net/smc: Remove validation of reserved bits in CLC Decline message (bsc#1253779).\n- net: nfc: nci: Increase NCI_DATA_TIMEOUT to 3000 ms (stable-fixes).\n- net: phy: clear link parameters on admin link down (stable-fixes).\n- net: phy: fixed_phy: let fixed_phy_unregister free the phy_device (stable-fixes).\n- net: phy: marvell: Fix 88e1510 downshift counter errata (stable-fixes).\n- net: tcp: send zero-window ACK when no memory (bsc#1253779).\n- net: usb: qmi_wwan: initialize MAC header offset in qmimux_rx_fixup (git-fixes).\n- nfs4_setup_readdir(): insufficient locking for -\u003ed_parent-\u003ed_inode dereferencing (git-fixes).\n- nfsd: do not defer requests during idmap lookup in v4 compound decode (bsc#1232223).\n- nfsd: fix return error codes for nfsd_map_name_to_id (bsc#1232223).\n- nouveau/firmware: Add missing kfree() of nvkm_falcon_fw::boot (git-fixes).\n- perf script: add --addr2line option (bsc#1247509).\n- phy: cadence: cdns-dphy: Enable lower resolutions in dphy (stable-fixes).\n- phy: renesas: r8a779f0-ether-serdes: add new step added to latest datasheet (stable-fixes).\n- phy: rockchip: phy-rockchip-inno-csidphy: allow writes to grf register 0 (stable-fixes).\n- pinctrl: s32cc: fix uninitialized memory in s32_pinctrl_desc (git-fixes).\n- pinctrl: s32cc: initialize gpio_pin_config::list after kmalloc() (git-fixes).\n- pinctrl: single: fix bias pull up/down handling in pin_config_set (stable-fixes).\n- platform/x86/intel/speed_select_if: Convert PCIBIOS_* return codes to errnos (git-fixes).\n- power: supply: qcom_battmgr: add OOI chemistry (stable-fixes).\n- power: supply: qcom_battmgr: handle charging state change notifications (stable-fixes).\n- power: supply: sbs-charger: Support multiple devices (stable-fixes).\n- regulator: fixed: fix GPIO descriptor leak on register failure (git-fixes).\n- rtc: rx8025: fix incorrect register reference (git-fixes).\n- s390/mm,fault: simplify kfence fault handling (bsc#1247076).\n- scsi: Fix sas_user_scan() to handle wildcard and multi-channel scans (git-fixes).\n- scsi: aacraid: Stop using PCI_IRQ_AFFINITY (git-fixes).\n- scsi: core: sysfs: Correct sysfs attributes access rights (git-fixes).\n- scsi: hpsa: Fix potential memory leak in hpsa_big_passthru_ioctl() (git-fixes).\n- scsi: libfc: Prevent integer overflow in fc_fcp_recv_data() (git-fixes).\n- scsi: mpi3mr: Correctly handle ATA device errors (git-fixes).\n- scsi: mpi3mr: Drop unnecessary volatile from __iomem pointers (git-fixes).\n- scsi: mpt3sas: Correctly handle ATA device errors (git-fixes).\n- scsi: mpt3sas: Fix crash in transport port remove by using ioc_info() (git-fixes).\n- scsi: pm80xx: Fix array-index-out-of-of-bounds on rmmod (git-fixes).\n- scsi: storvsc: Prefer returning channel with the same CPU as on the I/O issuing CPU (bsc#1252267).\n- selftests/bpf: Close fd in error path in drop_on_reuseport (git-fixes).\n- selftests/bpf: Close obj in error path in xdp_adjust_tail (git-fixes).\n- selftests/bpf: Fix missing ARRAY_SIZE() definition in bench.c (git-fixes).\n- selftests/bpf: Fix missing BUILD_BUG_ON() declaration (git-fixes).\n- selftests/bpf: Fix missing UINT_MAX definitions in benchmarks (git-fixes).\n- selftests/bpf: Fix string read in strncmp benchmark (git-fixes).\n- selftests/bpf: Use pid_t consistently in test_progs.c (git-fixes).\n- selftests/bpf: fix signedness bug in redir_partial() (git-fixes).\n- serial: 8250_exar: add support for Advantech 2 port card with Device ID 0x0018 (git-fixes).\n- serial: 8250_mtk: Enable baud clock and manage in runtime PM (git-fixes).\n- soc/tegra: fuse: Add Tegra114 nvmem cells and fuse lookups (stable-fixes).\n- soc: aspeed: socinfo: Add AST27xx silicon IDs (stable-fixes).\n- soc: qcom: smem: Fix endian-unaware access of num_entries (stable-fixes).\n- spi: Try to get ACPI GPIO IRQ earlier (git-fixes).\n- spi: loopback-test: Do not use %pK through printk (stable-fixes).\n- spi: rpc-if: Add resume support for RZ/G3E (stable-fixes).\n- strparser: Fix signed/unsigned mismatch bug (git-fixes).\n- tcp_bpf: Call sk_msg_free() when tcp_bpf_send_verdict() fails to allocate psock-\u003ecork (bsc#1250705).\n- thunderbolt: Use is_pciehp instead of is_hotplug_bridge (stable-fixes).\n- tools/cpupower: Fix incorrect size in cpuidle_state_disable() (stable-fixes).\n- tools/cpupower: fix error return value in cpupower_write_sysfs() (stable-fixes).\n- tools/power x86_energy_perf_policy: Enhance HWP enable (stable-fixes).\n- tools/power x86_energy_perf_policy: Fix incorrect fopen mode usage (stable-fixes).\n- tools/power x86_energy_perf_policy: Prefer driver HWP limits (stable-fixes).\n- tools: lib: thermal: do not preserve owner in install (stable-fixes).\n- tools: lib: thermal: use pkg-config to locate libnl3 (stable-fixes).\n- uio_hv_generic: Query the ringbuffer size for device (git-fixes).\n- usb/core/quirks: Add Huawei ME906S to wakeup quirk (git-fixes).\n- usb: cdns3: gadget: Use-after-free during failed initialization and exit of cdnsp gadget (stable-fixes).\n- usb: gadget: f_fs: Fix epfile null pointer access after ep enable (stable-fixes).\n- usb: gadget: f_hid: Fix zero length packet transfer (stable-fixes).\n- usb: gadget: f_ncm: Fix MAC assignment NCM ethernet (stable-fixes).\n- usb: mon: Increase BUFF_MAX to 64 MiB to support multi-MB URBs (stable-fixes).\n- usb: xhci: plat: Facilitate using autosuspend for xhci plat devices (stable-fixes).\n- video: backlight: lp855x_bl: Set correct EPROM start for LP8556 (stable-fixes).\n- watchdog: s3c2410_wdt: Fix max_timeout being calculated larger (stable-fixes).\n- wifi: ath10k: Fix connection after GTK rekeying (stable-fixes).\n- wifi: ath11k: zero init info-\u003estatus in wmi_process_mgmt_tx_comp() (git-fixes).\n- wifi: ath12k: Increase DP_REO_CMD_RING_SIZE to 256 (stable-fixes).\n- wifi: mac80211: Fix HE capabilities element check (stable-fixes).\n- wifi: mac80211: reject address change while connecting (git-fixes).\n- wifi: mac80211: skip rate verification for not captured PSDUs (git-fixes).\n- wifi: mac80211_hwsim: Limit destroy_on_close radio removal to netgroup (git-fixes).\n- wifi: mt76: mt7921: Add 160MHz beamformee capability for mt7922 device (stable-fixes).\n- wifi: mt76: mt7996: Temporarily disable EPCS (stable-fixes).\n- wifi: mwl8k: inject DSSS Parameter Set element into beacons if missing (git-fixes).\n- wifi: rtw88: sdio: use indirect IO for device registers before power-on (stable-fixes).\n- wifi: zd1211rw: fix potential memory leak in __zd_usb_enable_rx() (git-fixes).\n- x86/CPU/AMD: Add RDSEED fix for Zen5 (git-fixes).\n- x86/CPU/AMD: Add additional fixed RDSEED microcode revisions (git-fixes).\n- x86/CPU/AMD: Add missing terminator for zen5_rdseed_microcode (git-fixes).\n- x86/CPU/AMD: Do the common init on future Zens too (git-fixes).\n- x86/amd_nb: Add new PCI IDs for AMD family 0x1a (stable-fixes).\n- x86/bugs: Fix reporting of LFENCE retpoline (git-fixes).\n- x86/bugs: Report correct retbleed mitigation status (git-fixes).\n- x86/vmscape: Add old Intel CPUs to affected list (git-fixes).\n- xhci: dbc: Allow users to modify DbC poll interval via sysfs (stable-fixes).\n- xhci: dbc: Avoid event polling busyloop if pending rx transfers are inactive (git-fixes).\n- xhci: dbc: Improve performance by removing delay in transfer event polling (stable-fixes).\n- xhci: dbc: fix bogus 1024 byte prefix if ttyDBC read races with stall event (git-fixes).\n- xhci: dbc: poll at different rate depending on data transfer activity (stable-fixes).\n",
"title": "Description of the patch"
},
{
"category": "details",
"text": "SUSE-SLE-Micro-6.1-kernel-230",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2026_20059-1.json"
},
{
"category": "self",
"summary": "URL for SUSE-SU-2026:20059-1",
"url": "https://www.suse.com/support/update/announcement/2026/suse-su-202620059-1/"
},
{
"category": "self",
"summary": "E-Mail link for SUSE-SU-2026:20059-1",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-January/023751.html"
},
{
"category": "self",
"summary": "SUSE Bug 1232223",
"url": "https://bugzilla.suse.com/1232223"
},
{
"category": "self",
"summary": "SUSE Bug 1237888",
"url": "https://bugzilla.suse.com/1237888"
},
{
"category": "self",
"summary": "SUSE Bug 1243474",
"url": "https://bugzilla.suse.com/1243474"
},
{
"category": "self",
"summary": "SUSE Bug 1245193",
"url": "https://bugzilla.suse.com/1245193"
},
{
"category": "self",
"summary": "SUSE Bug 1247076",
"url": "https://bugzilla.suse.com/1247076"
},
{
"category": "self",
"summary": "SUSE Bug 1247079",
"url": "https://bugzilla.suse.com/1247079"
},
{
"category": "self",
"summary": "SUSE Bug 1247500",
"url": "https://bugzilla.suse.com/1247500"
},
{
"category": "self",
"summary": "SUSE Bug 1247509",
"url": "https://bugzilla.suse.com/1247509"
},
{
"category": "self",
"summary": "SUSE Bug 1249547",
"url": "https://bugzilla.suse.com/1249547"
},
{
"category": "self",
"summary": "SUSE Bug 1249912",
"url": "https://bugzilla.suse.com/1249912"
},
{
"category": "self",
"summary": "SUSE Bug 1249982",
"url": "https://bugzilla.suse.com/1249982"
},
{
"category": "self",
"summary": "SUSE Bug 1250176",
"url": "https://bugzilla.suse.com/1250176"
},
{
"category": "self",
"summary": "SUSE Bug 1250237",
"url": "https://bugzilla.suse.com/1250237"
},
{
"category": "self",
"summary": "SUSE Bug 1250252",
"url": "https://bugzilla.suse.com/1250252"
},
{
"category": "self",
"summary": "SUSE Bug 1250705",
"url": "https://bugzilla.suse.com/1250705"
},
{
"category": "self",
"summary": "SUSE Bug 1251120",
"url": "https://bugzilla.suse.com/1251120"
},
{
"category": "self",
"summary": "SUSE Bug 1251786",
"url": "https://bugzilla.suse.com/1251786"
},
{
"category": "self",
"summary": "SUSE Bug 1252063",
"url": "https://bugzilla.suse.com/1252063"
},
{
"category": "self",
"summary": "SUSE Bug 1252267",
"url": "https://bugzilla.suse.com/1252267"
},
{
"category": "self",
"summary": "SUSE Bug 1252303",
"url": "https://bugzilla.suse.com/1252303"
},
{
"category": "self",
"summary": "SUSE Bug 1252353",
"url": "https://bugzilla.suse.com/1252353"
},
{
"category": "self",
"summary": "SUSE Bug 1252681",
"url": "https://bugzilla.suse.com/1252681"
},
{
"category": "self",
"summary": "SUSE Bug 1252763",
"url": "https://bugzilla.suse.com/1252763"
},
{
"category": "self",
"summary": "SUSE Bug 1252773",
"url": "https://bugzilla.suse.com/1252773"
},
{
"category": "self",
"summary": "SUSE Bug 1252780",
"url": "https://bugzilla.suse.com/1252780"
},
{
"category": "self",
"summary": "SUSE Bug 1252794",
"url": "https://bugzilla.suse.com/1252794"
},
{
"category": "self",
"summary": "SUSE Bug 1252795",
"url": "https://bugzilla.suse.com/1252795"
},
{
"category": "self",
"summary": "SUSE Bug 1252809",
"url": "https://bugzilla.suse.com/1252809"
},
{
"category": "self",
"summary": "SUSE Bug 1252817",
"url": "https://bugzilla.suse.com/1252817"
},
{
"category": "self",
"summary": "SUSE Bug 1252821",
"url": "https://bugzilla.suse.com/1252821"
},
{
"category": "self",
"summary": "SUSE Bug 1252836",
"url": "https://bugzilla.suse.com/1252836"
},
{
"category": "self",
"summary": "SUSE Bug 1252845",
"url": "https://bugzilla.suse.com/1252845"
},
{
"category": "self",
"summary": "SUSE Bug 1252862",
"url": "https://bugzilla.suse.com/1252862"
},
{
"category": "self",
"summary": "SUSE Bug 1252912",
"url": "https://bugzilla.suse.com/1252912"
},
{
"category": "self",
"summary": "SUSE Bug 1252917",
"url": "https://bugzilla.suse.com/1252917"
},
{
"category": "self",
"summary": "SUSE Bug 1252928",
"url": "https://bugzilla.suse.com/1252928"
},
{
"category": "self",
"summary": "SUSE Bug 1253018",
"url": "https://bugzilla.suse.com/1253018"
},
{
"category": "self",
"summary": "SUSE Bug 1253176",
"url": "https://bugzilla.suse.com/1253176"
},
{
"category": "self",
"summary": "SUSE Bug 1253275",
"url": "https://bugzilla.suse.com/1253275"
},
{
"category": "self",
"summary": "SUSE Bug 1253318",
"url": "https://bugzilla.suse.com/1253318"
},
{
"category": "self",
"summary": "SUSE Bug 1253324",
"url": "https://bugzilla.suse.com/1253324"
},
{
"category": "self",
"summary": "SUSE Bug 1253349",
"url": "https://bugzilla.suse.com/1253349"
},
{
"category": "self",
"summary": "SUSE Bug 1253352",
"url": "https://bugzilla.suse.com/1253352"
},
{
"category": "self",
"summary": "SUSE Bug 1253355",
"url": "https://bugzilla.suse.com/1253355"
},
{
"category": "self",
"summary": "SUSE Bug 1253360",
"url": "https://bugzilla.suse.com/1253360"
},
{
"category": "self",
"summary": "SUSE Bug 1253362",
"url": "https://bugzilla.suse.com/1253362"
},
{
"category": "self",
"summary": "SUSE Bug 1253363",
"url": "https://bugzilla.suse.com/1253363"
},
{
"category": "self",
"summary": "SUSE Bug 1253367",
"url": "https://bugzilla.suse.com/1253367"
},
{
"category": "self",
"summary": "SUSE Bug 1253369",
"url": "https://bugzilla.suse.com/1253369"
},
{
"category": "self",
"summary": "SUSE Bug 1253393",
"url": "https://bugzilla.suse.com/1253393"
},
{
"category": "self",
"summary": "SUSE Bug 1253395",
"url": "https://bugzilla.suse.com/1253395"
},
{
"category": "self",
"summary": "SUSE Bug 1253403",
"url": "https://bugzilla.suse.com/1253403"
},
{
"category": "self",
"summary": "SUSE Bug 1253407",
"url": "https://bugzilla.suse.com/1253407"
},
{
"category": "self",
"summary": "SUSE Bug 1253409",
"url": "https://bugzilla.suse.com/1253409"
},
{
"category": "self",
"summary": "SUSE Bug 1253412",
"url": "https://bugzilla.suse.com/1253412"
},
{
"category": "self",
"summary": "SUSE Bug 1253416",
"url": "https://bugzilla.suse.com/1253416"
},
{
"category": "self",
"summary": "SUSE Bug 1253421",
"url": "https://bugzilla.suse.com/1253421"
},
{
"category": "self",
"summary": "SUSE Bug 1253423",
"url": "https://bugzilla.suse.com/1253423"
},
{
"category": "self",
"summary": "SUSE Bug 1253424",
"url": "https://bugzilla.suse.com/1253424"
},
{
"category": "self",
"summary": "SUSE Bug 1253425",
"url": "https://bugzilla.suse.com/1253425"
},
{
"category": "self",
"summary": "SUSE Bug 1253427",
"url": "https://bugzilla.suse.com/1253427"
},
{
"category": "self",
"summary": "SUSE Bug 1253428",
"url": "https://bugzilla.suse.com/1253428"
},
{
"category": "self",
"summary": "SUSE Bug 1253431",
"url": "https://bugzilla.suse.com/1253431"
},
{
"category": "self",
"summary": "SUSE Bug 1253436",
"url": "https://bugzilla.suse.com/1253436"
},
{
"category": "self",
"summary": "SUSE Bug 1253438",
"url": "https://bugzilla.suse.com/1253438"
},
{
"category": "self",
"summary": "SUSE Bug 1253440",
"url": "https://bugzilla.suse.com/1253440"
},
{
"category": "self",
"summary": "SUSE Bug 1253441",
"url": "https://bugzilla.suse.com/1253441"
},
{
"category": "self",
"summary": "SUSE Bug 1253445",
"url": "https://bugzilla.suse.com/1253445"
},
{
"category": "self",
"summary": "SUSE Bug 1253448",
"url": "https://bugzilla.suse.com/1253448"
},
{
"category": "self",
"summary": "SUSE Bug 1253449",
"url": "https://bugzilla.suse.com/1253449"
},
{
"category": "self",
"summary": "SUSE Bug 1253453",
"url": "https://bugzilla.suse.com/1253453"
},
{
"category": "self",
"summary": "SUSE Bug 1253456",
"url": "https://bugzilla.suse.com/1253456"
},
{
"category": "self",
"summary": "SUSE Bug 1253472",
"url": "https://bugzilla.suse.com/1253472"
},
{
"category": "self",
"summary": "SUSE Bug 1253779",
"url": "https://bugzilla.suse.com/1253779"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-50253 page",
"url": "https://www.suse.com/security/cve/CVE-2022-50253/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2023-53676 page",
"url": "https://www.suse.com/security/cve/CVE-2023-53676/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-21710 page",
"url": "https://www.suse.com/security/cve/CVE-2025-21710/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-37916 page",
"url": "https://www.suse.com/security/cve/CVE-2025-37916/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-38359 page",
"url": "https://www.suse.com/security/cve/CVE-2025-38359/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-38361 page",
"url": "https://www.suse.com/security/cve/CVE-2025-38361/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-39788 page",
"url": "https://www.suse.com/security/cve/CVE-2025-39788/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-39805 page",
"url": "https://www.suse.com/security/cve/CVE-2025-39805/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-39819 page",
"url": "https://www.suse.com/security/cve/CVE-2025-39819/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-39859 page",
"url": "https://www.suse.com/security/cve/CVE-2025-39859/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-39944 page",
"url": "https://www.suse.com/security/cve/CVE-2025-39944/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-39980 page",
"url": "https://www.suse.com/security/cve/CVE-2025-39980/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40001 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40001/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40021 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40021/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40027 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40027/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40030 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40030/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40038 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40038/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40040 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40040/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40048 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40048/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40055 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40055/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40059 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40059/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40064 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40064/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40070 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40070/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40074 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40074/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40075 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40075/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40083 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40083/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40098 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40098/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40105 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40105/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40107 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40107/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40109 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40109/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40110 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40110/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40111 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40111/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40115 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40115/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40116 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40116/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40118 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40118/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40120 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40120/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40121 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40121/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40127 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40127/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40129 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40129/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40139 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40139/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40140 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40140/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40141 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40141/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40149 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40149/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40154 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40154/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40156 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40156/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40157 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40157/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40159 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40159/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40164 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40164/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40168 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40168/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40169 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40169/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40171 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40171/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40172 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40172/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40173 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40173/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40176 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40176/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40180 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40180/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40183 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40183/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40186 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40186/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40188 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40188/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40194 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40194/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40198 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40198/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40200 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40200/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40204 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40204/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40205 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40205/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40206 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40206/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40207 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40207/"
}
],
"title": "Security update for the Linux Kernel",
"tracking": {
"current_release_date": "2026-01-07T10:55:44Z",
"generator": {
"date": "2026-01-07T10:55:44Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "SUSE-SU-2026:20059-1",
"initial_release_date": "2026-01-07T10:55:44Z",
"revision_history": [
{
"date": "2026-01-07T10:55:44Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "kernel-rt-6.4.0-39.1.aarch64",
"product": {
"name": "kernel-rt-6.4.0-39.1.aarch64",
"product_id": "kernel-rt-6.4.0-39.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-rt-devel-6.4.0-39.1.aarch64",
"product": {
"name": "kernel-rt-devel-6.4.0-39.1.aarch64",
"product_id": "kernel-rt-devel-6.4.0-39.1.aarch64"
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-devel-rt-6.4.0-39.1.noarch",
"product": {
"name": "kernel-devel-rt-6.4.0-39.1.noarch",
"product_id": "kernel-devel-rt-6.4.0-39.1.noarch"
}
},
{
"category": "product_version",
"name": "kernel-source-rt-6.4.0-39.1.noarch",
"product": {
"name": "kernel-source-rt-6.4.0-39.1.noarch",
"product_id": "kernel-source-rt-6.4.0-39.1.noarch"
}
}
],
"category": "architecture",
"name": "noarch"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-rt-6.4.0-39.1.x86_64",
"product": {
"name": "kernel-rt-6.4.0-39.1.x86_64",
"product_id": "kernel-rt-6.4.0-39.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-rt-devel-6.4.0-39.1.x86_64",
"product": {
"name": "kernel-rt-devel-6.4.0-39.1.x86_64",
"product_id": "kernel-rt-devel-6.4.0-39.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-rt-livepatch-6.4.0-39.1.x86_64",
"product": {
"name": "kernel-rt-livepatch-6.4.0-39.1.x86_64",
"product_id": "kernel-rt-livepatch-6.4.0-39.1.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "SUSE Linux Micro 6.1",
"product": {
"name": "SUSE Linux Micro 6.1",
"product_id": "SUSE Linux Micro 6.1",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sl-micro:6.1"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-rt-6.4.0-39.1.noarch as component of SUSE Linux Micro 6.1",
"product_id": "SUSE Linux Micro 6.1:kernel-devel-rt-6.4.0-39.1.noarch"
},
"product_reference": "kernel-devel-rt-6.4.0-39.1.noarch",
"relates_to_product_reference": "SUSE Linux Micro 6.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-6.4.0-39.1.aarch64 as component of SUSE Linux Micro 6.1",
"product_id": "SUSE Linux Micro 6.1:kernel-rt-6.4.0-39.1.aarch64"
},
"product_reference": "kernel-rt-6.4.0-39.1.aarch64",
"relates_to_product_reference": "SUSE Linux Micro 6.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-6.4.0-39.1.x86_64 as component of SUSE Linux Micro 6.1",
"product_id": "SUSE Linux Micro 6.1:kernel-rt-6.4.0-39.1.x86_64"
},
"product_reference": "kernel-rt-6.4.0-39.1.x86_64",
"relates_to_product_reference": "SUSE Linux Micro 6.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-devel-6.4.0-39.1.aarch64 as component of SUSE Linux Micro 6.1",
"product_id": "SUSE Linux Micro 6.1:kernel-rt-devel-6.4.0-39.1.aarch64"
},
"product_reference": "kernel-rt-devel-6.4.0-39.1.aarch64",
"relates_to_product_reference": "SUSE Linux Micro 6.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-devel-6.4.0-39.1.x86_64 as component of SUSE Linux Micro 6.1",
"product_id": "SUSE Linux Micro 6.1:kernel-rt-devel-6.4.0-39.1.x86_64"
},
"product_reference": "kernel-rt-devel-6.4.0-39.1.x86_64",
"relates_to_product_reference": "SUSE Linux Micro 6.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-livepatch-6.4.0-39.1.x86_64 as component of SUSE Linux Micro 6.1",
"product_id": "SUSE Linux Micro 6.1:kernel-rt-livepatch-6.4.0-39.1.x86_64"
},
"product_reference": "kernel-rt-livepatch-6.4.0-39.1.x86_64",
"relates_to_product_reference": "SUSE Linux Micro 6.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-source-rt-6.4.0-39.1.noarch as component of SUSE Linux Micro 6.1",
"product_id": "SUSE Linux Micro 6.1:kernel-source-rt-6.4.0-39.1.noarch"
},
"product_reference": "kernel-source-rt-6.4.0-39.1.noarch",
"relates_to_product_reference": "SUSE Linux Micro 6.1"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2022-50253",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-50253"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nbpf: make sure skb-\u003elen != 0 when redirecting to a tunneling device\n\nsyzkaller managed to trigger another case where skb-\u003elen == 0\nwhen we enter __dev_queue_xmit:\n\nWARNING: CPU: 0 PID: 2470 at include/linux/skbuff.h:2576 skb_assert_len include/linux/skbuff.h:2576 [inline]\nWARNING: CPU: 0 PID: 2470 at include/linux/skbuff.h:2576 __dev_queue_xmit+0x2069/0x35e0 net/core/dev.c:4295\n\nCall Trace:\n dev_queue_xmit+0x17/0x20 net/core/dev.c:4406\n __bpf_tx_skb net/core/filter.c:2115 [inline]\n __bpf_redirect_no_mac net/core/filter.c:2140 [inline]\n __bpf_redirect+0x5fb/0xda0 net/core/filter.c:2163\n ____bpf_clone_redirect net/core/filter.c:2447 [inline]\n bpf_clone_redirect+0x247/0x390 net/core/filter.c:2419\n bpf_prog_48159a89cb4a9a16+0x59/0x5e\n bpf_dispatcher_nop_func include/linux/bpf.h:897 [inline]\n __bpf_prog_run include/linux/filter.h:596 [inline]\n bpf_prog_run include/linux/filter.h:603 [inline]\n bpf_test_run+0x46c/0x890 net/bpf/test_run.c:402\n bpf_prog_test_run_skb+0xbdc/0x14c0 net/bpf/test_run.c:1170\n bpf_prog_test_run+0x345/0x3c0 kernel/bpf/syscall.c:3648\n __sys_bpf+0x43a/0x6c0 kernel/bpf/syscall.c:5005\n __do_sys_bpf kernel/bpf/syscall.c:5091 [inline]\n __se_sys_bpf kernel/bpf/syscall.c:5089 [inline]\n __x64_sys_bpf+0x7c/0x90 kernel/bpf/syscall.c:5089\n do_syscall_64+0x54/0x70 arch/x86/entry/common.c:48\n entry_SYSCALL_64_after_hwframe+0x61/0xc6\n\nThe reproducer doesn\u0027t really reproduce outside of syzkaller\nenvironment, so I\u0027m taking a guess here. It looks like we\ndo generate correct ETH_HLEN-sized packet, but we redirect\nthe packet to the tunneling device. Before we do so, we\n__skb_pull l2 header and arrive again at skb-\u003elen == 0.\nDoesn\u0027t seem like we can do anything better than having\nan explicit check after __skb_pull?",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.1:kernel-devel-rt-6.4.0-39.1.noarch",
"SUSE Linux Micro 6.1:kernel-rt-6.4.0-39.1.aarch64",
"SUSE Linux Micro 6.1:kernel-rt-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.1:kernel-rt-devel-6.4.0-39.1.aarch64",
"SUSE Linux Micro 6.1:kernel-rt-devel-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.1:kernel-rt-livepatch-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.1:kernel-source-rt-6.4.0-39.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-50253",
"url": "https://www.suse.com/security/cve/CVE-2022-50253"
},
{
"category": "external",
"summary": "SUSE Bug 1249912 for CVE-2022-50253",
"url": "https://bugzilla.suse.com/1249912"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.1:kernel-devel-rt-6.4.0-39.1.noarch",
"SUSE Linux Micro 6.1:kernel-rt-6.4.0-39.1.aarch64",
"SUSE Linux Micro 6.1:kernel-rt-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.1:kernel-rt-devel-6.4.0-39.1.aarch64",
"SUSE Linux Micro 6.1:kernel-rt-devel-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.1:kernel-rt-livepatch-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.1:kernel-source-rt-6.4.0-39.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.1:kernel-devel-rt-6.4.0-39.1.noarch",
"SUSE Linux Micro 6.1:kernel-rt-6.4.0-39.1.aarch64",
"SUSE Linux Micro 6.1:kernel-rt-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.1:kernel-rt-devel-6.4.0-39.1.aarch64",
"SUSE Linux Micro 6.1:kernel-rt-devel-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.1:kernel-rt-livepatch-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.1:kernel-source-rt-6.4.0-39.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-07T10:55:44Z",
"details": "moderate"
}
],
"title": "CVE-2022-50253"
},
{
"cve": "CVE-2023-53676",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2023-53676"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nscsi: target: iscsi: Fix buffer overflow in lio_target_nacl_info_show()\n\nThe function lio_target_nacl_info_show() uses sprintf() in a loop to print\ndetails for every iSCSI connection in a session without checking for the\nbuffer length. With enough iSCSI connections it\u0027s possible to overflow the\nbuffer provided by configfs and corrupt the memory.\n\nThis patch replaces sprintf() with sysfs_emit_at() that checks for buffer\nboundries.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.1:kernel-devel-rt-6.4.0-39.1.noarch",
"SUSE Linux Micro 6.1:kernel-rt-6.4.0-39.1.aarch64",
"SUSE Linux Micro 6.1:kernel-rt-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.1:kernel-rt-devel-6.4.0-39.1.aarch64",
"SUSE Linux Micro 6.1:kernel-rt-devel-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.1:kernel-rt-livepatch-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.1:kernel-source-rt-6.4.0-39.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2023-53676",
"url": "https://www.suse.com/security/cve/CVE-2023-53676"
},
{
"category": "external",
"summary": "SUSE Bug 1251786 for CVE-2023-53676",
"url": "https://bugzilla.suse.com/1251786"
},
{
"category": "external",
"summary": "SUSE Bug 1251787 for CVE-2023-53676",
"url": "https://bugzilla.suse.com/1251787"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.1:kernel-devel-rt-6.4.0-39.1.noarch",
"SUSE Linux Micro 6.1:kernel-rt-6.4.0-39.1.aarch64",
"SUSE Linux Micro 6.1:kernel-rt-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.1:kernel-rt-devel-6.4.0-39.1.aarch64",
"SUSE Linux Micro 6.1:kernel-rt-devel-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.1:kernel-rt-livepatch-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.1:kernel-source-rt-6.4.0-39.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.1:kernel-devel-rt-6.4.0-39.1.noarch",
"SUSE Linux Micro 6.1:kernel-rt-6.4.0-39.1.aarch64",
"SUSE Linux Micro 6.1:kernel-rt-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.1:kernel-rt-devel-6.4.0-39.1.aarch64",
"SUSE Linux Micro 6.1:kernel-rt-devel-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.1:kernel-rt-livepatch-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.1:kernel-source-rt-6.4.0-39.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-07T10:55:44Z",
"details": "important"
}
],
"title": "CVE-2023-53676"
},
{
"cve": "CVE-2025-21710",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-21710"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\ntcp: correct handling of extreme memory squeeze\n\nTesting with iperf3 using the \"pasta\" protocol splicer has revealed\na problem in the way tcp handles window advertising in extreme memory\nsqueeze situations.\n\nUnder memory pressure, a socket endpoint may temporarily advertise\na zero-sized window, but this is not stored as part of the socket data.\nThe reasoning behind this is that it is considered a temporary setting\nwhich shouldn\u0027t influence any further calculations.\n\nHowever, if we happen to stall at an unfortunate value of the current\nwindow size, the algorithm selecting a new value will consistently fail\nto advertise a non-zero window once we have freed up enough memory.\nThis means that this side\u0027s notion of the current window size is\ndifferent from the one last advertised to the peer, causing the latter\nto not send any data to resolve the sitution.\n\nThe problem occurs on the iperf3 server side, and the socket in question\nis a completely regular socket with the default settings for the\nfedora40 kernel. We do not use SO_PEEK or SO_RCVBUF on the socket.\n\nThe following excerpt of a logging session, with own comments added,\nshows more in detail what is happening:\n\n// tcp_v4_rcv(-\u003e)\n// tcp_rcv_established(-\u003e)\n[5201\u003c-\u003e39222]: ==== Activating log @ net/ipv4/tcp_input.c/tcp_data_queue()/5257 ====\n[5201\u003c-\u003e39222]: tcp_data_queue(-\u003e)\n[5201\u003c-\u003e39222]: DROPPING skb [265600160..265665640], reason: SKB_DROP_REASON_PROTO_MEM\n [rcv_nxt 265600160, rcv_wnd 262144, snt_ack 265469200, win_now 131184]\n [copied_seq 259909392-\u003e260034360 (124968), unread 5565800, qlen 85, ofoq 0]\n [OFO queue: gap: 65480, len: 0]\n[5201\u003c-\u003e39222]: tcp_data_queue(\u003c-)\n[5201\u003c-\u003e39222]: __tcp_transmit_skb(-\u003e)\n [tp-\u003ercv_wup: 265469200, tp-\u003ercv_wnd: 262144, tp-\u003ercv_nxt 265600160]\n[5201\u003c-\u003e39222]: tcp_select_window(-\u003e)\n[5201\u003c-\u003e39222]: (inet_csk(sk)-\u003eicsk_ack.pending \u0026 ICSK_ACK_NOMEM) ? --\u003e TRUE\n [tp-\u003ercv_wup: 265469200, tp-\u003ercv_wnd: 262144, tp-\u003ercv_nxt 265600160]\n returning 0\n[5201\u003c-\u003e39222]: tcp_select_window(\u003c-)\n[5201\u003c-\u003e39222]: ADVERTISING WIN 0, ACK_SEQ: 265600160\n[5201\u003c-\u003e39222]: [__tcp_transmit_skb(\u003c-)\n[5201\u003c-\u003e39222]: tcp_rcv_established(\u003c-)\n[5201\u003c-\u003e39222]: tcp_v4_rcv(\u003c-)\n\n// Receive queue is at 85 buffers and we are out of memory.\n// We drop the incoming buffer, although it is in sequence, and decide\n// to send an advertisement with a window of zero.\n// We don\u0027t update tp-\u003ercv_wnd and tp-\u003ercv_wup accordingly, which means\n// we unconditionally shrink the window.\n\n[5201\u003c-\u003e39222]: tcp_recvmsg_locked(-\u003e)\n[5201\u003c-\u003e39222]: __tcp_cleanup_rbuf(-\u003e) tp-\u003ercv_wup: 265469200, tp-\u003ercv_wnd: 262144, tp-\u003ercv_nxt 265600160\n[5201\u003c-\u003e39222]: [new_win = 0, win_now = 131184, 2 * win_now = 262368]\n[5201\u003c-\u003e39222]: [new_win \u003e= (2 * win_now) ? --\u003e time_to_ack = 0]\n[5201\u003c-\u003e39222]: NOT calling tcp_send_ack()\n [tp-\u003ercv_wup: 265469200, tp-\u003ercv_wnd: 262144, tp-\u003ercv_nxt 265600160]\n[5201\u003c-\u003e39222]: __tcp_cleanup_rbuf(\u003c-)\n [rcv_nxt 265600160, rcv_wnd 262144, snt_ack 265469200, win_now 131184]\n [copied_seq 260040464-\u003e260040464 (0), unread 5559696, qlen 85, ofoq 0]\n returning 6104 bytes\n[5201\u003c-\u003e39222]: tcp_recvmsg_locked(\u003c-)\n\n// After each read, the algorithm for calculating the new receive\n// window in __tcp_cleanup_rbuf() finds it is too small to advertise\n// or to update tp-\u003ercv_wnd.\n// Meanwhile, the peer thinks the window is zero, and will not send\n// any more data to trigger an update from the interrupt mode side.\n\n[5201\u003c-\u003e39222]: tcp_recvmsg_locked(-\u003e)\n[5201\u003c-\u003e39222]: __tcp_cleanup_rbuf(-\u003e) tp-\u003ercv_wup: 265469200, tp-\u003ercv_wnd: 262144, tp-\u003ercv_nxt 265600160\n[5201\u003c-\u003e39222]: [new_win = 262144, win_now = 131184, 2 * win_n\n---truncated---",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.1:kernel-devel-rt-6.4.0-39.1.noarch",
"SUSE Linux Micro 6.1:kernel-rt-6.4.0-39.1.aarch64",
"SUSE Linux Micro 6.1:kernel-rt-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.1:kernel-rt-devel-6.4.0-39.1.aarch64",
"SUSE Linux Micro 6.1:kernel-rt-devel-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.1:kernel-rt-livepatch-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.1:kernel-source-rt-6.4.0-39.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-21710",
"url": "https://www.suse.com/security/cve/CVE-2025-21710"
},
{
"category": "external",
"summary": "SUSE Bug 1237888 for CVE-2025-21710",
"url": "https://bugzilla.suse.com/1237888"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.1:kernel-devel-rt-6.4.0-39.1.noarch",
"SUSE Linux Micro 6.1:kernel-rt-6.4.0-39.1.aarch64",
"SUSE Linux Micro 6.1:kernel-rt-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.1:kernel-rt-devel-6.4.0-39.1.aarch64",
"SUSE Linux Micro 6.1:kernel-rt-devel-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.1:kernel-rt-livepatch-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.1:kernel-source-rt-6.4.0-39.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.1:kernel-devel-rt-6.4.0-39.1.noarch",
"SUSE Linux Micro 6.1:kernel-rt-6.4.0-39.1.aarch64",
"SUSE Linux Micro 6.1:kernel-rt-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.1:kernel-rt-devel-6.4.0-39.1.aarch64",
"SUSE Linux Micro 6.1:kernel-rt-devel-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.1:kernel-rt-livepatch-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.1:kernel-source-rt-6.4.0-39.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-07T10:55:44Z",
"details": "moderate"
}
],
"title": "CVE-2025-21710"
},
{
"cve": "CVE-2025-37916",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-37916"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\npds_core: remove write-after-free of client_id\n\nA use-after-free error popped up in stress testing:\n\n[Mon Apr 21 21:21:33 2025] BUG: KFENCE: use-after-free write in pdsc_auxbus_dev_del+0xef/0x160 [pds_core]\n[Mon Apr 21 21:21:33 2025] Use-after-free write at 0x000000007013ecd1 (in kfence-#47):\n[Mon Apr 21 21:21:33 2025] pdsc_auxbus_dev_del+0xef/0x160 [pds_core]\n[Mon Apr 21 21:21:33 2025] pdsc_remove+0xc0/0x1b0 [pds_core]\n[Mon Apr 21 21:21:33 2025] pci_device_remove+0x24/0x70\n[Mon Apr 21 21:21:33 2025] device_release_driver_internal+0x11f/0x180\n[Mon Apr 21 21:21:33 2025] driver_detach+0x45/0x80\n[Mon Apr 21 21:21:33 2025] bus_remove_driver+0x83/0xe0\n[Mon Apr 21 21:21:33 2025] pci_unregister_driver+0x1a/0x80\n\nThe actual device uninit usually happens on a separate thread\nscheduled after this code runs, but there is no guarantee of order\nof thread execution, so this could be a problem. There\u0027s no\nactual need to clear the client_id at this point, so simply\nremove the offending code.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.1:kernel-devel-rt-6.4.0-39.1.noarch",
"SUSE Linux Micro 6.1:kernel-rt-6.4.0-39.1.aarch64",
"SUSE Linux Micro 6.1:kernel-rt-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.1:kernel-rt-devel-6.4.0-39.1.aarch64",
"SUSE Linux Micro 6.1:kernel-rt-devel-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.1:kernel-rt-livepatch-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.1:kernel-source-rt-6.4.0-39.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-37916",
"url": "https://www.suse.com/security/cve/CVE-2025-37916"
},
{
"category": "external",
"summary": "SUSE Bug 1243474 for CVE-2025-37916",
"url": "https://bugzilla.suse.com/1243474"
},
{
"category": "external",
"summary": "SUSE Bug 1243535 for CVE-2025-37916",
"url": "https://bugzilla.suse.com/1243535"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.1:kernel-devel-rt-6.4.0-39.1.noarch",
"SUSE Linux Micro 6.1:kernel-rt-6.4.0-39.1.aarch64",
"SUSE Linux Micro 6.1:kernel-rt-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.1:kernel-rt-devel-6.4.0-39.1.aarch64",
"SUSE Linux Micro 6.1:kernel-rt-devel-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.1:kernel-rt-livepatch-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.1:kernel-source-rt-6.4.0-39.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.1:kernel-devel-rt-6.4.0-39.1.noarch",
"SUSE Linux Micro 6.1:kernel-rt-6.4.0-39.1.aarch64",
"SUSE Linux Micro 6.1:kernel-rt-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.1:kernel-rt-devel-6.4.0-39.1.aarch64",
"SUSE Linux Micro 6.1:kernel-rt-devel-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.1:kernel-rt-livepatch-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.1:kernel-source-rt-6.4.0-39.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-07T10:55:44Z",
"details": "moderate"
}
],
"title": "CVE-2025-37916"
},
{
"cve": "CVE-2025-38359",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-38359"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\ns390/mm: Fix in_atomic() handling in do_secure_storage_access()\n\nKernel user spaces accesses to not exported pages in atomic context\nincorrectly try to resolve the page fault.\nWith debug options enabled call traces like this can be seen:\n\nBUG: sleeping function called from invalid context at kernel/locking/rwsem.c:1523\nin_atomic(): 1, irqs_disabled(): 0, non_block: 0, pid: 419074, name: qemu-system-s39\npreempt_count: 1, expected: 0\nRCU nest depth: 0, expected: 0\nINFO: lockdep is turned off.\nPreemption disabled at:\n[\u003c00000383ea47cfa2\u003e] copy_page_from_iter_atomic+0xa2/0x8a0\nCPU: 12 UID: 0 PID: 419074 Comm: qemu-system-s39\nTainted: G W 6.16.0-20250531.rc0.git0.69b3a602feac.63.fc42.s390x+debug #1 PREEMPT\nTainted: [W]=WARN\nHardware name: IBM 3931 A01 703 (LPAR)\nCall Trace:\n [\u003c00000383e990d282\u003e] dump_stack_lvl+0xa2/0xe8\n [\u003c00000383e99bf152\u003e] __might_resched+0x292/0x2d0\n [\u003c00000383eaa7c374\u003e] down_read+0x34/0x2d0\n [\u003c00000383e99432f8\u003e] do_secure_storage_access+0x108/0x360\n [\u003c00000383eaa724b0\u003e] __do_pgm_check+0x130/0x220\n [\u003c00000383eaa842e4\u003e] pgm_check_handler+0x114/0x160\n [\u003c00000383ea47d028\u003e] copy_page_from_iter_atomic+0x128/0x8a0\n([\u003c00000383ea47d016\u003e] copy_page_from_iter_atomic+0x116/0x8a0)\n [\u003c00000383e9c45eae\u003e] generic_perform_write+0x16e/0x310\n [\u003c00000383e9eb87f4\u003e] ext4_buffered_write_iter+0x84/0x160\n [\u003c00000383e9da0de4\u003e] vfs_write+0x1c4/0x460\n [\u003c00000383e9da123c\u003e] ksys_write+0x7c/0x100\n [\u003c00000383eaa7284e\u003e] __do_syscall+0x15e/0x280\n [\u003c00000383eaa8417e\u003e] system_call+0x6e/0x90\nINFO: lockdep is turned off.\n\nIt is not allowed to take the mmap_lock while in atomic context. Therefore\nhandle such a secure storage access fault as if the accessed page is not\nmapped: the uaccess function will return -EFAULT, and the caller has to\ndeal with this. Usually this means that the access is retried in process\ncontext, which allows to resolve the page fault (or in this case export the\npage).",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.1:kernel-devel-rt-6.4.0-39.1.noarch",
"SUSE Linux Micro 6.1:kernel-rt-6.4.0-39.1.aarch64",
"SUSE Linux Micro 6.1:kernel-rt-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.1:kernel-rt-devel-6.4.0-39.1.aarch64",
"SUSE Linux Micro 6.1:kernel-rt-devel-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.1:kernel-rt-livepatch-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.1:kernel-source-rt-6.4.0-39.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-38359",
"url": "https://www.suse.com/security/cve/CVE-2025-38359"
},
{
"category": "external",
"summary": "SUSE Bug 1247076 for CVE-2025-38359",
"url": "https://bugzilla.suse.com/1247076"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.1:kernel-devel-rt-6.4.0-39.1.noarch",
"SUSE Linux Micro 6.1:kernel-rt-6.4.0-39.1.aarch64",
"SUSE Linux Micro 6.1:kernel-rt-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.1:kernel-rt-devel-6.4.0-39.1.aarch64",
"SUSE Linux Micro 6.1:kernel-rt-devel-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.1:kernel-rt-livepatch-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.1:kernel-source-rt-6.4.0-39.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.1:kernel-devel-rt-6.4.0-39.1.noarch",
"SUSE Linux Micro 6.1:kernel-rt-6.4.0-39.1.aarch64",
"SUSE Linux Micro 6.1:kernel-rt-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.1:kernel-rt-devel-6.4.0-39.1.aarch64",
"SUSE Linux Micro 6.1:kernel-rt-devel-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.1:kernel-rt-livepatch-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.1:kernel-source-rt-6.4.0-39.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-07T10:55:44Z",
"details": "moderate"
}
],
"title": "CVE-2025-38359"
},
{
"cve": "CVE-2025-38361",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-38361"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\ndrm/amd/display: Check dce_hwseq before dereferencing it\n\n[WHAT]\n\nhws was checked for null earlier in dce110_blank_stream, indicating hws\ncan be null, and should be checked whenever it is used.\n\n(cherry picked from commit 79db43611ff61280b6de58ce1305e0b2ecf675ad)",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.1:kernel-devel-rt-6.4.0-39.1.noarch",
"SUSE Linux Micro 6.1:kernel-rt-6.4.0-39.1.aarch64",
"SUSE Linux Micro 6.1:kernel-rt-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.1:kernel-rt-devel-6.4.0-39.1.aarch64",
"SUSE Linux Micro 6.1:kernel-rt-devel-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.1:kernel-rt-livepatch-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.1:kernel-source-rt-6.4.0-39.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-38361",
"url": "https://www.suse.com/security/cve/CVE-2025-38361"
},
{
"category": "external",
"summary": "SUSE Bug 1247079 for CVE-2025-38361",
"url": "https://bugzilla.suse.com/1247079"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.1:kernel-devel-rt-6.4.0-39.1.noarch",
"SUSE Linux Micro 6.1:kernel-rt-6.4.0-39.1.aarch64",
"SUSE Linux Micro 6.1:kernel-rt-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.1:kernel-rt-devel-6.4.0-39.1.aarch64",
"SUSE Linux Micro 6.1:kernel-rt-devel-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.1:kernel-rt-livepatch-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.1:kernel-source-rt-6.4.0-39.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.1:kernel-devel-rt-6.4.0-39.1.noarch",
"SUSE Linux Micro 6.1:kernel-rt-6.4.0-39.1.aarch64",
"SUSE Linux Micro 6.1:kernel-rt-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.1:kernel-rt-devel-6.4.0-39.1.aarch64",
"SUSE Linux Micro 6.1:kernel-rt-devel-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.1:kernel-rt-livepatch-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.1:kernel-source-rt-6.4.0-39.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-07T10:55:44Z",
"details": "moderate"
}
],
"title": "CVE-2025-38361"
},
{
"cve": "CVE-2025-39788",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-39788"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nscsi: ufs: exynos: Fix programming of HCI_UTRL_NEXUS_TYPE\n\nOn Google gs101, the number of UTP transfer request slots (nutrs) is 32,\nand in this case the driver ends up programming the UTRL_NEXUS_TYPE\nincorrectly as 0.\n\nThis is because the left hand side of the shift is 1, which is of type\nint, i.e. 31 bits wide. Shifting by more than that width results in\nundefined behaviour.\n\nFix this by switching to the BIT() macro, which applies correct type\ncasting as required. This ensures the correct value is written to\nUTRL_NEXUS_TYPE (0xffffffff on gs101), and it also fixes a UBSAN shift\nwarning:\n\n UBSAN: shift-out-of-bounds in drivers/ufs/host/ufs-exynos.c:1113:21\n shift exponent 32 is too large for 32-bit type \u0027int\u0027\n\nFor consistency, apply the same change to the nutmrs / UTMRL_NEXUS_TYPE\nwrite.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.1:kernel-devel-rt-6.4.0-39.1.noarch",
"SUSE Linux Micro 6.1:kernel-rt-6.4.0-39.1.aarch64",
"SUSE Linux Micro 6.1:kernel-rt-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.1:kernel-rt-devel-6.4.0-39.1.aarch64",
"SUSE Linux Micro 6.1:kernel-rt-devel-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.1:kernel-rt-livepatch-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.1:kernel-source-rt-6.4.0-39.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-39788",
"url": "https://www.suse.com/security/cve/CVE-2025-39788"
},
{
"category": "external",
"summary": "SUSE Bug 1249547 for CVE-2025-39788",
"url": "https://bugzilla.suse.com/1249547"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.1:kernel-devel-rt-6.4.0-39.1.noarch",
"SUSE Linux Micro 6.1:kernel-rt-6.4.0-39.1.aarch64",
"SUSE Linux Micro 6.1:kernel-rt-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.1:kernel-rt-devel-6.4.0-39.1.aarch64",
"SUSE Linux Micro 6.1:kernel-rt-devel-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.1:kernel-rt-livepatch-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.1:kernel-source-rt-6.4.0-39.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.1:kernel-devel-rt-6.4.0-39.1.noarch",
"SUSE Linux Micro 6.1:kernel-rt-6.4.0-39.1.aarch64",
"SUSE Linux Micro 6.1:kernel-rt-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.1:kernel-rt-devel-6.4.0-39.1.aarch64",
"SUSE Linux Micro 6.1:kernel-rt-devel-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.1:kernel-rt-livepatch-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.1:kernel-source-rt-6.4.0-39.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-07T10:55:44Z",
"details": "moderate"
}
],
"title": "CVE-2025-39788"
},
{
"cve": "CVE-2025-39805",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-39805"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnet: macb: fix unregister_netdev call order in macb_remove()\n\nWhen removing a macb device, the driver calls phy_exit() before\nunregister_netdev(). This leads to a WARN from kernfs:\n\n ------------[ cut here ]------------\n kernfs: can not remove \u0027attached_dev\u0027, no directory\n WARNING: CPU: 1 PID: 27146 at fs/kernfs/dir.c:1683\n Call trace:\n kernfs_remove_by_name_ns+0xd8/0xf0\n sysfs_remove_link+0x24/0x58\n phy_detach+0x5c/0x168\n phy_disconnect+0x4c/0x70\n phylink_disconnect_phy+0x6c/0xc0 [phylink]\n macb_close+0x6c/0x170 [macb]\n ...\n macb_remove+0x60/0x168 [macb]\n platform_remove+0x5c/0x80\n ...\n\nThe warning happens because the PHY is being exited while the netdev\nis still registered. The correct order is to unregister the netdev\nbefore shutting down the PHY and cleaning up the MDIO bus.\n\nFix this by moving unregister_netdev() ahead of phy_exit() in\nmacb_remove().",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.1:kernel-devel-rt-6.4.0-39.1.noarch",
"SUSE Linux Micro 6.1:kernel-rt-6.4.0-39.1.aarch64",
"SUSE Linux Micro 6.1:kernel-rt-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.1:kernel-rt-devel-6.4.0-39.1.aarch64",
"SUSE Linux Micro 6.1:kernel-rt-devel-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.1:kernel-rt-livepatch-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.1:kernel-source-rt-6.4.0-39.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-39805",
"url": "https://www.suse.com/security/cve/CVE-2025-39805"
},
{
"category": "external",
"summary": "SUSE Bug 1249982 for CVE-2025-39805",
"url": "https://bugzilla.suse.com/1249982"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.1:kernel-devel-rt-6.4.0-39.1.noarch",
"SUSE Linux Micro 6.1:kernel-rt-6.4.0-39.1.aarch64",
"SUSE Linux Micro 6.1:kernel-rt-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.1:kernel-rt-devel-6.4.0-39.1.aarch64",
"SUSE Linux Micro 6.1:kernel-rt-devel-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.1:kernel-rt-livepatch-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.1:kernel-source-rt-6.4.0-39.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.1:kernel-devel-rt-6.4.0-39.1.noarch",
"SUSE Linux Micro 6.1:kernel-rt-6.4.0-39.1.aarch64",
"SUSE Linux Micro 6.1:kernel-rt-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.1:kernel-rt-devel-6.4.0-39.1.aarch64",
"SUSE Linux Micro 6.1:kernel-rt-devel-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.1:kernel-rt-livepatch-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.1:kernel-source-rt-6.4.0-39.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-07T10:55:44Z",
"details": "moderate"
}
],
"title": "CVE-2025-39805"
},
{
"cve": "CVE-2025-39819",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-39819"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nfs/smb: Fix inconsistent refcnt update\n\nA possible inconsistent update of refcount was identified in `smb2_compound_op`.\nSuch inconsistent update could lead to possible resource leaks.\n\nWhy it is a possible bug:\n1. In the comment section of the function, it clearly states that the\nreference to `cfile` should be dropped after calling this function.\n2. Every control flow path would check and drop the reference to\n`cfile`, except the patched one.\n3. Existing callers would not handle refcount update of `cfile` if\n-ENOMEM is returned.\n\nTo fix the bug, an extra goto label \"out\" is added, to make sure that the\ncleanup logic would always be respected. As the problem is caused by the\nallocation failure of `vars`, the cleanup logic between label \"finished\"\nand \"out\" can be safely ignored. According to the definition of function\n`is_replayable_error`, the error code of \"-ENOMEM\" is not recoverable.\nTherefore, the replay logic also gets ignored.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.1:kernel-devel-rt-6.4.0-39.1.noarch",
"SUSE Linux Micro 6.1:kernel-rt-6.4.0-39.1.aarch64",
"SUSE Linux Micro 6.1:kernel-rt-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.1:kernel-rt-devel-6.4.0-39.1.aarch64",
"SUSE Linux Micro 6.1:kernel-rt-devel-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.1:kernel-rt-livepatch-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.1:kernel-source-rt-6.4.0-39.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-39819",
"url": "https://www.suse.com/security/cve/CVE-2025-39819"
},
{
"category": "external",
"summary": "SUSE Bug 1250176 for CVE-2025-39819",
"url": "https://bugzilla.suse.com/1250176"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.1:kernel-devel-rt-6.4.0-39.1.noarch",
"SUSE Linux Micro 6.1:kernel-rt-6.4.0-39.1.aarch64",
"SUSE Linux Micro 6.1:kernel-rt-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.1:kernel-rt-devel-6.4.0-39.1.aarch64",
"SUSE Linux Micro 6.1:kernel-rt-devel-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.1:kernel-rt-livepatch-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.1:kernel-source-rt-6.4.0-39.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.1:kernel-devel-rt-6.4.0-39.1.noarch",
"SUSE Linux Micro 6.1:kernel-rt-6.4.0-39.1.aarch64",
"SUSE Linux Micro 6.1:kernel-rt-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.1:kernel-rt-devel-6.4.0-39.1.aarch64",
"SUSE Linux Micro 6.1:kernel-rt-devel-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.1:kernel-rt-livepatch-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.1:kernel-source-rt-6.4.0-39.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-07T10:55:44Z",
"details": "moderate"
}
],
"title": "CVE-2025-39819"
},
{
"cve": "CVE-2025-39859",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-39859"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nptp: ocp: fix use-after-free bugs causing by ptp_ocp_watchdog\n\nThe ptp_ocp_detach() only shuts down the watchdog timer if it is\npending. However, if the timer handler is already running, the\ntimer_delete_sync() is not called. This leads to race conditions\nwhere the devlink that contains the ptp_ocp is deallocated while\nthe timer handler is still accessing it, resulting in use-after-free\nbugs. The following details one of the race scenarios.\n\n(thread 1) | (thread 2)\nptp_ocp_remove() |\n ptp_ocp_detach() | ptp_ocp_watchdog()\n if (timer_pending(\u0026bp-\u003ewatchdog))| bp = timer_container_of()\n timer_delete_sync() |\n |\n devlink_free(devlink) //free |\n | bp-\u003e //use\n\nResolve this by unconditionally calling timer_delete_sync() to ensure\nthe timer is reliably deactivated, preventing any access after free.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.1:kernel-devel-rt-6.4.0-39.1.noarch",
"SUSE Linux Micro 6.1:kernel-rt-6.4.0-39.1.aarch64",
"SUSE Linux Micro 6.1:kernel-rt-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.1:kernel-rt-devel-6.4.0-39.1.aarch64",
"SUSE Linux Micro 6.1:kernel-rt-devel-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.1:kernel-rt-livepatch-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.1:kernel-source-rt-6.4.0-39.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-39859",
"url": "https://www.suse.com/security/cve/CVE-2025-39859"
},
{
"category": "external",
"summary": "SUSE Bug 1250252 for CVE-2025-39859",
"url": "https://bugzilla.suse.com/1250252"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.1:kernel-devel-rt-6.4.0-39.1.noarch",
"SUSE Linux Micro 6.1:kernel-rt-6.4.0-39.1.aarch64",
"SUSE Linux Micro 6.1:kernel-rt-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.1:kernel-rt-devel-6.4.0-39.1.aarch64",
"SUSE Linux Micro 6.1:kernel-rt-devel-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.1:kernel-rt-livepatch-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.1:kernel-source-rt-6.4.0-39.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.1:kernel-devel-rt-6.4.0-39.1.noarch",
"SUSE Linux Micro 6.1:kernel-rt-6.4.0-39.1.aarch64",
"SUSE Linux Micro 6.1:kernel-rt-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.1:kernel-rt-devel-6.4.0-39.1.aarch64",
"SUSE Linux Micro 6.1:kernel-rt-devel-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.1:kernel-rt-livepatch-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.1:kernel-source-rt-6.4.0-39.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-07T10:55:44Z",
"details": "moderate"
}
],
"title": "CVE-2025-39859"
},
{
"cve": "CVE-2025-39944",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-39944"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nocteontx2-pf: Fix use-after-free bugs in otx2_sync_tstamp()\n\nThe original code relies on cancel_delayed_work() in otx2_ptp_destroy(),\nwhich does not ensure that the delayed work item synctstamp_work has fully\ncompleted if it was already running. This leads to use-after-free scenarios\nwhere otx2_ptp is deallocated by otx2_ptp_destroy(), while synctstamp_work\nremains active and attempts to dereference otx2_ptp in otx2_sync_tstamp().\nFurthermore, the synctstamp_work is cyclic, the likelihood of triggering\nthe bug is nonnegligible.\n\nA typical race condition is illustrated below:\n\nCPU 0 (cleanup) | CPU 1 (delayed work callback)\notx2_remove() |\n otx2_ptp_destroy() | otx2_sync_tstamp()\n cancel_delayed_work() |\n kfree(ptp) |\n | ptp = container_of(...); //UAF\n | ptp-\u003e //UAF\n\nThis is confirmed by a KASAN report:\n\nBUG: KASAN: slab-use-after-free in __run_timer_base.part.0+0x7d7/0x8c0\nWrite of size 8 at addr ffff88800aa09a18 by task bash/136\n...\nCall Trace:\n \u003cIRQ\u003e\n dump_stack_lvl+0x55/0x70\n print_report+0xcf/0x610\n ? __run_timer_base.part.0+0x7d7/0x8c0\n kasan_report+0xb8/0xf0\n ? __run_timer_base.part.0+0x7d7/0x8c0\n __run_timer_base.part.0+0x7d7/0x8c0\n ? __pfx___run_timer_base.part.0+0x10/0x10\n ? __pfx_read_tsc+0x10/0x10\n ? ktime_get+0x60/0x140\n ? lapic_next_event+0x11/0x20\n ? clockevents_program_event+0x1d4/0x2a0\n run_timer_softirq+0xd1/0x190\n handle_softirqs+0x16a/0x550\n irq_exit_rcu+0xaf/0xe0\n sysvec_apic_timer_interrupt+0x70/0x80\n \u003c/IRQ\u003e\n...\nAllocated by task 1:\n kasan_save_stack+0x24/0x50\n kasan_save_track+0x14/0x30\n __kasan_kmalloc+0x7f/0x90\n otx2_ptp_init+0xb1/0x860\n otx2_probe+0x4eb/0xc30\n local_pci_probe+0xdc/0x190\n pci_device_probe+0x2fe/0x470\n really_probe+0x1ca/0x5c0\n __driver_probe_device+0x248/0x310\n driver_probe_device+0x44/0x120\n __driver_attach+0xd2/0x310\n bus_for_each_dev+0xed/0x170\n bus_add_driver+0x208/0x500\n driver_register+0x132/0x460\n do_one_initcall+0x89/0x300\n kernel_init_freeable+0x40d/0x720\n kernel_init+0x1a/0x150\n ret_from_fork+0x10c/0x1a0\n ret_from_fork_asm+0x1a/0x30\n\nFreed by task 136:\n kasan_save_stack+0x24/0x50\n kasan_save_track+0x14/0x30\n kasan_save_free_info+0x3a/0x60\n __kasan_slab_free+0x3f/0x50\n kfree+0x137/0x370\n otx2_ptp_destroy+0x38/0x80\n otx2_remove+0x10d/0x4c0\n pci_device_remove+0xa6/0x1d0\n device_release_driver_internal+0xf8/0x210\n pci_stop_bus_device+0x105/0x150\n pci_stop_and_remove_bus_device_locked+0x15/0x30\n remove_store+0xcc/0xe0\n kernfs_fop_write_iter+0x2c3/0x440\n vfs_write+0x871/0xd70\n ksys_write+0xee/0x1c0\n do_syscall_64+0xac/0x280\n entry_SYSCALL_64_after_hwframe+0x77/0x7f\n...\n\nReplace cancel_delayed_work() with cancel_delayed_work_sync() to ensure\nthat the delayed work item is properly canceled before the otx2_ptp is\ndeallocated.\n\nThis bug was initially identified through static analysis. To reproduce\nand test it, I simulated the OcteonTX2 PCI device in QEMU and introduced\nartificial delays within the otx2_sync_tstamp() function to increase the\nlikelihood of triggering the bug.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.1:kernel-devel-rt-6.4.0-39.1.noarch",
"SUSE Linux Micro 6.1:kernel-rt-6.4.0-39.1.aarch64",
"SUSE Linux Micro 6.1:kernel-rt-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.1:kernel-rt-devel-6.4.0-39.1.aarch64",
"SUSE Linux Micro 6.1:kernel-rt-devel-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.1:kernel-rt-livepatch-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.1:kernel-source-rt-6.4.0-39.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-39944",
"url": "https://www.suse.com/security/cve/CVE-2025-39944"
},
{
"category": "external",
"summary": "SUSE Bug 1251120 for CVE-2025-39944",
"url": "https://bugzilla.suse.com/1251120"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.1:kernel-devel-rt-6.4.0-39.1.noarch",
"SUSE Linux Micro 6.1:kernel-rt-6.4.0-39.1.aarch64",
"SUSE Linux Micro 6.1:kernel-rt-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.1:kernel-rt-devel-6.4.0-39.1.aarch64",
"SUSE Linux Micro 6.1:kernel-rt-devel-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.1:kernel-rt-livepatch-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.1:kernel-source-rt-6.4.0-39.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.1:kernel-devel-rt-6.4.0-39.1.noarch",
"SUSE Linux Micro 6.1:kernel-rt-6.4.0-39.1.aarch64",
"SUSE Linux Micro 6.1:kernel-rt-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.1:kernel-rt-devel-6.4.0-39.1.aarch64",
"SUSE Linux Micro 6.1:kernel-rt-devel-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.1:kernel-rt-livepatch-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.1:kernel-source-rt-6.4.0-39.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-07T10:55:44Z",
"details": "moderate"
}
],
"title": "CVE-2025-39944"
},
{
"cve": "CVE-2025-39980",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-39980"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnexthop: Forbid FDB status change while nexthop is in a group\n\nThe kernel forbids the creation of non-FDB nexthop groups with FDB\nnexthops:\n\n # ip nexthop add id 1 via 192.0.2.1 fdb\n # ip nexthop add id 2 group 1\n Error: Non FDB nexthop group cannot have fdb nexthops.\n\nAnd vice versa:\n\n # ip nexthop add id 3 via 192.0.2.2 dev dummy1\n # ip nexthop add id 4 group 3 fdb\n Error: FDB nexthop group can only have fdb nexthops.\n\nHowever, as long as no routes are pointing to a non-FDB nexthop group,\nthe kernel allows changing the type of a nexthop from FDB to non-FDB and\nvice versa:\n\n # ip nexthop add id 5 via 192.0.2.2 dev dummy1\n # ip nexthop add id 6 group 5\n # ip nexthop replace id 5 via 192.0.2.2 fdb\n # echo $?\n 0\n\nThis configuration is invalid and can result in a NPD [1] since FDB\nnexthops are not associated with a nexthop device:\n\n # ip route add 198.51.100.1/32 nhid 6\n # ping 198.51.100.1\n\nFix by preventing nexthop FDB status change while the nexthop is in a\ngroup:\n\n # ip nexthop add id 7 via 192.0.2.2 dev dummy1\n # ip nexthop add id 8 group 7\n # ip nexthop replace id 7 via 192.0.2.2 fdb\n Error: Cannot change nexthop FDB status while in a group.\n\n[1]\nBUG: kernel NULL pointer dereference, address: 00000000000003c0\n[...]\nOops: Oops: 0000 [#1] SMP\nCPU: 6 UID: 0 PID: 367 Comm: ping Not tainted 6.17.0-rc6-virtme-gb65678cacc03 #1 PREEMPT(voluntary)\nHardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.17.0-4.fc41 04/01/2014\nRIP: 0010:fib_lookup_good_nhc+0x1e/0x80\n[...]\nCall Trace:\n \u003cTASK\u003e\n fib_table_lookup+0x541/0x650\n ip_route_output_key_hash_rcu+0x2ea/0x970\n ip_route_output_key_hash+0x55/0x80\n __ip4_datagram_connect+0x250/0x330\n udp_connect+0x2b/0x60\n __sys_connect+0x9c/0xd0\n __x64_sys_connect+0x18/0x20\n do_syscall_64+0xa4/0x2a0\n entry_SYSCALL_64_after_hwframe+0x4b/0x53",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.1:kernel-devel-rt-6.4.0-39.1.noarch",
"SUSE Linux Micro 6.1:kernel-rt-6.4.0-39.1.aarch64",
"SUSE Linux Micro 6.1:kernel-rt-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.1:kernel-rt-devel-6.4.0-39.1.aarch64",
"SUSE Linux Micro 6.1:kernel-rt-devel-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.1:kernel-rt-livepatch-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.1:kernel-source-rt-6.4.0-39.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-39980",
"url": "https://www.suse.com/security/cve/CVE-2025-39980"
},
{
"category": "external",
"summary": "SUSE Bug 1252063 for CVE-2025-39980",
"url": "https://bugzilla.suse.com/1252063"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.1:kernel-devel-rt-6.4.0-39.1.noarch",
"SUSE Linux Micro 6.1:kernel-rt-6.4.0-39.1.aarch64",
"SUSE Linux Micro 6.1:kernel-rt-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.1:kernel-rt-devel-6.4.0-39.1.aarch64",
"SUSE Linux Micro 6.1:kernel-rt-devel-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.1:kernel-rt-livepatch-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.1:kernel-source-rt-6.4.0-39.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.1:kernel-devel-rt-6.4.0-39.1.noarch",
"SUSE Linux Micro 6.1:kernel-rt-6.4.0-39.1.aarch64",
"SUSE Linux Micro 6.1:kernel-rt-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.1:kernel-rt-devel-6.4.0-39.1.aarch64",
"SUSE Linux Micro 6.1:kernel-rt-devel-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.1:kernel-rt-livepatch-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.1:kernel-source-rt-6.4.0-39.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-07T10:55:44Z",
"details": "moderate"
}
],
"title": "CVE-2025-39980"
},
{
"cve": "CVE-2025-40001",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40001"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nscsi: mvsas: Fix use-after-free bugs in mvs_work_queue\n\nDuring the detaching of Marvell\u0027s SAS/SATA controller, the original code\ncalls cancel_delayed_work() in mvs_free() to cancel the delayed work\nitem mwq-\u003ework_q. However, if mwq-\u003ework_q is already running, the\ncancel_delayed_work() may fail to cancel it. This can lead to\nuse-after-free scenarios where mvs_free() frees the mvs_info while\nmvs_work_queue() is still executing and attempts to access the\nalready-freed mvs_info.\n\nA typical race condition is illustrated below:\n\nCPU 0 (remove) | CPU 1 (delayed work callback)\nmvs_pci_remove() |\n mvs_free() | mvs_work_queue()\n cancel_delayed_work() |\n kfree(mvi) |\n | mvi-\u003e // UAF\n\nReplace cancel_delayed_work() with cancel_delayed_work_sync() to ensure\nthat the delayed work item is properly canceled and any executing\ndelayed work item completes before the mvs_info is deallocated.\n\nThis bug was found by static analysis.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.1:kernel-devel-rt-6.4.0-39.1.noarch",
"SUSE Linux Micro 6.1:kernel-rt-6.4.0-39.1.aarch64",
"SUSE Linux Micro 6.1:kernel-rt-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.1:kernel-rt-devel-6.4.0-39.1.aarch64",
"SUSE Linux Micro 6.1:kernel-rt-devel-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.1:kernel-rt-livepatch-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.1:kernel-source-rt-6.4.0-39.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40001",
"url": "https://www.suse.com/security/cve/CVE-2025-40001"
},
{
"category": "external",
"summary": "SUSE Bug 1252303 for CVE-2025-40001",
"url": "https://bugzilla.suse.com/1252303"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.1:kernel-devel-rt-6.4.0-39.1.noarch",
"SUSE Linux Micro 6.1:kernel-rt-6.4.0-39.1.aarch64",
"SUSE Linux Micro 6.1:kernel-rt-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.1:kernel-rt-devel-6.4.0-39.1.aarch64",
"SUSE Linux Micro 6.1:kernel-rt-devel-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.1:kernel-rt-livepatch-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.1:kernel-source-rt-6.4.0-39.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.8,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.1:kernel-devel-rt-6.4.0-39.1.noarch",
"SUSE Linux Micro 6.1:kernel-rt-6.4.0-39.1.aarch64",
"SUSE Linux Micro 6.1:kernel-rt-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.1:kernel-rt-devel-6.4.0-39.1.aarch64",
"SUSE Linux Micro 6.1:kernel-rt-devel-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.1:kernel-rt-livepatch-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.1:kernel-source-rt-6.4.0-39.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-07T10:55:44Z",
"details": "moderate"
}
],
"title": "CVE-2025-40001"
},
{
"cve": "CVE-2025-40021",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40021"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\ntracing: dynevent: Add a missing lockdown check on dynevent\n\nSince dynamic_events interface on tracefs is compatible with\nkprobe_events and uprobe_events, it should also check the lockdown\nstatus and reject if it is set.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.1:kernel-devel-rt-6.4.0-39.1.noarch",
"SUSE Linux Micro 6.1:kernel-rt-6.4.0-39.1.aarch64",
"SUSE Linux Micro 6.1:kernel-rt-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.1:kernel-rt-devel-6.4.0-39.1.aarch64",
"SUSE Linux Micro 6.1:kernel-rt-devel-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.1:kernel-rt-livepatch-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.1:kernel-source-rt-6.4.0-39.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40021",
"url": "https://www.suse.com/security/cve/CVE-2025-40021"
},
{
"category": "external",
"summary": "SUSE Bug 1252681 for CVE-2025-40021",
"url": "https://bugzilla.suse.com/1252681"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.1:kernel-devel-rt-6.4.0-39.1.noarch",
"SUSE Linux Micro 6.1:kernel-rt-6.4.0-39.1.aarch64",
"SUSE Linux Micro 6.1:kernel-rt-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.1:kernel-rt-devel-6.4.0-39.1.aarch64",
"SUSE Linux Micro 6.1:kernel-rt-devel-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.1:kernel-rt-livepatch-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.1:kernel-source-rt-6.4.0-39.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.1:kernel-devel-rt-6.4.0-39.1.noarch",
"SUSE Linux Micro 6.1:kernel-rt-6.4.0-39.1.aarch64",
"SUSE Linux Micro 6.1:kernel-rt-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.1:kernel-rt-devel-6.4.0-39.1.aarch64",
"SUSE Linux Micro 6.1:kernel-rt-devel-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.1:kernel-rt-livepatch-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.1:kernel-source-rt-6.4.0-39.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-07T10:55:44Z",
"details": "moderate"
}
],
"title": "CVE-2025-40021"
},
{
"cve": "CVE-2025-40027",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40027"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnet/9p: fix double req put in p9_fd_cancelled\n\nSyzkaller reports a KASAN issue as below:\n\ngeneral protection fault, probably for non-canonical address 0xfbd59c0000000021: 0000 [#1] PREEMPT SMP KASAN NOPTI\nKASAN: maybe wild-memory-access in range [0xdead000000000108-0xdead00000000010f]\nCPU: 0 PID: 5083 Comm: syz-executor.2 Not tainted 6.1.134-syzkaller-00037-g855bd1d7d838 #0\nHardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014\nRIP: 0010:__list_del include/linux/list.h:114 [inline]\nRIP: 0010:__list_del_entry include/linux/list.h:137 [inline]\nRIP: 0010:list_del include/linux/list.h:148 [inline]\nRIP: 0010:p9_fd_cancelled+0xe9/0x200 net/9p/trans_fd.c:734\n\nCall Trace:\n \u003cTASK\u003e\n p9_client_flush+0x351/0x440 net/9p/client.c:614\n p9_client_rpc+0xb6b/0xc70 net/9p/client.c:734\n p9_client_version net/9p/client.c:920 [inline]\n p9_client_create+0xb51/0x1240 net/9p/client.c:1027\n v9fs_session_init+0x1f0/0x18f0 fs/9p/v9fs.c:408\n v9fs_mount+0xba/0xcb0 fs/9p/vfs_super.c:126\n legacy_get_tree+0x108/0x220 fs/fs_context.c:632\n vfs_get_tree+0x8e/0x300 fs/super.c:1573\n do_new_mount fs/namespace.c:3056 [inline]\n path_mount+0x6a6/0x1e90 fs/namespace.c:3386\n do_mount fs/namespace.c:3399 [inline]\n __do_sys_mount fs/namespace.c:3607 [inline]\n __se_sys_mount fs/namespace.c:3584 [inline]\n __x64_sys_mount+0x283/0x300 fs/namespace.c:3584\n do_syscall_x64 arch/x86/entry/common.c:51 [inline]\n do_syscall_64+0x35/0x80 arch/x86/entry/common.c:81\n entry_SYSCALL_64_after_hwframe+0x6e/0xd8\n\nThis happens because of a race condition between:\n\n- The 9p client sending an invalid flush request and later cleaning it up;\n- The 9p client in p9_read_work() canceled all pending requests.\n\n Thread 1 Thread 2\n ...\n p9_client_create()\n ...\n p9_fd_create()\n ...\n p9_conn_create()\n ...\n // start Thread 2\n INIT_WORK(\u0026m-\u003erq, p9_read_work);\n p9_read_work()\n ...\n p9_client_rpc()\n ...\n ...\n p9_conn_cancel()\n ...\n spin_lock(\u0026m-\u003ereq_lock);\n ...\n p9_fd_cancelled()\n ...\n ...\n spin_unlock(\u0026m-\u003ereq_lock);\n // status rewrite\n p9_client_cb(m-\u003eclient, req, REQ_STATUS_ERROR)\n // first remove\n list_del(\u0026req-\u003ereq_list);\n ...\n\n spin_lock(\u0026m-\u003ereq_lock)\n ...\n // second remove\n list_del(\u0026req-\u003ereq_list);\n spin_unlock(\u0026m-\u003ereq_lock)\n ...\n\nCommit 74d6a5d56629 (\"9p/trans_fd: Fix concurrency del of req_list in\np9_fd_cancelled/p9_read_work\") fixes a concurrency issue in the 9p filesystem\nclient where the req_list could be deleted simultaneously by both\np9_read_work and p9_fd_cancelled functions, but for the case where req-\u003estatus\nequals REQ_STATUS_RCVD.\n\nUpdate the check for req-\u003estatus in p9_fd_cancelled to skip processing not\njust received requests, but anything that is not SENT, as whatever\nchanged the state from SENT also removed the request from its list.\n\nFound by Linux Verification Center (linuxtesting.org) with Syzkaller.\n\n[updated the check from status == RECV || status == ERROR to status != SENT]",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.1:kernel-devel-rt-6.4.0-39.1.noarch",
"SUSE Linux Micro 6.1:kernel-rt-6.4.0-39.1.aarch64",
"SUSE Linux Micro 6.1:kernel-rt-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.1:kernel-rt-devel-6.4.0-39.1.aarch64",
"SUSE Linux Micro 6.1:kernel-rt-devel-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.1:kernel-rt-livepatch-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.1:kernel-source-rt-6.4.0-39.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40027",
"url": "https://www.suse.com/security/cve/CVE-2025-40027"
},
{
"category": "external",
"summary": "SUSE Bug 1252763 for CVE-2025-40027",
"url": "https://bugzilla.suse.com/1252763"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.1:kernel-devel-rt-6.4.0-39.1.noarch",
"SUSE Linux Micro 6.1:kernel-rt-6.4.0-39.1.aarch64",
"SUSE Linux Micro 6.1:kernel-rt-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.1:kernel-rt-devel-6.4.0-39.1.aarch64",
"SUSE Linux Micro 6.1:kernel-rt-devel-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.1:kernel-rt-livepatch-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.1:kernel-source-rt-6.4.0-39.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.1:kernel-devel-rt-6.4.0-39.1.noarch",
"SUSE Linux Micro 6.1:kernel-rt-6.4.0-39.1.aarch64",
"SUSE Linux Micro 6.1:kernel-rt-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.1:kernel-rt-devel-6.4.0-39.1.aarch64",
"SUSE Linux Micro 6.1:kernel-rt-devel-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.1:kernel-rt-livepatch-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.1:kernel-source-rt-6.4.0-39.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-07T10:55:44Z",
"details": "moderate"
}
],
"title": "CVE-2025-40027"
},
{
"cve": "CVE-2025-40030",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40030"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\npinctrl: check the return value of pinmux_ops::get_function_name()\n\nWhile the API contract in docs doesn\u0027t specify it explicitly, the\ngeneric implementation of the get_function_name() callback from struct\npinmux_ops - pinmux_generic_get_function_name() - can fail and return\nNULL. This is already checked in pinmux_check_ops() so add a similar\ncheck in pinmux_func_name_to_selector() instead of passing the returned\npointer right down to strcmp() where the NULL can get dereferenced. This\nis normal operation when adding new pinfunctions.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.1:kernel-devel-rt-6.4.0-39.1.noarch",
"SUSE Linux Micro 6.1:kernel-rt-6.4.0-39.1.aarch64",
"SUSE Linux Micro 6.1:kernel-rt-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.1:kernel-rt-devel-6.4.0-39.1.aarch64",
"SUSE Linux Micro 6.1:kernel-rt-devel-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.1:kernel-rt-livepatch-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.1:kernel-source-rt-6.4.0-39.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40030",
"url": "https://www.suse.com/security/cve/CVE-2025-40030"
},
{
"category": "external",
"summary": "SUSE Bug 1252773 for CVE-2025-40030",
"url": "https://bugzilla.suse.com/1252773"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.1:kernel-devel-rt-6.4.0-39.1.noarch",
"SUSE Linux Micro 6.1:kernel-rt-6.4.0-39.1.aarch64",
"SUSE Linux Micro 6.1:kernel-rt-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.1:kernel-rt-devel-6.4.0-39.1.aarch64",
"SUSE Linux Micro 6.1:kernel-rt-devel-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.1:kernel-rt-livepatch-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.1:kernel-source-rt-6.4.0-39.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.1:kernel-devel-rt-6.4.0-39.1.noarch",
"SUSE Linux Micro 6.1:kernel-rt-6.4.0-39.1.aarch64",
"SUSE Linux Micro 6.1:kernel-rt-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.1:kernel-rt-devel-6.4.0-39.1.aarch64",
"SUSE Linux Micro 6.1:kernel-rt-devel-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.1:kernel-rt-livepatch-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.1:kernel-source-rt-6.4.0-39.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-07T10:55:44Z",
"details": "moderate"
}
],
"title": "CVE-2025-40030"
},
{
"cve": "CVE-2025-40038",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40038"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nKVM: SVM: Skip fastpath emulation on VM-Exit if next RIP isn\u0027t valid\n\nSkip the WRMSR and HLT fastpaths in SVM\u0027s VM-Exit handler if the next RIP\nisn\u0027t valid, e.g. because KVM is running with nrips=false. SVM must\ndecode and emulate to skip the instruction if the CPU doesn\u0027t provide the\nnext RIP, and getting the instruction bytes to decode requires reading\nguest memory. Reading guest memory through the emulator can fault, i.e.\ncan sleep, which is disallowed since the fastpath handlers run with IRQs\ndisabled.\n\n BUG: sleeping function called from invalid context at ./include/linux/uaccess.h:106\n in_atomic(): 1, irqs_disabled(): 1, non_block: 0, pid: 32611, name: qemu\n preempt_count: 1, expected: 0\n INFO: lockdep is turned off.\n irq event stamp: 30580\n hardirqs last enabled at (30579): [\u003cffffffffc08b2527\u003e] vcpu_run+0x1787/0x1db0 [kvm]\n hardirqs last disabled at (30580): [\u003cffffffffb4f62e32\u003e] __schedule+0x1e2/0xed0\n softirqs last enabled at (30570): [\u003cffffffffb4247a64\u003e] fpu_swap_kvm_fpstate+0x44/0x210\n softirqs last disabled at (30568): [\u003cffffffffb4247a64\u003e] fpu_swap_kvm_fpstate+0x44/0x210\n CPU: 298 UID: 0 PID: 32611 Comm: qemu Tainted: G U 6.16.0-smp--e6c618b51cfe-sleep #782 NONE\n Tainted: [U]=USER\n Hardware name: Google Astoria-Turin/astoria, BIOS 0.20241223.2-0 01/17/2025\n Call Trace:\n \u003cTASK\u003e\n dump_stack_lvl+0x7d/0xb0\n __might_resched+0x271/0x290\n __might_fault+0x28/0x80\n kvm_vcpu_read_guest_page+0x8d/0xc0 [kvm]\n kvm_fetch_guest_virt+0x92/0xc0 [kvm]\n __do_insn_fetch_bytes+0xf3/0x1e0 [kvm]\n x86_decode_insn+0xd1/0x1010 [kvm]\n x86_emulate_instruction+0x105/0x810 [kvm]\n __svm_skip_emulated_instruction+0xc4/0x140 [kvm_amd]\n handle_fastpath_invd+0xc4/0x1a0 [kvm]\n vcpu_run+0x11a1/0x1db0 [kvm]\n kvm_arch_vcpu_ioctl_run+0x5cc/0x730 [kvm]\n kvm_vcpu_ioctl+0x578/0x6a0 [kvm]\n __se_sys_ioctl+0x6d/0xb0\n do_syscall_64+0x8a/0x2c0\n entry_SYSCALL_64_after_hwframe+0x4b/0x53\n RIP: 0033:0x7f479d57a94b\n \u003c/TASK\u003e\n\nNote, this is essentially a reapply of commit 5c30e8101e8d (\"KVM: SVM:\nSkip WRMSR fastpath on VM-Exit if next RIP isn\u0027t valid\"), but with\ndifferent justification (KVM now grabs SRCU when skipping the instruction\nfor other reasons).",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.1:kernel-devel-rt-6.4.0-39.1.noarch",
"SUSE Linux Micro 6.1:kernel-rt-6.4.0-39.1.aarch64",
"SUSE Linux Micro 6.1:kernel-rt-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.1:kernel-rt-devel-6.4.0-39.1.aarch64",
"SUSE Linux Micro 6.1:kernel-rt-devel-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.1:kernel-rt-livepatch-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.1:kernel-source-rt-6.4.0-39.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40038",
"url": "https://www.suse.com/security/cve/CVE-2025-40038"
},
{
"category": "external",
"summary": "SUSE Bug 1252817 for CVE-2025-40038",
"url": "https://bugzilla.suse.com/1252817"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.1:kernel-devel-rt-6.4.0-39.1.noarch",
"SUSE Linux Micro 6.1:kernel-rt-6.4.0-39.1.aarch64",
"SUSE Linux Micro 6.1:kernel-rt-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.1:kernel-rt-devel-6.4.0-39.1.aarch64",
"SUSE Linux Micro 6.1:kernel-rt-devel-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.1:kernel-rt-livepatch-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.1:kernel-source-rt-6.4.0-39.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.1:kernel-devel-rt-6.4.0-39.1.noarch",
"SUSE Linux Micro 6.1:kernel-rt-6.4.0-39.1.aarch64",
"SUSE Linux Micro 6.1:kernel-rt-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.1:kernel-rt-devel-6.4.0-39.1.aarch64",
"SUSE Linux Micro 6.1:kernel-rt-devel-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.1:kernel-rt-livepatch-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.1:kernel-source-rt-6.4.0-39.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-07T10:55:44Z",
"details": "moderate"
}
],
"title": "CVE-2025-40038"
},
{
"cve": "CVE-2025-40040",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40040"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nmm/ksm: fix flag-dropping behavior in ksm_madvise\n\nsyzkaller discovered the following crash: (kernel BUG)\n\n[ 44.607039] ------------[ cut here ]------------\n[ 44.607422] kernel BUG at mm/userfaultfd.c:2067!\n[ 44.608148] Oops: invalid opcode: 0000 [#1] SMP DEBUG_PAGEALLOC KASAN NOPTI\n[ 44.608814] CPU: 1 UID: 0 PID: 2475 Comm: reproducer Not tainted 6.16.0-rc6 #1 PREEMPT(none)\n[ 44.609635] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.16.3-0-ga6ed6b701f0a-prebuilt.qemu.org 04/01/2014\n[ 44.610695] RIP: 0010:userfaultfd_release_all+0x3a8/0x460\n\n\u003csnip other registers, drop unreliable trace\u003e\n\n[ 44.617726] Call Trace:\n[ 44.617926] \u003cTASK\u003e\n[ 44.619284] userfaultfd_release+0xef/0x1b0\n[ 44.620976] __fput+0x3f9/0xb60\n[ 44.621240] fput_close_sync+0x110/0x210\n[ 44.622222] __x64_sys_close+0x8f/0x120\n[ 44.622530] do_syscall_64+0x5b/0x2f0\n[ 44.622840] entry_SYSCALL_64_after_hwframe+0x76/0x7e\n[ 44.623244] RIP: 0033:0x7f365bb3f227\n\nKernel panics because it detects UFFD inconsistency during\nuserfaultfd_release_all(). Specifically, a VMA which has a valid pointer\nto vma-\u003evm_userfaultfd_ctx, but no UFFD flags in vma-\u003evm_flags.\n\nThe inconsistency is caused in ksm_madvise(): when user calls madvise()\nwith MADV_UNMEARGEABLE on a VMA that is registered for UFFD in MINOR mode,\nit accidentally clears all flags stored in the upper 32 bits of\nvma-\u003evm_flags.\n\nAssuming x86_64 kernel build, unsigned long is 64-bit and unsigned int and\nint are 32-bit wide. This setup causes the following mishap during the \u0026=\n~VM_MERGEABLE assignment.\n\nVM_MERGEABLE is a 32-bit constant of type unsigned int, 0x8000\u00270000. \nAfter ~ is applied, it becomes 0x7fff\u0027ffff unsigned int, which is then\npromoted to unsigned long before the \u0026 operation. This promotion fills\nupper 32 bits with leading 0s, as we\u0027re doing unsigned conversion (and\neven for a signed conversion, this wouldn\u0027t help as the leading bit is 0).\n\u0026 operation thus ends up AND-ing vm_flags with 0x0000\u00270000\u00277fff\u0027ffff\ninstead of intended 0xffff\u0027ffff\u00277fff\u0027ffff and hence accidentally clears\nthe upper 32-bits of its value.\n\nFix it by changing `VM_MERGEABLE` constant to unsigned long, using the\nBIT() macro.\n\nNote: other VM_* flags are not affected: This only happens to the\nVM_MERGEABLE flag, as the other VM_* flags are all constants of type int\nand after ~ operation, they end up with leading 1 and are thus converted\nto unsigned long with leading 1s.\n\nNote 2:\nAfter commit 31defc3b01d9 (\"userfaultfd: remove (VM_)BUG_ON()s\"), this is\nno longer a kernel BUG, but a WARNING at the same place:\n\n[ 45.595973] WARNING: CPU: 1 PID: 2474 at mm/userfaultfd.c:2067\n\nbut the root-cause (flag-drop) remains the same.\n\n[akpm@linux-foundation.org: rust bindgen wasn\u0027t able to handle BIT(), from Miguel]",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.1:kernel-devel-rt-6.4.0-39.1.noarch",
"SUSE Linux Micro 6.1:kernel-rt-6.4.0-39.1.aarch64",
"SUSE Linux Micro 6.1:kernel-rt-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.1:kernel-rt-devel-6.4.0-39.1.aarch64",
"SUSE Linux Micro 6.1:kernel-rt-devel-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.1:kernel-rt-livepatch-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.1:kernel-source-rt-6.4.0-39.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40040",
"url": "https://www.suse.com/security/cve/CVE-2025-40040"
},
{
"category": "external",
"summary": "SUSE Bug 1252780 for CVE-2025-40040",
"url": "https://bugzilla.suse.com/1252780"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.1:kernel-devel-rt-6.4.0-39.1.noarch",
"SUSE Linux Micro 6.1:kernel-rt-6.4.0-39.1.aarch64",
"SUSE Linux Micro 6.1:kernel-rt-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.1:kernel-rt-devel-6.4.0-39.1.aarch64",
"SUSE Linux Micro 6.1:kernel-rt-devel-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.1:kernel-rt-livepatch-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.1:kernel-source-rt-6.4.0-39.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.1:kernel-devel-rt-6.4.0-39.1.noarch",
"SUSE Linux Micro 6.1:kernel-rt-6.4.0-39.1.aarch64",
"SUSE Linux Micro 6.1:kernel-rt-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.1:kernel-rt-devel-6.4.0-39.1.aarch64",
"SUSE Linux Micro 6.1:kernel-rt-devel-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.1:kernel-rt-livepatch-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.1:kernel-source-rt-6.4.0-39.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-07T10:55:44Z",
"details": "moderate"
}
],
"title": "CVE-2025-40040"
},
{
"cve": "CVE-2025-40048",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40048"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nuio_hv_generic: Let userspace take care of interrupt mask\n\nRemove the logic to set interrupt mask by default in uio_hv_generic\ndriver as the interrupt mask value is supposed to be controlled\ncompletely by the user space. If the mask bit gets changed\nby the driver, concurrently with user mode operating on the ring,\nthe mask bit may be set when it is supposed to be clear, and the\nuser-mode driver will miss an interrupt which will cause a hang.\n\nFor eg- when the driver sets inbound ring buffer interrupt mask to 1,\nthe host does not interrupt the guest on the UIO VMBus channel.\nHowever, setting the mask does not prevent the host from putting a\nmessage in the inbound ring buffer. So let\u0027s assume that happens,\nthe host puts a message into the ring buffer but does not interrupt.\n\nSubsequently, the user space code in the guest sets the inbound ring\nbuffer interrupt mask to 0, saying \"Hey, I\u0027m ready for interrupts\".\nUser space code then calls pread() to wait for an interrupt.\nThen one of two things happens:\n\n* The host never sends another message. So the pread() waits forever.\n* The host does send another message. But because there\u0027s already a\n message in the ring buffer, it doesn\u0027t generate an interrupt.\n This is the correct behavior, because the host should only send an\n interrupt when the inbound ring buffer transitions from empty to\n not-empty. Adding an additional message to a ring buffer that is not\n empty is not supposed to generate an interrupt on the guest.\n Since the guest is waiting in pread() and not removing messages from\n the ring buffer, the pread() waits forever.\n\nThis could be easily reproduced in hv_fcopy_uio_daemon if we delay\nsetting interrupt mask to 0.\n\nSimilarly if hv_uio_channel_cb() sets the interrupt_mask to 1,\nthere\u0027s a race condition. Once user space empties the inbound ring\nbuffer, but before user space sets interrupt_mask to 0, the host could\nput another message in the ring buffer but it wouldn\u0027t interrupt.\nThen the next pread() would hang.\n\nFix these by removing all instances where interrupt_mask is changed,\nwhile keeping the one in set_event() unchanged to enable userspace\ncontrol the interrupt mask by writing 0/1 to /dev/uioX.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.1:kernel-devel-rt-6.4.0-39.1.noarch",
"SUSE Linux Micro 6.1:kernel-rt-6.4.0-39.1.aarch64",
"SUSE Linux Micro 6.1:kernel-rt-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.1:kernel-rt-devel-6.4.0-39.1.aarch64",
"SUSE Linux Micro 6.1:kernel-rt-devel-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.1:kernel-rt-livepatch-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.1:kernel-source-rt-6.4.0-39.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40048",
"url": "https://www.suse.com/security/cve/CVE-2025-40048"
},
{
"category": "external",
"summary": "SUSE Bug 1252862 for CVE-2025-40048",
"url": "https://bugzilla.suse.com/1252862"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.1:kernel-devel-rt-6.4.0-39.1.noarch",
"SUSE Linux Micro 6.1:kernel-rt-6.4.0-39.1.aarch64",
"SUSE Linux Micro 6.1:kernel-rt-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.1:kernel-rt-devel-6.4.0-39.1.aarch64",
"SUSE Linux Micro 6.1:kernel-rt-devel-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.1:kernel-rt-livepatch-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.1:kernel-source-rt-6.4.0-39.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.1:kernel-devel-rt-6.4.0-39.1.noarch",
"SUSE Linux Micro 6.1:kernel-rt-6.4.0-39.1.aarch64",
"SUSE Linux Micro 6.1:kernel-rt-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.1:kernel-rt-devel-6.4.0-39.1.aarch64",
"SUSE Linux Micro 6.1:kernel-rt-devel-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.1:kernel-rt-livepatch-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.1:kernel-source-rt-6.4.0-39.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-07T10:55:44Z",
"details": "moderate"
}
],
"title": "CVE-2025-40048"
},
{
"cve": "CVE-2025-40055",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40055"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nocfs2: fix double free in user_cluster_connect()\n\nuser_cluster_disconnect() frees \"conn-\u003ecc_private\" which is \"lc\" but then\nthe error handling frees \"lc\" a second time. Set \"lc\" to NULL on this\npath to avoid a double free.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.1:kernel-devel-rt-6.4.0-39.1.noarch",
"SUSE Linux Micro 6.1:kernel-rt-6.4.0-39.1.aarch64",
"SUSE Linux Micro 6.1:kernel-rt-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.1:kernel-rt-devel-6.4.0-39.1.aarch64",
"SUSE Linux Micro 6.1:kernel-rt-devel-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.1:kernel-rt-livepatch-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.1:kernel-source-rt-6.4.0-39.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40055",
"url": "https://www.suse.com/security/cve/CVE-2025-40055"
},
{
"category": "external",
"summary": "SUSE Bug 1252821 for CVE-2025-40055",
"url": "https://bugzilla.suse.com/1252821"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.1:kernel-devel-rt-6.4.0-39.1.noarch",
"SUSE Linux Micro 6.1:kernel-rt-6.4.0-39.1.aarch64",
"SUSE Linux Micro 6.1:kernel-rt-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.1:kernel-rt-devel-6.4.0-39.1.aarch64",
"SUSE Linux Micro 6.1:kernel-rt-devel-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.1:kernel-rt-livepatch-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.1:kernel-source-rt-6.4.0-39.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.1:kernel-devel-rt-6.4.0-39.1.noarch",
"SUSE Linux Micro 6.1:kernel-rt-6.4.0-39.1.aarch64",
"SUSE Linux Micro 6.1:kernel-rt-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.1:kernel-rt-devel-6.4.0-39.1.aarch64",
"SUSE Linux Micro 6.1:kernel-rt-devel-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.1:kernel-rt-livepatch-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.1:kernel-source-rt-6.4.0-39.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-07T10:55:44Z",
"details": "moderate"
}
],
"title": "CVE-2025-40055"
},
{
"cve": "CVE-2025-40059",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40059"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\ncoresight: Fix incorrect handling for return value of devm_kzalloc\n\nThe return value of devm_kzalloc could be an null pointer,\nuse \"!desc.pdata\" to fix incorrect handling return value\nof devm_kzalloc.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.1:kernel-devel-rt-6.4.0-39.1.noarch",
"SUSE Linux Micro 6.1:kernel-rt-6.4.0-39.1.aarch64",
"SUSE Linux Micro 6.1:kernel-rt-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.1:kernel-rt-devel-6.4.0-39.1.aarch64",
"SUSE Linux Micro 6.1:kernel-rt-devel-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.1:kernel-rt-livepatch-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.1:kernel-source-rt-6.4.0-39.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40059",
"url": "https://www.suse.com/security/cve/CVE-2025-40059"
},
{
"category": "external",
"summary": "SUSE Bug 1252809 for CVE-2025-40059",
"url": "https://bugzilla.suse.com/1252809"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.1:kernel-devel-rt-6.4.0-39.1.noarch",
"SUSE Linux Micro 6.1:kernel-rt-6.4.0-39.1.aarch64",
"SUSE Linux Micro 6.1:kernel-rt-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.1:kernel-rt-devel-6.4.0-39.1.aarch64",
"SUSE Linux Micro 6.1:kernel-rt-devel-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.1:kernel-rt-livepatch-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.1:kernel-source-rt-6.4.0-39.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.1:kernel-devel-rt-6.4.0-39.1.noarch",
"SUSE Linux Micro 6.1:kernel-rt-6.4.0-39.1.aarch64",
"SUSE Linux Micro 6.1:kernel-rt-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.1:kernel-rt-devel-6.4.0-39.1.aarch64",
"SUSE Linux Micro 6.1:kernel-rt-devel-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.1:kernel-rt-livepatch-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.1:kernel-source-rt-6.4.0-39.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-07T10:55:44Z",
"details": "moderate"
}
],
"title": "CVE-2025-40059"
},
{
"cve": "CVE-2025-40064",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40064"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nsmc: Fix use-after-free in __pnet_find_base_ndev().\n\nsyzbot reported use-after-free of net_device in __pnet_find_base_ndev(),\nwhich was called during connect(). [0]\n\nsmc_pnet_find_ism_resource() fetches sk_dst_get(sk)-\u003edev and passes\ndown to pnet_find_base_ndev(), where RTNL is held. Then, UAF happened\nat __pnet_find_base_ndev() when the dev is first used.\n\nThis means dev had already been freed before acquiring RTNL in\npnet_find_base_ndev().\n\nWhile dev is going away, dst-\u003edev could be swapped with blackhole_netdev,\nand the dev\u0027s refcnt by dst will be released.\n\nWe must hold dev\u0027s refcnt before calling smc_pnet_find_ism_resource().\n\nAlso, smc_pnet_find_roce_resource() has the same problem.\n\nLet\u0027s use __sk_dst_get() and dst_dev_rcu() in the two functions.\n\n[0]:\nBUG: KASAN: use-after-free in __pnet_find_base_ndev+0x1b1/0x1c0 net/smc/smc_pnet.c:926\nRead of size 1 at addr ffff888036bac33a by task syz.0.3632/18609\n\nCPU: 1 UID: 0 PID: 18609 Comm: syz.0.3632 Not tainted syzkaller #0 PREEMPT(full)\nHardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/18/2025\nCall Trace:\n \u003cTASK\u003e\n dump_stack_lvl+0x189/0x250 lib/dump_stack.c:120\n print_address_description mm/kasan/report.c:378 [inline]\n print_report+0xca/0x240 mm/kasan/report.c:482\n kasan_report+0x118/0x150 mm/kasan/report.c:595\n __pnet_find_base_ndev+0x1b1/0x1c0 net/smc/smc_pnet.c:926\n pnet_find_base_ndev net/smc/smc_pnet.c:946 [inline]\n smc_pnet_find_ism_by_pnetid net/smc/smc_pnet.c:1103 [inline]\n smc_pnet_find_ism_resource+0xef/0x390 net/smc/smc_pnet.c:1154\n smc_find_ism_device net/smc/af_smc.c:1030 [inline]\n smc_find_proposal_devices net/smc/af_smc.c:1115 [inline]\n __smc_connect+0x372/0x1890 net/smc/af_smc.c:1545\n smc_connect+0x877/0xd90 net/smc/af_smc.c:1715\n __sys_connect_file net/socket.c:2086 [inline]\n __sys_connect+0x313/0x440 net/socket.c:2105\n __do_sys_connect net/socket.c:2111 [inline]\n __se_sys_connect net/socket.c:2108 [inline]\n __x64_sys_connect+0x7a/0x90 net/socket.c:2108\n do_syscall_x64 arch/x86/entry/syscall_64.c:63 [inline]\n do_syscall_64+0xfa/0x3b0 arch/x86/entry/syscall_64.c:94\n entry_SYSCALL_64_after_hwframe+0x77/0x7f\nRIP: 0033:0x7f47cbf8eba9\nCode: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 \u003c48\u003e 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48\nRSP: 002b:00007f47ccdb1038 EFLAGS: 00000246 ORIG_RAX: 000000000000002a\nRAX: ffffffffffffffda RBX: 00007f47cc1d5fa0 RCX: 00007f47cbf8eba9\nRDX: 0000000000000010 RSI: 0000200000000280 RDI: 000000000000000b\nRBP: 00007f47cc011e19 R08: 0000000000000000 R09: 0000000000000000\nR10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000\nR13: 00007f47cc1d6038 R14: 00007f47cc1d5fa0 R15: 00007ffc512f8aa8\n \u003c/TASK\u003e\n\nThe buggy address belongs to the physical page:\npage: refcount:0 mapcount:0 mapping:0000000000000000 index:0xffff888036bacd00 pfn:0x36bac\nflags: 0xfff00000000000(node=0|zone=1|lastcpupid=0x7ff)\nraw: 00fff00000000000 ffffea0001243d08 ffff8880b863fdc0 0000000000000000\nraw: ffff888036bacd00 0000000000000000 00000000ffffffff 0000000000000000\npage dumped because: kasan: bad access detected\npage_owner tracks the page as freed\npage last allocated via order 2, migratetype Unmovable, gfp_mask 0x446dc0(GFP_KERNEL_ACCOUNT|__GFP_ZERO|__GFP_NOWARN|__GFP_RETRY_MAYFAIL|__GFP_COMP), pid 16741, tgid 16741 (syz-executor), ts 343313197788, free_ts 380670750466\n set_page_owner include/linux/page_owner.h:32 [inline]\n post_alloc_hook+0x240/0x2a0 mm/page_alloc.c:1851\n prep_new_page mm/page_alloc.c:1859 [inline]\n get_page_from_freelist+0x21e4/0x22c0 mm/page_alloc.c:3858\n __alloc_frozen_pages_noprof+0x181/0x370 mm/page_alloc.c:5148\n alloc_pages_mpol+0x232/0x4a0 mm/mempolicy.c:2416\n ___kmalloc_large_node+0x5f/0x1b0 mm/slub.c:4317\n __kmalloc_large_node_noprof+0x18/0x90 mm/slub.c:4348\n __do_kmalloc_node mm/slub.c:4364 [inline]\n __kvmalloc_node\n---truncated---",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.1:kernel-devel-rt-6.4.0-39.1.noarch",
"SUSE Linux Micro 6.1:kernel-rt-6.4.0-39.1.aarch64",
"SUSE Linux Micro 6.1:kernel-rt-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.1:kernel-rt-devel-6.4.0-39.1.aarch64",
"SUSE Linux Micro 6.1:kernel-rt-devel-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.1:kernel-rt-livepatch-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.1:kernel-source-rt-6.4.0-39.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40064",
"url": "https://www.suse.com/security/cve/CVE-2025-40064"
},
{
"category": "external",
"summary": "SUSE Bug 1252845 for CVE-2025-40064",
"url": "https://bugzilla.suse.com/1252845"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.1:kernel-devel-rt-6.4.0-39.1.noarch",
"SUSE Linux Micro 6.1:kernel-rt-6.4.0-39.1.aarch64",
"SUSE Linux Micro 6.1:kernel-rt-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.1:kernel-rt-devel-6.4.0-39.1.aarch64",
"SUSE Linux Micro 6.1:kernel-rt-devel-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.1:kernel-rt-livepatch-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.1:kernel-source-rt-6.4.0-39.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.1:kernel-devel-rt-6.4.0-39.1.noarch",
"SUSE Linux Micro 6.1:kernel-rt-6.4.0-39.1.aarch64",
"SUSE Linux Micro 6.1:kernel-rt-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.1:kernel-rt-devel-6.4.0-39.1.aarch64",
"SUSE Linux Micro 6.1:kernel-rt-devel-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.1:kernel-rt-livepatch-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.1:kernel-source-rt-6.4.0-39.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-07T10:55:44Z",
"details": "moderate"
}
],
"title": "CVE-2025-40064"
},
{
"cve": "CVE-2025-40070",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40070"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\npps: fix warning in pps_register_cdev when register device fail\n\nSimilar to previous commit 2a934fdb01db (\"media: v4l2-dev: fix error\nhandling in __video_register_device()\"), the release hook should be set\nbefore device_register(). Otherwise, when device_register() return error\nand put_device() try to callback the release function, the below warning\nmay happen.\n\n ------------[ cut here ]------------\n WARNING: CPU: 1 PID: 4760 at drivers/base/core.c:2567 device_release+0x1bd/0x240 drivers/base/core.c:2567\n Modules linked in:\n CPU: 1 UID: 0 PID: 4760 Comm: syz.4.914 Not tainted 6.17.0-rc3+ #1 NONE\n RIP: 0010:device_release+0x1bd/0x240 drivers/base/core.c:2567\n Call Trace:\n \u003cTASK\u003e\n kobject_cleanup+0x136/0x410 lib/kobject.c:689\n kobject_release lib/kobject.c:720 [inline]\n kref_put include/linux/kref.h:65 [inline]\n kobject_put+0xe9/0x130 lib/kobject.c:737\n put_device+0x24/0x30 drivers/base/core.c:3797\n pps_register_cdev+0x2da/0x370 drivers/pps/pps.c:402\n pps_register_source+0x2f6/0x480 drivers/pps/kapi.c:108\n pps_tty_open+0x190/0x310 drivers/pps/clients/pps-ldisc.c:57\n tty_ldisc_open+0xa7/0x120 drivers/tty/tty_ldisc.c:432\n tty_set_ldisc+0x333/0x780 drivers/tty/tty_ldisc.c:563\n tiocsetd drivers/tty/tty_io.c:2429 [inline]\n tty_ioctl+0x5d1/0x1700 drivers/tty/tty_io.c:2728\n vfs_ioctl fs/ioctl.c:51 [inline]\n __do_sys_ioctl fs/ioctl.c:598 [inline]\n __se_sys_ioctl fs/ioctl.c:584 [inline]\n __x64_sys_ioctl+0x194/0x210 fs/ioctl.c:584\n do_syscall_x64 arch/x86/entry/syscall_64.c:63 [inline]\n do_syscall_64+0x5f/0x2a0 arch/x86/entry/syscall_64.c:94\n entry_SYSCALL_64_after_hwframe+0x76/0x7e\n \u003c/TASK\u003e\n\nBefore commit c79a39dc8d06 (\"pps: Fix a use-after-free\"),\npps_register_cdev() call device_create() to create pps-\u003edev, which will\ninit dev-\u003erelease to device_create_release(). Now the comment is outdated,\njust remove it.\n\nThanks for the reminder from Calvin Owens, \u0027kfree_pps\u0027 should be removed\nin pps_register_source() to avoid a double free in the failure case.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.1:kernel-devel-rt-6.4.0-39.1.noarch",
"SUSE Linux Micro 6.1:kernel-rt-6.4.0-39.1.aarch64",
"SUSE Linux Micro 6.1:kernel-rt-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.1:kernel-rt-devel-6.4.0-39.1.aarch64",
"SUSE Linux Micro 6.1:kernel-rt-devel-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.1:kernel-rt-livepatch-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.1:kernel-source-rt-6.4.0-39.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40070",
"url": "https://www.suse.com/security/cve/CVE-2025-40070"
},
{
"category": "external",
"summary": "SUSE Bug 1252836 for CVE-2025-40070",
"url": "https://bugzilla.suse.com/1252836"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.1:kernel-devel-rt-6.4.0-39.1.noarch",
"SUSE Linux Micro 6.1:kernel-rt-6.4.0-39.1.aarch64",
"SUSE Linux Micro 6.1:kernel-rt-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.1:kernel-rt-devel-6.4.0-39.1.aarch64",
"SUSE Linux Micro 6.1:kernel-rt-devel-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.1:kernel-rt-livepatch-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.1:kernel-source-rt-6.4.0-39.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.1:kernel-devel-rt-6.4.0-39.1.noarch",
"SUSE Linux Micro 6.1:kernel-rt-6.4.0-39.1.aarch64",
"SUSE Linux Micro 6.1:kernel-rt-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.1:kernel-rt-devel-6.4.0-39.1.aarch64",
"SUSE Linux Micro 6.1:kernel-rt-devel-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.1:kernel-rt-livepatch-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.1:kernel-source-rt-6.4.0-39.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-07T10:55:44Z",
"details": "moderate"
}
],
"title": "CVE-2025-40070"
},
{
"cve": "CVE-2025-40074",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40074"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nipv4: start using dst_dev_rcu()\n\nChange icmpv4_xrlim_allow(), ip_defrag() to prevent possible UAF.\n\nChange ipmr_prepare_xmit(), ipmr_queue_fwd_xmit(), ip_mr_output(),\nipv4_neigh_lookup() to use lockdep enabled dst_dev_rcu().",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.1:kernel-devel-rt-6.4.0-39.1.noarch",
"SUSE Linux Micro 6.1:kernel-rt-6.4.0-39.1.aarch64",
"SUSE Linux Micro 6.1:kernel-rt-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.1:kernel-rt-devel-6.4.0-39.1.aarch64",
"SUSE Linux Micro 6.1:kernel-rt-devel-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.1:kernel-rt-livepatch-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.1:kernel-source-rt-6.4.0-39.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40074",
"url": "https://www.suse.com/security/cve/CVE-2025-40074"
},
{
"category": "external",
"summary": "SUSE Bug 1252794 for CVE-2025-40074",
"url": "https://bugzilla.suse.com/1252794"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.1:kernel-devel-rt-6.4.0-39.1.noarch",
"SUSE Linux Micro 6.1:kernel-rt-6.4.0-39.1.aarch64",
"SUSE Linux Micro 6.1:kernel-rt-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.1:kernel-rt-devel-6.4.0-39.1.aarch64",
"SUSE Linux Micro 6.1:kernel-rt-devel-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.1:kernel-rt-livepatch-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.1:kernel-source-rt-6.4.0-39.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.1:kernel-devel-rt-6.4.0-39.1.noarch",
"SUSE Linux Micro 6.1:kernel-rt-6.4.0-39.1.aarch64",
"SUSE Linux Micro 6.1:kernel-rt-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.1:kernel-rt-devel-6.4.0-39.1.aarch64",
"SUSE Linux Micro 6.1:kernel-rt-devel-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.1:kernel-rt-livepatch-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.1:kernel-source-rt-6.4.0-39.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-07T10:55:44Z",
"details": "moderate"
}
],
"title": "CVE-2025-40074"
},
{
"cve": "CVE-2025-40075",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40075"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\ntcp_metrics: use dst_dev_net_rcu()\n\nReplace three dst_dev() with a lockdep enabled helper.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.1:kernel-devel-rt-6.4.0-39.1.noarch",
"SUSE Linux Micro 6.1:kernel-rt-6.4.0-39.1.aarch64",
"SUSE Linux Micro 6.1:kernel-rt-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.1:kernel-rt-devel-6.4.0-39.1.aarch64",
"SUSE Linux Micro 6.1:kernel-rt-devel-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.1:kernel-rt-livepatch-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.1:kernel-source-rt-6.4.0-39.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40075",
"url": "https://www.suse.com/security/cve/CVE-2025-40075"
},
{
"category": "external",
"summary": "SUSE Bug 1252795 for CVE-2025-40075",
"url": "https://bugzilla.suse.com/1252795"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.1:kernel-devel-rt-6.4.0-39.1.noarch",
"SUSE Linux Micro 6.1:kernel-rt-6.4.0-39.1.aarch64",
"SUSE Linux Micro 6.1:kernel-rt-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.1:kernel-rt-devel-6.4.0-39.1.aarch64",
"SUSE Linux Micro 6.1:kernel-rt-devel-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.1:kernel-rt-livepatch-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.1:kernel-source-rt-6.4.0-39.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.1:kernel-devel-rt-6.4.0-39.1.noarch",
"SUSE Linux Micro 6.1:kernel-rt-6.4.0-39.1.aarch64",
"SUSE Linux Micro 6.1:kernel-rt-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.1:kernel-rt-devel-6.4.0-39.1.aarch64",
"SUSE Linux Micro 6.1:kernel-rt-devel-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.1:kernel-rt-livepatch-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.1:kernel-source-rt-6.4.0-39.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-07T10:55:44Z",
"details": "moderate"
}
],
"title": "CVE-2025-40075"
},
{
"cve": "CVE-2025-40083",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40083"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnet/sched: sch_qfq: Fix null-deref in agg_dequeue\n\nTo prevent a potential crash in agg_dequeue (net/sched/sch_qfq.c)\nwhen cl-\u003eqdisc-\u003eops-\u003epeek(cl-\u003eqdisc) returns NULL, we check the return\nvalue before using it, similar to the existing approach in sch_hfsc.c.\n\nTo avoid code duplication, the following changes are made:\n\n1. Changed qdisc_warn_nonwc(include/net/pkt_sched.h) into a static\ninline function.\n\n2. Moved qdisc_peek_len from net/sched/sch_hfsc.c to\ninclude/net/pkt_sched.h so that sch_qfq can reuse it.\n\n3. Applied qdisc_peek_len in agg_dequeue to avoid crashing.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.1:kernel-devel-rt-6.4.0-39.1.noarch",
"SUSE Linux Micro 6.1:kernel-rt-6.4.0-39.1.aarch64",
"SUSE Linux Micro 6.1:kernel-rt-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.1:kernel-rt-devel-6.4.0-39.1.aarch64",
"SUSE Linux Micro 6.1:kernel-rt-devel-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.1:kernel-rt-livepatch-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.1:kernel-source-rt-6.4.0-39.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40083",
"url": "https://www.suse.com/security/cve/CVE-2025-40083"
},
{
"category": "external",
"summary": "SUSE Bug 1252912 for CVE-2025-40083",
"url": "https://bugzilla.suse.com/1252912"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.1:kernel-devel-rt-6.4.0-39.1.noarch",
"SUSE Linux Micro 6.1:kernel-rt-6.4.0-39.1.aarch64",
"SUSE Linux Micro 6.1:kernel-rt-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.1:kernel-rt-devel-6.4.0-39.1.aarch64",
"SUSE Linux Micro 6.1:kernel-rt-devel-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.1:kernel-rt-livepatch-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.1:kernel-source-rt-6.4.0-39.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.1:kernel-devel-rt-6.4.0-39.1.noarch",
"SUSE Linux Micro 6.1:kernel-rt-6.4.0-39.1.aarch64",
"SUSE Linux Micro 6.1:kernel-rt-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.1:kernel-rt-devel-6.4.0-39.1.aarch64",
"SUSE Linux Micro 6.1:kernel-rt-devel-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.1:kernel-rt-livepatch-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.1:kernel-source-rt-6.4.0-39.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-07T10:55:44Z",
"details": "moderate"
}
],
"title": "CVE-2025-40083"
},
{
"cve": "CVE-2025-40098",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40098"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nALSA: hda: cs35l41: Fix NULL pointer dereference in cs35l41_get_acpi_mute_state()\n\nReturn value of a function acpi_evaluate_dsm() is dereferenced without\nchecking for NULL, but it is usually checked for this function.\n\nacpi_evaluate_dsm() may return NULL, when acpi_evaluate_object() returns\nacpi_status other than ACPI_SUCCESS, so add a check to prevent the crach.\n\nFound by Linux Verification Center (linuxtesting.org) with SVACE.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.1:kernel-devel-rt-6.4.0-39.1.noarch",
"SUSE Linux Micro 6.1:kernel-rt-6.4.0-39.1.aarch64",
"SUSE Linux Micro 6.1:kernel-rt-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.1:kernel-rt-devel-6.4.0-39.1.aarch64",
"SUSE Linux Micro 6.1:kernel-rt-devel-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.1:kernel-rt-livepatch-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.1:kernel-source-rt-6.4.0-39.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40098",
"url": "https://www.suse.com/security/cve/CVE-2025-40098"
},
{
"category": "external",
"summary": "SUSE Bug 1252917 for CVE-2025-40098",
"url": "https://bugzilla.suse.com/1252917"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.1:kernel-devel-rt-6.4.0-39.1.noarch",
"SUSE Linux Micro 6.1:kernel-rt-6.4.0-39.1.aarch64",
"SUSE Linux Micro 6.1:kernel-rt-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.1:kernel-rt-devel-6.4.0-39.1.aarch64",
"SUSE Linux Micro 6.1:kernel-rt-devel-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.1:kernel-rt-livepatch-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.1:kernel-source-rt-6.4.0-39.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.1:kernel-devel-rt-6.4.0-39.1.noarch",
"SUSE Linux Micro 6.1:kernel-rt-6.4.0-39.1.aarch64",
"SUSE Linux Micro 6.1:kernel-rt-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.1:kernel-rt-devel-6.4.0-39.1.aarch64",
"SUSE Linux Micro 6.1:kernel-rt-devel-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.1:kernel-rt-livepatch-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.1:kernel-source-rt-6.4.0-39.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-07T10:55:44Z",
"details": "moderate"
}
],
"title": "CVE-2025-40098"
},
{
"cve": "CVE-2025-40105",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40105"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nvfs: Don\u0027t leak disconnected dentries on umount\n\nWhen user calls open_by_handle_at() on some inode that is not cached, we\nwill create disconnected dentry for it. If such dentry is a directory,\nexportfs_decode_fh_raw() will then try to connect this dentry to the\ndentry tree through reconnect_path(). It may happen for various reasons\n(such as corrupted fs or race with rename) that the call to\nlookup_one_unlocked() in reconnect_one() will fail to find the dentry we\nare trying to reconnect and instead create a new dentry under the\nparent. Now this dentry will not be marked as disconnected although the\nparent still may well be disconnected (at least in case this\ninconsistency happened because the fs is corrupted and .. doesn\u0027t point\nto the real parent directory). This creates inconsistency in\ndisconnected flags but AFAICS it was mostly harmless. At least until\ncommit f1ee616214cb (\"VFS: don\u0027t keep disconnected dentries on d_anon\")\nwhich removed adding of most disconnected dentries to sb-\u003es_anon list.\nThus after this commit cleanup of disconnected dentries implicitely\nrelies on the fact that dput() will immediately reclaim such dentries.\nHowever when some leaf dentry isn\u0027t marked as disconnected, as in the\nscenario described above, the reclaim doesn\u0027t happen and the dentries\nare \"leaked\". Memory reclaim can eventually reclaim them but otherwise\nthey stay in memory and if umount comes first, we hit infamous \"Busy\ninodes after unmount\" bug. Make sure all dentries created under a\ndisconnected parent are marked as disconnected as well.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.1:kernel-devel-rt-6.4.0-39.1.noarch",
"SUSE Linux Micro 6.1:kernel-rt-6.4.0-39.1.aarch64",
"SUSE Linux Micro 6.1:kernel-rt-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.1:kernel-rt-devel-6.4.0-39.1.aarch64",
"SUSE Linux Micro 6.1:kernel-rt-devel-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.1:kernel-rt-livepatch-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.1:kernel-source-rt-6.4.0-39.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40105",
"url": "https://www.suse.com/security/cve/CVE-2025-40105"
},
{
"category": "external",
"summary": "SUSE Bug 1252928 for CVE-2025-40105",
"url": "https://bugzilla.suse.com/1252928"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.1:kernel-devel-rt-6.4.0-39.1.noarch",
"SUSE Linux Micro 6.1:kernel-rt-6.4.0-39.1.aarch64",
"SUSE Linux Micro 6.1:kernel-rt-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.1:kernel-rt-devel-6.4.0-39.1.aarch64",
"SUSE Linux Micro 6.1:kernel-rt-devel-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.1:kernel-rt-livepatch-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.1:kernel-source-rt-6.4.0-39.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.3,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.1:kernel-devel-rt-6.4.0-39.1.noarch",
"SUSE Linux Micro 6.1:kernel-rt-6.4.0-39.1.aarch64",
"SUSE Linux Micro 6.1:kernel-rt-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.1:kernel-rt-devel-6.4.0-39.1.aarch64",
"SUSE Linux Micro 6.1:kernel-rt-devel-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.1:kernel-rt-livepatch-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.1:kernel-source-rt-6.4.0-39.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-07T10:55:44Z",
"details": "low"
}
],
"title": "CVE-2025-40105"
},
{
"cve": "CVE-2025-40107",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40107"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\ncan: hi311x: fix null pointer dereference when resuming from sleep before interface was enabled\n\nThis issue is similar to the vulnerability in the `mcp251x` driver,\nwhich was fixed in commit 03c427147b2d (\"can: mcp251x: fix resume from\nsleep before interface was brought up\").\n\nIn the `hi311x` driver, when the device resumes from sleep, the driver\nschedules `priv-\u003erestart_work`. However, if the network interface was\nnot previously enabled, the `priv-\u003ewq` (workqueue) is not allocated and\ninitialized, leading to a null pointer dereference.\n\nTo fix this, we move the allocation and initialization of the workqueue\nfrom the `hi3110_open` function to the `hi3110_can_probe` function.\nThis ensures that the workqueue is properly initialized before it is\nused during device resume. And added logic to destroy the workqueue\nin the error handling paths of `hi3110_can_probe` and in the\n`hi3110_can_remove` function to prevent resource leaks.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.1:kernel-devel-rt-6.4.0-39.1.noarch",
"SUSE Linux Micro 6.1:kernel-rt-6.4.0-39.1.aarch64",
"SUSE Linux Micro 6.1:kernel-rt-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.1:kernel-rt-devel-6.4.0-39.1.aarch64",
"SUSE Linux Micro 6.1:kernel-rt-devel-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.1:kernel-rt-livepatch-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.1:kernel-source-rt-6.4.0-39.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40107",
"url": "https://www.suse.com/security/cve/CVE-2025-40107"
},
{
"category": "external",
"summary": "SUSE Bug 1253018 for CVE-2025-40107",
"url": "https://bugzilla.suse.com/1253018"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.1:kernel-devel-rt-6.4.0-39.1.noarch",
"SUSE Linux Micro 6.1:kernel-rt-6.4.0-39.1.aarch64",
"SUSE Linux Micro 6.1:kernel-rt-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.1:kernel-rt-devel-6.4.0-39.1.aarch64",
"SUSE Linux Micro 6.1:kernel-rt-devel-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.1:kernel-rt-livepatch-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.1:kernel-source-rt-6.4.0-39.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.1:kernel-devel-rt-6.4.0-39.1.noarch",
"SUSE Linux Micro 6.1:kernel-rt-6.4.0-39.1.aarch64",
"SUSE Linux Micro 6.1:kernel-rt-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.1:kernel-rt-devel-6.4.0-39.1.aarch64",
"SUSE Linux Micro 6.1:kernel-rt-devel-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.1:kernel-rt-livepatch-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.1:kernel-source-rt-6.4.0-39.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-07T10:55:44Z",
"details": "moderate"
}
],
"title": "CVE-2025-40107"
},
{
"cve": "CVE-2025-40109",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40109"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\ncrypto: rng - Ensure set_ent is always present\n\nEnsure that set_ent is always set since only drbg provides it.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.1:kernel-devel-rt-6.4.0-39.1.noarch",
"SUSE Linux Micro 6.1:kernel-rt-6.4.0-39.1.aarch64",
"SUSE Linux Micro 6.1:kernel-rt-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.1:kernel-rt-devel-6.4.0-39.1.aarch64",
"SUSE Linux Micro 6.1:kernel-rt-devel-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.1:kernel-rt-livepatch-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.1:kernel-source-rt-6.4.0-39.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40109",
"url": "https://www.suse.com/security/cve/CVE-2025-40109"
},
{
"category": "external",
"summary": "SUSE Bug 1253176 for CVE-2025-40109",
"url": "https://bugzilla.suse.com/1253176"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.1:kernel-devel-rt-6.4.0-39.1.noarch",
"SUSE Linux Micro 6.1:kernel-rt-6.4.0-39.1.aarch64",
"SUSE Linux Micro 6.1:kernel-rt-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.1:kernel-rt-devel-6.4.0-39.1.aarch64",
"SUSE Linux Micro 6.1:kernel-rt-devel-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.1:kernel-rt-livepatch-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.1:kernel-source-rt-6.4.0-39.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.1:kernel-devel-rt-6.4.0-39.1.noarch",
"SUSE Linux Micro 6.1:kernel-rt-6.4.0-39.1.aarch64",
"SUSE Linux Micro 6.1:kernel-rt-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.1:kernel-rt-devel-6.4.0-39.1.aarch64",
"SUSE Linux Micro 6.1:kernel-rt-devel-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.1:kernel-rt-livepatch-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.1:kernel-source-rt-6.4.0-39.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-07T10:55:44Z",
"details": "moderate"
}
],
"title": "CVE-2025-40109"
},
{
"cve": "CVE-2025-40110",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40110"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\ndrm/vmwgfx: Fix a null-ptr access in the cursor snooper\n\nCheck that the resource which is converted to a surface exists before\ntrying to use the cursor snooper on it.\n\nvmw_cmd_res_check allows explicit invalid (SVGA3D_INVALID_ID) identifiers\nbecause some svga commands accept SVGA3D_INVALID_ID to mean \"no surface\",\nunfortunately functions that accept the actual surfaces as objects might\n(and in case of the cursor snooper, do not) be able to handle null\nobjects. Make sure that we validate not only the identifier (via the\nvmw_cmd_res_check) but also check that the actual resource exists before\ntrying to do something with it.\n\nFixes unchecked null-ptr reference in the snooping code.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.1:kernel-devel-rt-6.4.0-39.1.noarch",
"SUSE Linux Micro 6.1:kernel-rt-6.4.0-39.1.aarch64",
"SUSE Linux Micro 6.1:kernel-rt-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.1:kernel-rt-devel-6.4.0-39.1.aarch64",
"SUSE Linux Micro 6.1:kernel-rt-devel-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.1:kernel-rt-livepatch-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.1:kernel-source-rt-6.4.0-39.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40110",
"url": "https://www.suse.com/security/cve/CVE-2025-40110"
},
{
"category": "external",
"summary": "SUSE Bug 1253275 for CVE-2025-40110",
"url": "https://bugzilla.suse.com/1253275"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.1:kernel-devel-rt-6.4.0-39.1.noarch",
"SUSE Linux Micro 6.1:kernel-rt-6.4.0-39.1.aarch64",
"SUSE Linux Micro 6.1:kernel-rt-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.1:kernel-rt-devel-6.4.0-39.1.aarch64",
"SUSE Linux Micro 6.1:kernel-rt-devel-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.1:kernel-rt-livepatch-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.1:kernel-source-rt-6.4.0-39.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.1,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.1:kernel-devel-rt-6.4.0-39.1.noarch",
"SUSE Linux Micro 6.1:kernel-rt-6.4.0-39.1.aarch64",
"SUSE Linux Micro 6.1:kernel-rt-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.1:kernel-rt-devel-6.4.0-39.1.aarch64",
"SUSE Linux Micro 6.1:kernel-rt-devel-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.1:kernel-rt-livepatch-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.1:kernel-source-rt-6.4.0-39.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-07T10:55:44Z",
"details": "moderate"
}
],
"title": "CVE-2025-40110"
},
{
"cve": "CVE-2025-40111",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40111"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\ndrm/vmwgfx: Fix Use-after-free in validation\n\nNodes stored in the validation duplicates hashtable come from an arena\nallocator that is cleared at the end of vmw_execbuf_process. All nodes\nare expected to be cleared in vmw_validation_drop_ht but this node escaped\nbecause its resource was destroyed prematurely.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.1:kernel-devel-rt-6.4.0-39.1.noarch",
"SUSE Linux Micro 6.1:kernel-rt-6.4.0-39.1.aarch64",
"SUSE Linux Micro 6.1:kernel-rt-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.1:kernel-rt-devel-6.4.0-39.1.aarch64",
"SUSE Linux Micro 6.1:kernel-rt-devel-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.1:kernel-rt-livepatch-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.1:kernel-source-rt-6.4.0-39.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40111",
"url": "https://www.suse.com/security/cve/CVE-2025-40111"
},
{
"category": "external",
"summary": "SUSE Bug 1253362 for CVE-2025-40111",
"url": "https://bugzilla.suse.com/1253362"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.1:kernel-devel-rt-6.4.0-39.1.noarch",
"SUSE Linux Micro 6.1:kernel-rt-6.4.0-39.1.aarch64",
"SUSE Linux Micro 6.1:kernel-rt-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.1:kernel-rt-devel-6.4.0-39.1.aarch64",
"SUSE Linux Micro 6.1:kernel-rt-devel-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.1:kernel-rt-livepatch-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.1:kernel-source-rt-6.4.0-39.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.7,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:L/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.1:kernel-devel-rt-6.4.0-39.1.noarch",
"SUSE Linux Micro 6.1:kernel-rt-6.4.0-39.1.aarch64",
"SUSE Linux Micro 6.1:kernel-rt-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.1:kernel-rt-devel-6.4.0-39.1.aarch64",
"SUSE Linux Micro 6.1:kernel-rt-devel-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.1:kernel-rt-livepatch-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.1:kernel-source-rt-6.4.0-39.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-07T10:55:44Z",
"details": "moderate"
}
],
"title": "CVE-2025-40111"
},
{
"cve": "CVE-2025-40115",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40115"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nscsi: mpt3sas: Fix crash in transport port remove by using ioc_info()\n\nDuring mpt3sas_transport_port_remove(), messages were logged with\ndev_printk() against \u0026mpt3sas_port-\u003eport-\u003edev. At this point the SAS\ntransport device may already be partially unregistered or freed, leading\nto a crash when accessing its struct device.\n\nUsing ioc_info(), which logs via the PCI device (ioc-\u003epdev-\u003edev),\nguaranteed to remain valid until driver removal.\n\n[83428.295776] Oops: general protection fault, probably for non-canonical address 0x6f702f323a33312d: 0000 [#1] SMP NOPTI\n[83428.295785] CPU: 145 UID: 0 PID: 113296 Comm: rmmod Kdump: loaded Tainted: G OE 6.16.0-rc1+ #1 PREEMPT(voluntary)\n[83428.295792] Tainted: [O]=OOT_MODULE, [E]=UNSIGNED_MODULE\n[83428.295795] Hardware name: Dell Inc. Precision 7875 Tower/, BIOS 89.1.67 02/23/2024\n[83428.295799] RIP: 0010:__dev_printk+0x1f/0x70\n[83428.295805] Code: 90 90 90 90 90 90 90 90 90 90 90 0f 1f 44 00 00 49 89 d1 48 85 f6 74 52 4c 8b 46 50 4d 85 c0 74 1f 48 8b 46 68 48 85 c0 74 22 \u003c48\u003e 8b 08 0f b6 7f 01 48 c7 c2 db e8 42 ad 83 ef 30 e9 7b f8 ff ff\n[83428.295813] RSP: 0018:ff85aeafc3137bb0 EFLAGS: 00010206\n[83428.295817] RAX: 6f702f323a33312d RBX: ff4290ee81292860 RCX: 5000cca25103be32\n[83428.295820] RDX: ff85aeafc3137bb8 RSI: ff4290eeb1966c00 RDI: ffffffffc1560845\n[83428.295823] RBP: ff85aeafc3137c18 R08: 74726f702f303a33 R09: ff85aeafc3137bb8\n[83428.295826] R10: ff85aeafc3137b18 R11: ff4290f5bd60fe68 R12: ff4290ee81290000\n[83428.295830] R13: ff4290ee6e345de0 R14: ff4290ee81290000 R15: ff4290ee6e345e30\n[83428.295833] FS: 00007fd9472a6740(0000) GS:ff4290f5ce96b000(0000) knlGS:0000000000000000\n[83428.295837] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033\n[83428.295840] CR2: 00007f242b4db238 CR3: 00000002372b8006 CR4: 0000000000771ef0\n[83428.295844] PKRU: 55555554\n[83428.295846] Call Trace:\n[83428.295848] \u003cTASK\u003e\n[83428.295850] _dev_printk+0x5c/0x80\n[83428.295857] ? srso_alias_return_thunk+0x5/0xfbef5\n[83428.295863] mpt3sas_transport_port_remove+0x1c7/0x420 [mpt3sas]\n[83428.295882] _scsih_remove_device+0x21b/0x280 [mpt3sas]\n[83428.295894] ? _scsih_expander_node_remove+0x108/0x140 [mpt3sas]\n[83428.295906] ? srso_alias_return_thunk+0x5/0xfbef5\n[83428.295910] mpt3sas_device_remove_by_sas_address.part.0+0x8f/0x110 [mpt3sas]\n[83428.295921] _scsih_expander_node_remove+0x129/0x140 [mpt3sas]\n[83428.295933] _scsih_expander_node_remove+0x6a/0x140 [mpt3sas]\n[83428.295944] scsih_remove+0x3f0/0x4a0 [mpt3sas]\n[83428.295957] pci_device_remove+0x3b/0xb0\n[83428.295962] device_release_driver_internal+0x193/0x200\n[83428.295968] driver_detach+0x44/0x90\n[83428.295971] bus_remove_driver+0x69/0xf0\n[83428.295975] pci_unregister_driver+0x2a/0xb0\n[83428.295979] _mpt3sas_exit+0x1f/0x300 [mpt3sas]\n[83428.295991] __do_sys_delete_module.constprop.0+0x174/0x310\n[83428.295997] ? srso_alias_return_thunk+0x5/0xfbef5\n[83428.296000] ? __x64_sys_getdents64+0x9a/0x110\n[83428.296005] ? srso_alias_return_thunk+0x5/0xfbef5\n[83428.296009] ? syscall_trace_enter+0xf6/0x1b0\n[83428.296014] do_syscall_64+0x7b/0x2c0\n[83428.296019] ? srso_alias_return_thunk+0x5/0xfbef5\n[83428.296023] entry_SYSCALL_64_after_hwframe+0x76/0x7e",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.1:kernel-devel-rt-6.4.0-39.1.noarch",
"SUSE Linux Micro 6.1:kernel-rt-6.4.0-39.1.aarch64",
"SUSE Linux Micro 6.1:kernel-rt-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.1:kernel-rt-devel-6.4.0-39.1.aarch64",
"SUSE Linux Micro 6.1:kernel-rt-devel-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.1:kernel-rt-livepatch-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.1:kernel-source-rt-6.4.0-39.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40115",
"url": "https://www.suse.com/security/cve/CVE-2025-40115"
},
{
"category": "external",
"summary": "SUSE Bug 1253318 for CVE-2025-40115",
"url": "https://bugzilla.suse.com/1253318"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.1:kernel-devel-rt-6.4.0-39.1.noarch",
"SUSE Linux Micro 6.1:kernel-rt-6.4.0-39.1.aarch64",
"SUSE Linux Micro 6.1:kernel-rt-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.1:kernel-rt-devel-6.4.0-39.1.aarch64",
"SUSE Linux Micro 6.1:kernel-rt-devel-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.1:kernel-rt-livepatch-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.1:kernel-source-rt-6.4.0-39.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.1:kernel-devel-rt-6.4.0-39.1.noarch",
"SUSE Linux Micro 6.1:kernel-rt-6.4.0-39.1.aarch64",
"SUSE Linux Micro 6.1:kernel-rt-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.1:kernel-rt-devel-6.4.0-39.1.aarch64",
"SUSE Linux Micro 6.1:kernel-rt-devel-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.1:kernel-rt-livepatch-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.1:kernel-source-rt-6.4.0-39.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-07T10:55:44Z",
"details": "moderate"
}
],
"title": "CVE-2025-40115"
},
{
"cve": "CVE-2025-40116",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40116"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nusb: host: max3421-hcd: Fix error pointer dereference in probe cleanup\n\nThe kthread_run() function returns error pointers so the\nmax3421_hcd-\u003espi_thread pointer can be either error pointers or NULL.\nCheck for both before dereferencing it.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.1:kernel-devel-rt-6.4.0-39.1.noarch",
"SUSE Linux Micro 6.1:kernel-rt-6.4.0-39.1.aarch64",
"SUSE Linux Micro 6.1:kernel-rt-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.1:kernel-rt-devel-6.4.0-39.1.aarch64",
"SUSE Linux Micro 6.1:kernel-rt-devel-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.1:kernel-rt-livepatch-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.1:kernel-source-rt-6.4.0-39.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40116",
"url": "https://www.suse.com/security/cve/CVE-2025-40116"
},
{
"category": "external",
"summary": "SUSE Bug 1253324 for CVE-2025-40116",
"url": "https://bugzilla.suse.com/1253324"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.1:kernel-devel-rt-6.4.0-39.1.noarch",
"SUSE Linux Micro 6.1:kernel-rt-6.4.0-39.1.aarch64",
"SUSE Linux Micro 6.1:kernel-rt-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.1:kernel-rt-devel-6.4.0-39.1.aarch64",
"SUSE Linux Micro 6.1:kernel-rt-devel-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.1:kernel-rt-livepatch-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.1:kernel-source-rt-6.4.0-39.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.1:kernel-devel-rt-6.4.0-39.1.noarch",
"SUSE Linux Micro 6.1:kernel-rt-6.4.0-39.1.aarch64",
"SUSE Linux Micro 6.1:kernel-rt-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.1:kernel-rt-devel-6.4.0-39.1.aarch64",
"SUSE Linux Micro 6.1:kernel-rt-devel-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.1:kernel-rt-livepatch-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.1:kernel-source-rt-6.4.0-39.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-07T10:55:44Z",
"details": "moderate"
}
],
"title": "CVE-2025-40116"
},
{
"cve": "CVE-2025-40118",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40118"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nscsi: pm80xx: Fix array-index-out-of-of-bounds on rmmod\n\nSince commit f7b705c238d1 (\"scsi: pm80xx: Set phy_attached to zero when\ndevice is gone\") UBSAN reports:\n\n UBSAN: array-index-out-of-bounds in drivers/scsi/pm8001/pm8001_sas.c:786:17\n index 28 is out of range for type \u0027pm8001_phy [16]\u0027\n\non rmmod when using an expander.\n\nFor a direct attached device, attached_phy contains the local phy id.\nFor a device behind an expander, attached_phy contains the remote phy\nid, not the local phy id.\n\nI.e. while pm8001_ha will have pm8001_ha-\u003echip-\u003en_phy local phys, for a\ndevice behind an expander, attached_phy can be much larger than\npm8001_ha-\u003echip-\u003en_phy (depending on the amount of phys of the\nexpander).\n\nE.g. on my system pm8001_ha has 8 phys with phy ids 0-7. One of the\nports has an expander connected. The expander has 31 phys with phy ids\n0-30.\n\nThe pm8001_ha-\u003ephy array only contains the phys of the HBA. It does not\ncontain the phys of the expander. Thus, it is wrong to use attached_phy\nto index the pm8001_ha-\u003ephy array for a device behind an expander.\n\nThus, we can only clear phy_attached for devices that are directly\nattached.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.1:kernel-devel-rt-6.4.0-39.1.noarch",
"SUSE Linux Micro 6.1:kernel-rt-6.4.0-39.1.aarch64",
"SUSE Linux Micro 6.1:kernel-rt-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.1:kernel-rt-devel-6.4.0-39.1.aarch64",
"SUSE Linux Micro 6.1:kernel-rt-devel-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.1:kernel-rt-livepatch-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.1:kernel-source-rt-6.4.0-39.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40118",
"url": "https://www.suse.com/security/cve/CVE-2025-40118"
},
{
"category": "external",
"summary": "SUSE Bug 1253363 for CVE-2025-40118",
"url": "https://bugzilla.suse.com/1253363"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.1:kernel-devel-rt-6.4.0-39.1.noarch",
"SUSE Linux Micro 6.1:kernel-rt-6.4.0-39.1.aarch64",
"SUSE Linux Micro 6.1:kernel-rt-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.1:kernel-rt-devel-6.4.0-39.1.aarch64",
"SUSE Linux Micro 6.1:kernel-rt-devel-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.1:kernel-rt-livepatch-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.1:kernel-source-rt-6.4.0-39.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.1,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.1:kernel-devel-rt-6.4.0-39.1.noarch",
"SUSE Linux Micro 6.1:kernel-rt-6.4.0-39.1.aarch64",
"SUSE Linux Micro 6.1:kernel-rt-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.1:kernel-rt-devel-6.4.0-39.1.aarch64",
"SUSE Linux Micro 6.1:kernel-rt-devel-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.1:kernel-rt-livepatch-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.1:kernel-source-rt-6.4.0-39.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-07T10:55:44Z",
"details": "moderate"
}
],
"title": "CVE-2025-40118"
},
{
"cve": "CVE-2025-40120",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40120"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnet: usb: asix: hold PM usage ref to avoid PM/MDIO + RTNL deadlock\n\nPrevent USB runtime PM (autosuspend) for AX88772* in bind.\n\nusbnet enables runtime PM (autosuspend) by default, so disabling it via\nthe usb_driver flag is ineffective. On AX88772B, autosuspend shows no\nmeasurable power saving with current driver (no link partner, admin\nup/down). The ~0.453 W -\u003e ~0.248 W drop on v6.1 comes from phylib powering\nthe PHY off on admin-down, not from USB autosuspend.\n\nThe real hazard is that with runtime PM enabled, ndo_open() (under RTNL)\nmay synchronously trigger autoresume (usb_autopm_get_interface()) into\nasix_resume() while the USB PM lock is held. Resume paths then invoke\nphylink/phylib and MDIO, which also expect RTNL, leading to possible\ndeadlocks or PM lock vs MDIO wake issues.\n\nTo avoid this, keep the device runtime-PM active by taking a usage\nreference in ax88772_bind() and dropping it in unbind(). A non-zero PM\nusage count blocks runtime suspend regardless of userspace policy\n(.../power/control - pm_runtime_allow/forbid), making this approach\nrobust against sysfs overrides.\n\nHolding a runtime-PM usage ref does not affect system-wide suspend;\nsystem sleep/resume callbacks continue to run as before.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.1:kernel-devel-rt-6.4.0-39.1.noarch",
"SUSE Linux Micro 6.1:kernel-rt-6.4.0-39.1.aarch64",
"SUSE Linux Micro 6.1:kernel-rt-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.1:kernel-rt-devel-6.4.0-39.1.aarch64",
"SUSE Linux Micro 6.1:kernel-rt-devel-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.1:kernel-rt-livepatch-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.1:kernel-source-rt-6.4.0-39.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40120",
"url": "https://www.suse.com/security/cve/CVE-2025-40120"
},
{
"category": "external",
"summary": "SUSE Bug 1253360 for CVE-2025-40120",
"url": "https://bugzilla.suse.com/1253360"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.1:kernel-devel-rt-6.4.0-39.1.noarch",
"SUSE Linux Micro 6.1:kernel-rt-6.4.0-39.1.aarch64",
"SUSE Linux Micro 6.1:kernel-rt-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.1:kernel-rt-devel-6.4.0-39.1.aarch64",
"SUSE Linux Micro 6.1:kernel-rt-devel-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.1:kernel-rt-livepatch-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.1:kernel-source-rt-6.4.0-39.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.1:kernel-devel-rt-6.4.0-39.1.noarch",
"SUSE Linux Micro 6.1:kernel-rt-6.4.0-39.1.aarch64",
"SUSE Linux Micro 6.1:kernel-rt-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.1:kernel-rt-devel-6.4.0-39.1.aarch64",
"SUSE Linux Micro 6.1:kernel-rt-devel-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.1:kernel-rt-livepatch-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.1:kernel-source-rt-6.4.0-39.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-07T10:55:44Z",
"details": "moderate"
}
],
"title": "CVE-2025-40120"
},
{
"cve": "CVE-2025-40121",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40121"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nASoC: Intel: bytcr_rt5651: Fix invalid quirk input mapping\n\nWhen an invalid value is passed via quirk option, currently\nbytcr_rt5640 driver just ignores and leaves as is, which may lead to\nunepxected results like OOB access.\n\nThis patch adds the sanity check and corrects the input mapping to the\ncertain default value if an invalid value is passed.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.1:kernel-devel-rt-6.4.0-39.1.noarch",
"SUSE Linux Micro 6.1:kernel-rt-6.4.0-39.1.aarch64",
"SUSE Linux Micro 6.1:kernel-rt-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.1:kernel-rt-devel-6.4.0-39.1.aarch64",
"SUSE Linux Micro 6.1:kernel-rt-devel-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.1:kernel-rt-livepatch-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.1:kernel-source-rt-6.4.0-39.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40121",
"url": "https://www.suse.com/security/cve/CVE-2025-40121"
},
{
"category": "external",
"summary": "SUSE Bug 1253367 for CVE-2025-40121",
"url": "https://bugzilla.suse.com/1253367"
},
{
"category": "external",
"summary": "SUSE Bug 1253430 for CVE-2025-40121",
"url": "https://bugzilla.suse.com/1253430"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.1:kernel-devel-rt-6.4.0-39.1.noarch",
"SUSE Linux Micro 6.1:kernel-rt-6.4.0-39.1.aarch64",
"SUSE Linux Micro 6.1:kernel-rt-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.1:kernel-rt-devel-6.4.0-39.1.aarch64",
"SUSE Linux Micro 6.1:kernel-rt-devel-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.1:kernel-rt-livepatch-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.1:kernel-source-rt-6.4.0-39.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.1:kernel-devel-rt-6.4.0-39.1.noarch",
"SUSE Linux Micro 6.1:kernel-rt-6.4.0-39.1.aarch64",
"SUSE Linux Micro 6.1:kernel-rt-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.1:kernel-rt-devel-6.4.0-39.1.aarch64",
"SUSE Linux Micro 6.1:kernel-rt-devel-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.1:kernel-rt-livepatch-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.1:kernel-source-rt-6.4.0-39.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-07T10:55:44Z",
"details": "moderate"
}
],
"title": "CVE-2025-40121"
},
{
"cve": "CVE-2025-40127",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40127"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nhwrng: ks-sa - fix division by zero in ks_sa_rng_init\n\nFix division by zero in ks_sa_rng_init caused by missing clock\npointer initialization. The clk_get_rate() call is performed on\nan uninitialized clk pointer, resulting in division by zero when\ncalculating delay values.\n\nAdd clock initialization code before using the clock.\n\n\n drivers/char/hw_random/ks-sa-rng.c | 7 +++++++\n 1 file changed, 7 insertions(+)",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.1:kernel-devel-rt-6.4.0-39.1.noarch",
"SUSE Linux Micro 6.1:kernel-rt-6.4.0-39.1.aarch64",
"SUSE Linux Micro 6.1:kernel-rt-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.1:kernel-rt-devel-6.4.0-39.1.aarch64",
"SUSE Linux Micro 6.1:kernel-rt-devel-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.1:kernel-rt-livepatch-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.1:kernel-source-rt-6.4.0-39.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40127",
"url": "https://www.suse.com/security/cve/CVE-2025-40127"
},
{
"category": "external",
"summary": "SUSE Bug 1253369 for CVE-2025-40127",
"url": "https://bugzilla.suse.com/1253369"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.1:kernel-devel-rt-6.4.0-39.1.noarch",
"SUSE Linux Micro 6.1:kernel-rt-6.4.0-39.1.aarch64",
"SUSE Linux Micro 6.1:kernel-rt-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.1:kernel-rt-devel-6.4.0-39.1.aarch64",
"SUSE Linux Micro 6.1:kernel-rt-devel-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.1:kernel-rt-livepatch-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.1:kernel-source-rt-6.4.0-39.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.1:kernel-devel-rt-6.4.0-39.1.noarch",
"SUSE Linux Micro 6.1:kernel-rt-6.4.0-39.1.aarch64",
"SUSE Linux Micro 6.1:kernel-rt-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.1:kernel-rt-devel-6.4.0-39.1.aarch64",
"SUSE Linux Micro 6.1:kernel-rt-devel-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.1:kernel-rt-livepatch-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.1:kernel-source-rt-6.4.0-39.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-07T10:55:44Z",
"details": "moderate"
}
],
"title": "CVE-2025-40127"
},
{
"cve": "CVE-2025-40129",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40129"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nsunrpc: fix null pointer dereference on zero-length checksum\n\nIn xdr_stream_decode_opaque_auth(), zero-length checksum.len causes\nchecksum.data to be set to NULL. This triggers a NPD when accessing\nchecksum.data in gss_krb5_verify_mic_v2(). This patch ensures that\nthe value of checksum.len is not less than XDR_UNIT.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.1:kernel-devel-rt-6.4.0-39.1.noarch",
"SUSE Linux Micro 6.1:kernel-rt-6.4.0-39.1.aarch64",
"SUSE Linux Micro 6.1:kernel-rt-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.1:kernel-rt-devel-6.4.0-39.1.aarch64",
"SUSE Linux Micro 6.1:kernel-rt-devel-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.1:kernel-rt-livepatch-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.1:kernel-source-rt-6.4.0-39.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40129",
"url": "https://www.suse.com/security/cve/CVE-2025-40129"
},
{
"category": "external",
"summary": "SUSE Bug 1253472 for CVE-2025-40129",
"url": "https://bugzilla.suse.com/1253472"
},
{
"category": "external",
"summary": "SUSE Bug 1253473 for CVE-2025-40129",
"url": "https://bugzilla.suse.com/1253473"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.1:kernel-devel-rt-6.4.0-39.1.noarch",
"SUSE Linux Micro 6.1:kernel-rt-6.4.0-39.1.aarch64",
"SUSE Linux Micro 6.1:kernel-rt-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.1:kernel-rt-devel-6.4.0-39.1.aarch64",
"SUSE Linux Micro 6.1:kernel-rt-devel-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.1:kernel-rt-livepatch-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.1:kernel-source-rt-6.4.0-39.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.1:kernel-devel-rt-6.4.0-39.1.noarch",
"SUSE Linux Micro 6.1:kernel-rt-6.4.0-39.1.aarch64",
"SUSE Linux Micro 6.1:kernel-rt-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.1:kernel-rt-devel-6.4.0-39.1.aarch64",
"SUSE Linux Micro 6.1:kernel-rt-devel-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.1:kernel-rt-livepatch-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.1:kernel-source-rt-6.4.0-39.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-07T10:55:44Z",
"details": "important"
}
],
"title": "CVE-2025-40129"
},
{
"cve": "CVE-2025-40139",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40139"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nsmc: Use __sk_dst_get() and dst_dev_rcu() in in smc_clc_prfx_set().\n\nsmc_clc_prfx_set() is called during connect() and not under RCU\nnor RTNL.\n\nUsing sk_dst_get(sk)-\u003edev could trigger UAF.\n\nLet\u0027s use __sk_dst_get() and dev_dst_rcu() under rcu_read_lock()\nafter kernel_getsockname().\n\nNote that the returned value of smc_clc_prfx_set() is not used\nin the caller.\n\nWhile at it, we change the 1st arg of smc_clc_prfx_set[46]_rcu()\nnot to touch dst there.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.1:kernel-devel-rt-6.4.0-39.1.noarch",
"SUSE Linux Micro 6.1:kernel-rt-6.4.0-39.1.aarch64",
"SUSE Linux Micro 6.1:kernel-rt-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.1:kernel-rt-devel-6.4.0-39.1.aarch64",
"SUSE Linux Micro 6.1:kernel-rt-devel-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.1:kernel-rt-livepatch-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.1:kernel-source-rt-6.4.0-39.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40139",
"url": "https://www.suse.com/security/cve/CVE-2025-40139"
},
{
"category": "external",
"summary": "SUSE Bug 1253409 for CVE-2025-40139",
"url": "https://bugzilla.suse.com/1253409"
},
{
"category": "external",
"summary": "SUSE Bug 1253411 for CVE-2025-40139",
"url": "https://bugzilla.suse.com/1253411"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.1:kernel-devel-rt-6.4.0-39.1.noarch",
"SUSE Linux Micro 6.1:kernel-rt-6.4.0-39.1.aarch64",
"SUSE Linux Micro 6.1:kernel-rt-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.1:kernel-rt-devel-6.4.0-39.1.aarch64",
"SUSE Linux Micro 6.1:kernel-rt-devel-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.1:kernel-rt-livepatch-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.1:kernel-source-rt-6.4.0-39.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.1:kernel-devel-rt-6.4.0-39.1.noarch",
"SUSE Linux Micro 6.1:kernel-rt-6.4.0-39.1.aarch64",
"SUSE Linux Micro 6.1:kernel-rt-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.1:kernel-rt-devel-6.4.0-39.1.aarch64",
"SUSE Linux Micro 6.1:kernel-rt-devel-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.1:kernel-rt-livepatch-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.1:kernel-source-rt-6.4.0-39.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-07T10:55:44Z",
"details": "important"
}
],
"title": "CVE-2025-40139"
},
{
"cve": "CVE-2025-40140",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40140"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnet: usb: Remove disruptive netif_wake_queue in rtl8150_set_multicast\n\nsyzbot reported WARNING in rtl8150_start_xmit/usb_submit_urb.\nThis is the sequence of events that leads to the warning:\n\nrtl8150_start_xmit() {\n\tnetif_stop_queue();\n\tusb_submit_urb(dev-\u003etx_urb);\n}\n\nrtl8150_set_multicast() {\n\tnetif_stop_queue();\n\tnetif_wake_queue();\t\t\u003c-- wakes up TX queue before URB is done\n}\n\nrtl8150_start_xmit() {\n\tnetif_stop_queue();\n\tusb_submit_urb(dev-\u003etx_urb);\t\u003c-- double submission\n}\n\nrtl8150_set_multicast being the ndo_set_rx_mode callback should not be\ncalling netif_stop_queue and notif_start_queue as these handle\nTX queue synchronization.\n\nThe net core function dev_set_rx_mode handles the synchronization\nfor rtl8150_set_multicast making it safe to remove these locks.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.1:kernel-devel-rt-6.4.0-39.1.noarch",
"SUSE Linux Micro 6.1:kernel-rt-6.4.0-39.1.aarch64",
"SUSE Linux Micro 6.1:kernel-rt-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.1:kernel-rt-devel-6.4.0-39.1.aarch64",
"SUSE Linux Micro 6.1:kernel-rt-devel-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.1:kernel-rt-livepatch-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.1:kernel-source-rt-6.4.0-39.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40140",
"url": "https://www.suse.com/security/cve/CVE-2025-40140"
},
{
"category": "external",
"summary": "SUSE Bug 1253349 for CVE-2025-40140",
"url": "https://bugzilla.suse.com/1253349"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.1:kernel-devel-rt-6.4.0-39.1.noarch",
"SUSE Linux Micro 6.1:kernel-rt-6.4.0-39.1.aarch64",
"SUSE Linux Micro 6.1:kernel-rt-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.1:kernel-rt-devel-6.4.0-39.1.aarch64",
"SUSE Linux Micro 6.1:kernel-rt-devel-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.1:kernel-rt-livepatch-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.1:kernel-source-rt-6.4.0-39.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.3,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.1:kernel-devel-rt-6.4.0-39.1.noarch",
"SUSE Linux Micro 6.1:kernel-rt-6.4.0-39.1.aarch64",
"SUSE Linux Micro 6.1:kernel-rt-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.1:kernel-rt-devel-6.4.0-39.1.aarch64",
"SUSE Linux Micro 6.1:kernel-rt-devel-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.1:kernel-rt-livepatch-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.1:kernel-source-rt-6.4.0-39.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-07T10:55:44Z",
"details": "low"
}
],
"title": "CVE-2025-40140"
},
{
"cve": "CVE-2025-40141",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40141"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nBluetooth: ISO: Fix possible UAF on iso_conn_free\n\nThis attempt to fix similar issue to sco_conn_free where if the\nconn-\u003esk is not set to NULL may lead to UAF on iso_conn_free.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.1:kernel-devel-rt-6.4.0-39.1.noarch",
"SUSE Linux Micro 6.1:kernel-rt-6.4.0-39.1.aarch64",
"SUSE Linux Micro 6.1:kernel-rt-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.1:kernel-rt-devel-6.4.0-39.1.aarch64",
"SUSE Linux Micro 6.1:kernel-rt-devel-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.1:kernel-rt-livepatch-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.1:kernel-source-rt-6.4.0-39.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40141",
"url": "https://www.suse.com/security/cve/CVE-2025-40141"
},
{
"category": "external",
"summary": "SUSE Bug 1253352 for CVE-2025-40141",
"url": "https://bugzilla.suse.com/1253352"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.1:kernel-devel-rt-6.4.0-39.1.noarch",
"SUSE Linux Micro 6.1:kernel-rt-6.4.0-39.1.aarch64",
"SUSE Linux Micro 6.1:kernel-rt-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.1:kernel-rt-devel-6.4.0-39.1.aarch64",
"SUSE Linux Micro 6.1:kernel-rt-devel-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.1:kernel-rt-livepatch-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.1:kernel-source-rt-6.4.0-39.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.1:kernel-devel-rt-6.4.0-39.1.noarch",
"SUSE Linux Micro 6.1:kernel-rt-6.4.0-39.1.aarch64",
"SUSE Linux Micro 6.1:kernel-rt-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.1:kernel-rt-devel-6.4.0-39.1.aarch64",
"SUSE Linux Micro 6.1:kernel-rt-devel-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.1:kernel-rt-livepatch-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.1:kernel-source-rt-6.4.0-39.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-07T10:55:44Z",
"details": "moderate"
}
],
"title": "CVE-2025-40141"
},
{
"cve": "CVE-2025-40149",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40149"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\ntls: Use __sk_dst_get() and dst_dev_rcu() in get_netdev_for_sock().\n\nget_netdev_for_sock() is called during setsockopt(),\nso not under RCU.\n\nUsing sk_dst_get(sk)-\u003edev could trigger UAF.\n\nLet\u0027s use __sk_dst_get() and dst_dev_rcu().\n\nNote that the only -\u003endo_sk_get_lower_dev() user is\nbond_sk_get_lower_dev(), which uses RCU.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.1:kernel-devel-rt-6.4.0-39.1.noarch",
"SUSE Linux Micro 6.1:kernel-rt-6.4.0-39.1.aarch64",
"SUSE Linux Micro 6.1:kernel-rt-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.1:kernel-rt-devel-6.4.0-39.1.aarch64",
"SUSE Linux Micro 6.1:kernel-rt-devel-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.1:kernel-rt-livepatch-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.1:kernel-source-rt-6.4.0-39.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40149",
"url": "https://www.suse.com/security/cve/CVE-2025-40149"
},
{
"category": "external",
"summary": "SUSE Bug 1253355 for CVE-2025-40149",
"url": "https://bugzilla.suse.com/1253355"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.1:kernel-devel-rt-6.4.0-39.1.noarch",
"SUSE Linux Micro 6.1:kernel-rt-6.4.0-39.1.aarch64",
"SUSE Linux Micro 6.1:kernel-rt-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.1:kernel-rt-devel-6.4.0-39.1.aarch64",
"SUSE Linux Micro 6.1:kernel-rt-devel-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.1:kernel-rt-livepatch-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.1:kernel-source-rt-6.4.0-39.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.1:kernel-devel-rt-6.4.0-39.1.noarch",
"SUSE Linux Micro 6.1:kernel-rt-6.4.0-39.1.aarch64",
"SUSE Linux Micro 6.1:kernel-rt-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.1:kernel-rt-devel-6.4.0-39.1.aarch64",
"SUSE Linux Micro 6.1:kernel-rt-devel-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.1:kernel-rt-livepatch-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.1:kernel-source-rt-6.4.0-39.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-07T10:55:44Z",
"details": "moderate"
}
],
"title": "CVE-2025-40149"
},
{
"cve": "CVE-2025-40154",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40154"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nASoC: Intel: bytcr_rt5640: Fix invalid quirk input mapping\n\nWhen an invalid value is passed via quirk option, currently\nbytcr_rt5640 driver only shows an error message but leaves as is.\nThis may lead to unepxected results like OOB access.\n\nThis patch corrects the input mapping to the certain default value if\nan invalid value is passed.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.1:kernel-devel-rt-6.4.0-39.1.noarch",
"SUSE Linux Micro 6.1:kernel-rt-6.4.0-39.1.aarch64",
"SUSE Linux Micro 6.1:kernel-rt-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.1:kernel-rt-devel-6.4.0-39.1.aarch64",
"SUSE Linux Micro 6.1:kernel-rt-devel-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.1:kernel-rt-livepatch-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.1:kernel-source-rt-6.4.0-39.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40154",
"url": "https://www.suse.com/security/cve/CVE-2025-40154"
},
{
"category": "external",
"summary": "SUSE Bug 1253431 for CVE-2025-40154",
"url": "https://bugzilla.suse.com/1253431"
},
{
"category": "external",
"summary": "SUSE Bug 1253432 for CVE-2025-40154",
"url": "https://bugzilla.suse.com/1253432"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.1:kernel-devel-rt-6.4.0-39.1.noarch",
"SUSE Linux Micro 6.1:kernel-rt-6.4.0-39.1.aarch64",
"SUSE Linux Micro 6.1:kernel-rt-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.1:kernel-rt-devel-6.4.0-39.1.aarch64",
"SUSE Linux Micro 6.1:kernel-rt-devel-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.1:kernel-rt-livepatch-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.1:kernel-source-rt-6.4.0-39.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.1:kernel-devel-rt-6.4.0-39.1.noarch",
"SUSE Linux Micro 6.1:kernel-rt-6.4.0-39.1.aarch64",
"SUSE Linux Micro 6.1:kernel-rt-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.1:kernel-rt-devel-6.4.0-39.1.aarch64",
"SUSE Linux Micro 6.1:kernel-rt-devel-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.1:kernel-rt-livepatch-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.1:kernel-source-rt-6.4.0-39.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-07T10:55:44Z",
"details": "moderate"
}
],
"title": "CVE-2025-40154"
},
{
"cve": "CVE-2025-40156",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40156"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nPM / devfreq: mtk-cci: Fix potential error pointer dereference in probe()\n\nThe drv-\u003esram_reg pointer could be set to ERR_PTR(-EPROBE_DEFER) which\nwould lead to a error pointer dereference. Use IS_ERR_OR_NULL() to check\nthat the pointer is valid.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.1:kernel-devel-rt-6.4.0-39.1.noarch",
"SUSE Linux Micro 6.1:kernel-rt-6.4.0-39.1.aarch64",
"SUSE Linux Micro 6.1:kernel-rt-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.1:kernel-rt-devel-6.4.0-39.1.aarch64",
"SUSE Linux Micro 6.1:kernel-rt-devel-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.1:kernel-rt-livepatch-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.1:kernel-source-rt-6.4.0-39.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40156",
"url": "https://www.suse.com/security/cve/CVE-2025-40156"
},
{
"category": "external",
"summary": "SUSE Bug 1253428 for CVE-2025-40156",
"url": "https://bugzilla.suse.com/1253428"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.1:kernel-devel-rt-6.4.0-39.1.noarch",
"SUSE Linux Micro 6.1:kernel-rt-6.4.0-39.1.aarch64",
"SUSE Linux Micro 6.1:kernel-rt-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.1:kernel-rt-devel-6.4.0-39.1.aarch64",
"SUSE Linux Micro 6.1:kernel-rt-devel-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.1:kernel-rt-livepatch-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.1:kernel-source-rt-6.4.0-39.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.1:kernel-devel-rt-6.4.0-39.1.noarch",
"SUSE Linux Micro 6.1:kernel-rt-6.4.0-39.1.aarch64",
"SUSE Linux Micro 6.1:kernel-rt-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.1:kernel-rt-devel-6.4.0-39.1.aarch64",
"SUSE Linux Micro 6.1:kernel-rt-devel-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.1:kernel-rt-livepatch-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.1:kernel-source-rt-6.4.0-39.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-07T10:55:44Z",
"details": "moderate"
}
],
"title": "CVE-2025-40156"
},
{
"cve": "CVE-2025-40157",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40157"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nEDAC/i10nm: Skip DIMM enumeration on a disabled memory controller\n\nWhen loading the i10nm_edac driver on some Intel Granite Rapids servers,\na call trace may appear as follows:\n\n UBSAN: shift-out-of-bounds in drivers/edac/skx_common.c:453:16\n shift exponent -66 is negative\n ...\n __ubsan_handle_shift_out_of_bounds+0x1e3/0x390\n skx_get_dimm_info.cold+0x47/0xd40 [skx_edac_common]\n i10nm_get_dimm_config+0x23e/0x390 [i10nm_edac]\n skx_register_mci+0x159/0x220 [skx_edac_common]\n i10nm_init+0xcb0/0x1ff0 [i10nm_edac]\n ...\n\nThis occurs because some BIOS may disable a memory controller if there\naren\u0027t any memory DIMMs populated on this memory controller. The DIMMMTR\nregister of this disabled memory controller contains the invalid value\n~0, resulting in the call trace above.\n\nFix this call trace by skipping DIMM enumeration on a disabled memory\ncontroller.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.1:kernel-devel-rt-6.4.0-39.1.noarch",
"SUSE Linux Micro 6.1:kernel-rt-6.4.0-39.1.aarch64",
"SUSE Linux Micro 6.1:kernel-rt-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.1:kernel-rt-devel-6.4.0-39.1.aarch64",
"SUSE Linux Micro 6.1:kernel-rt-devel-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.1:kernel-rt-livepatch-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.1:kernel-source-rt-6.4.0-39.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40157",
"url": "https://www.suse.com/security/cve/CVE-2025-40157"
},
{
"category": "external",
"summary": "SUSE Bug 1253423 for CVE-2025-40157",
"url": "https://bugzilla.suse.com/1253423"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.1:kernel-devel-rt-6.4.0-39.1.noarch",
"SUSE Linux Micro 6.1:kernel-rt-6.4.0-39.1.aarch64",
"SUSE Linux Micro 6.1:kernel-rt-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.1:kernel-rt-devel-6.4.0-39.1.aarch64",
"SUSE Linux Micro 6.1:kernel-rt-devel-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.1:kernel-rt-livepatch-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.1:kernel-source-rt-6.4.0-39.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.2,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:L/I:L/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.1:kernel-devel-rt-6.4.0-39.1.noarch",
"SUSE Linux Micro 6.1:kernel-rt-6.4.0-39.1.aarch64",
"SUSE Linux Micro 6.1:kernel-rt-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.1:kernel-rt-devel-6.4.0-39.1.aarch64",
"SUSE Linux Micro 6.1:kernel-rt-devel-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.1:kernel-rt-livepatch-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.1:kernel-source-rt-6.4.0-39.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-07T10:55:44Z",
"details": "moderate"
}
],
"title": "CVE-2025-40157"
},
{
"cve": "CVE-2025-40159",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40159"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nxsk: Harden userspace-supplied xdp_desc validation\n\nTurned out certain clearly invalid values passed in xdp_desc from\nuserspace can pass xp_{,un}aligned_validate_desc() and then lead\nto UBs or just invalid frames to be queued for xmit.\n\ndesc-\u003elen close to ``U32_MAX`` with a non-zero pool-\u003etx_metadata_len\ncan cause positive integer overflow and wraparound, the same way low\nenough desc-\u003eaddr with a non-zero pool-\u003etx_metadata_len can cause\nnegative integer overflow. Both scenarios can then pass the\nvalidation successfully.\nThis doesn\u0027t happen with valid XSk applications, but can be used\nto perform attacks.\n\nAlways promote desc-\u003elen to ``u64`` first to exclude positive\noverflows of it. Use explicit check_{add,sub}_overflow() when\nvalidating desc-\u003eaddr (which is ``u64`` already).\n\nbloat-o-meter reports a little growth of the code size:\n\nadd/remove: 0/0 grow/shrink: 2/1 up/down: 60/-16 (44)\nFunction old new delta\nxskq_cons_peek_desc 299 330 +31\nxsk_tx_peek_release_desc_batch 973 1002 +29\nxsk_generic_xmit 3148 3132 -16\n\nbut hopefully this doesn\u0027t hurt the performance much.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.1:kernel-devel-rt-6.4.0-39.1.noarch",
"SUSE Linux Micro 6.1:kernel-rt-6.4.0-39.1.aarch64",
"SUSE Linux Micro 6.1:kernel-rt-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.1:kernel-rt-devel-6.4.0-39.1.aarch64",
"SUSE Linux Micro 6.1:kernel-rt-devel-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.1:kernel-rt-livepatch-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.1:kernel-source-rt-6.4.0-39.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40159",
"url": "https://www.suse.com/security/cve/CVE-2025-40159"
},
{
"category": "external",
"summary": "SUSE Bug 1253403 for CVE-2025-40159",
"url": "https://bugzilla.suse.com/1253403"
},
{
"category": "external",
"summary": "SUSE Bug 1253404 for CVE-2025-40159",
"url": "https://bugzilla.suse.com/1253404"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.1:kernel-devel-rt-6.4.0-39.1.noarch",
"SUSE Linux Micro 6.1:kernel-rt-6.4.0-39.1.aarch64",
"SUSE Linux Micro 6.1:kernel-rt-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.1:kernel-rt-devel-6.4.0-39.1.aarch64",
"SUSE Linux Micro 6.1:kernel-rt-devel-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.1:kernel-rt-livepatch-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.1:kernel-source-rt-6.4.0-39.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.1:kernel-devel-rt-6.4.0-39.1.noarch",
"SUSE Linux Micro 6.1:kernel-rt-6.4.0-39.1.aarch64",
"SUSE Linux Micro 6.1:kernel-rt-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.1:kernel-rt-devel-6.4.0-39.1.aarch64",
"SUSE Linux Micro 6.1:kernel-rt-devel-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.1:kernel-rt-livepatch-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.1:kernel-source-rt-6.4.0-39.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-07T10:55:44Z",
"details": "important"
}
],
"title": "CVE-2025-40159"
},
{
"cve": "CVE-2025-40164",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40164"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nusbnet: Fix using smp_processor_id() in preemptible code warnings\n\nSyzbot reported the following warning:\n\nBUG: using smp_processor_id() in preemptible [00000000] code: dhcpcd/2879\ncaller is usbnet_skb_return+0x74/0x490 drivers/net/usb/usbnet.c:331\nCPU: 1 UID: 0 PID: 2879 Comm: dhcpcd Not tainted 6.15.0-rc4-syzkaller-00098-g615dca38c2ea #0 PREEMPT(voluntary)\nCall Trace:\n \u003cTASK\u003e\n __dump_stack lib/dump_stack.c:94 [inline]\n dump_stack_lvl+0x16c/0x1f0 lib/dump_stack.c:120\n check_preemption_disabled+0xd0/0xe0 lib/smp_processor_id.c:49\n usbnet_skb_return+0x74/0x490 drivers/net/usb/usbnet.c:331\n usbnet_resume_rx+0x4b/0x170 drivers/net/usb/usbnet.c:708\n usbnet_change_mtu+0x1be/0x220 drivers/net/usb/usbnet.c:417\n __dev_set_mtu net/core/dev.c:9443 [inline]\n netif_set_mtu_ext+0x369/0x5c0 net/core/dev.c:9496\n netif_set_mtu+0xb0/0x160 net/core/dev.c:9520\n dev_set_mtu+0xae/0x170 net/core/dev_api.c:247\n dev_ifsioc+0xa31/0x18d0 net/core/dev_ioctl.c:572\n dev_ioctl+0x223/0x10e0 net/core/dev_ioctl.c:821\n sock_do_ioctl+0x19d/0x280 net/socket.c:1204\n sock_ioctl+0x42f/0x6a0 net/socket.c:1311\n vfs_ioctl fs/ioctl.c:51 [inline]\n __do_sys_ioctl fs/ioctl.c:906 [inline]\n __se_sys_ioctl fs/ioctl.c:892 [inline]\n __x64_sys_ioctl+0x190/0x200 fs/ioctl.c:892\n do_syscall_x64 arch/x86/entry/syscall_64.c:63 [inline]\n do_syscall_64+0xcd/0x260 arch/x86/entry/syscall_64.c:94\n entry_SYSCALL_64_after_hwframe+0x77/0x7f\n\nFor historical and portability reasons, the netif_rx() is usually\nrun in the softirq or interrupt context, this commit therefore add\nlocal_bh_disable/enable() protection in the usbnet_resume_rx().",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.1:kernel-devel-rt-6.4.0-39.1.noarch",
"SUSE Linux Micro 6.1:kernel-rt-6.4.0-39.1.aarch64",
"SUSE Linux Micro 6.1:kernel-rt-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.1:kernel-rt-devel-6.4.0-39.1.aarch64",
"SUSE Linux Micro 6.1:kernel-rt-devel-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.1:kernel-rt-livepatch-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.1:kernel-source-rt-6.4.0-39.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40164",
"url": "https://www.suse.com/security/cve/CVE-2025-40164"
},
{
"category": "external",
"summary": "SUSE Bug 1253407 for CVE-2025-40164",
"url": "https://bugzilla.suse.com/1253407"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.1:kernel-devel-rt-6.4.0-39.1.noarch",
"SUSE Linux Micro 6.1:kernel-rt-6.4.0-39.1.aarch64",
"SUSE Linux Micro 6.1:kernel-rt-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.1:kernel-rt-devel-6.4.0-39.1.aarch64",
"SUSE Linux Micro 6.1:kernel-rt-devel-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.1:kernel-rt-livepatch-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.1:kernel-source-rt-6.4.0-39.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.7,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.1:kernel-devel-rt-6.4.0-39.1.noarch",
"SUSE Linux Micro 6.1:kernel-rt-6.4.0-39.1.aarch64",
"SUSE Linux Micro 6.1:kernel-rt-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.1:kernel-rt-devel-6.4.0-39.1.aarch64",
"SUSE Linux Micro 6.1:kernel-rt-devel-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.1:kernel-rt-livepatch-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.1:kernel-source-rt-6.4.0-39.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-07T10:55:44Z",
"details": "moderate"
}
],
"title": "CVE-2025-40164"
},
{
"cve": "CVE-2025-40168",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40168"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nsmc: Use __sk_dst_get() and dst_dev_rcu() in smc_clc_prfx_match().\n\nsmc_clc_prfx_match() is called from smc_listen_work() and\nnot under RCU nor RTNL.\n\nUsing sk_dst_get(sk)-\u003edev could trigger UAF.\n\nLet\u0027s use __sk_dst_get() and dst_dev_rcu().\n\nNote that the returned value of smc_clc_prfx_match() is not\nused in the caller.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.1:kernel-devel-rt-6.4.0-39.1.noarch",
"SUSE Linux Micro 6.1:kernel-rt-6.4.0-39.1.aarch64",
"SUSE Linux Micro 6.1:kernel-rt-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.1:kernel-rt-devel-6.4.0-39.1.aarch64",
"SUSE Linux Micro 6.1:kernel-rt-devel-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.1:kernel-rt-livepatch-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.1:kernel-source-rt-6.4.0-39.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40168",
"url": "https://www.suse.com/security/cve/CVE-2025-40168"
},
{
"category": "external",
"summary": "SUSE Bug 1253427 for CVE-2025-40168",
"url": "https://bugzilla.suse.com/1253427"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.1:kernel-devel-rt-6.4.0-39.1.noarch",
"SUSE Linux Micro 6.1:kernel-rt-6.4.0-39.1.aarch64",
"SUSE Linux Micro 6.1:kernel-rt-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.1:kernel-rt-devel-6.4.0-39.1.aarch64",
"SUSE Linux Micro 6.1:kernel-rt-devel-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.1:kernel-rt-livepatch-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.1:kernel-source-rt-6.4.0-39.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.1:kernel-devel-rt-6.4.0-39.1.noarch",
"SUSE Linux Micro 6.1:kernel-rt-6.4.0-39.1.aarch64",
"SUSE Linux Micro 6.1:kernel-rt-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.1:kernel-rt-devel-6.4.0-39.1.aarch64",
"SUSE Linux Micro 6.1:kernel-rt-devel-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.1:kernel-rt-livepatch-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.1:kernel-source-rt-6.4.0-39.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-07T10:55:44Z",
"details": "moderate"
}
],
"title": "CVE-2025-40168"
},
{
"cve": "CVE-2025-40169",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40169"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nbpf: Reject negative offsets for ALU ops\n\nWhen verifying BPF programs, the check_alu_op() function validates\ninstructions with ALU operations. The \u0027offset\u0027 field in these\ninstructions is a signed 16-bit integer.\n\nThe existing check \u0027insn-\u003eoff \u003e 1\u0027 was intended to ensure the offset is\neither 0, or 1 for BPF_MOD/BPF_DIV. However, because \u0027insn-\u003eoff\u0027 is\nsigned, this check incorrectly accepts all negative values (e.g., -1).\n\nThis commit tightens the validation by changing the condition to\n\u0027(insn-\u003eoff != 0 \u0026\u0026 insn-\u003eoff != 1)\u0027. This ensures that any value\nother than the explicitly permitted 0 and 1 is rejected, hardening the\nverifier against malformed BPF programs.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.1:kernel-devel-rt-6.4.0-39.1.noarch",
"SUSE Linux Micro 6.1:kernel-rt-6.4.0-39.1.aarch64",
"SUSE Linux Micro 6.1:kernel-rt-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.1:kernel-rt-devel-6.4.0-39.1.aarch64",
"SUSE Linux Micro 6.1:kernel-rt-devel-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.1:kernel-rt-livepatch-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.1:kernel-source-rt-6.4.0-39.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40169",
"url": "https://www.suse.com/security/cve/CVE-2025-40169"
},
{
"category": "external",
"summary": "SUSE Bug 1253416 for CVE-2025-40169",
"url": "https://bugzilla.suse.com/1253416"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.1:kernel-devel-rt-6.4.0-39.1.noarch",
"SUSE Linux Micro 6.1:kernel-rt-6.4.0-39.1.aarch64",
"SUSE Linux Micro 6.1:kernel-rt-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.1:kernel-rt-devel-6.4.0-39.1.aarch64",
"SUSE Linux Micro 6.1:kernel-rt-devel-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.1:kernel-rt-livepatch-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.1:kernel-source-rt-6.4.0-39.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.8,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.1:kernel-devel-rt-6.4.0-39.1.noarch",
"SUSE Linux Micro 6.1:kernel-rt-6.4.0-39.1.aarch64",
"SUSE Linux Micro 6.1:kernel-rt-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.1:kernel-rt-devel-6.4.0-39.1.aarch64",
"SUSE Linux Micro 6.1:kernel-rt-devel-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.1:kernel-rt-livepatch-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.1:kernel-source-rt-6.4.0-39.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-07T10:55:44Z",
"details": "moderate"
}
],
"title": "CVE-2025-40169"
},
{
"cve": "CVE-2025-40171",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40171"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnvmet-fc: move lsop put work to nvmet_fc_ls_req_op\n\nIt\u0027s possible for more than one async command to be in flight from\n__nvmet_fc_send_ls_req. For each command, a tgtport reference is taken.\n\nIn the current code, only one put work item is queued at a time, which\nresults in a leaked reference.\n\nTo fix this, move the work item to the nvmet_fc_ls_req_op struct, which\nalready tracks all resources related to the command.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.1:kernel-devel-rt-6.4.0-39.1.noarch",
"SUSE Linux Micro 6.1:kernel-rt-6.4.0-39.1.aarch64",
"SUSE Linux Micro 6.1:kernel-rt-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.1:kernel-rt-devel-6.4.0-39.1.aarch64",
"SUSE Linux Micro 6.1:kernel-rt-devel-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.1:kernel-rt-livepatch-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.1:kernel-source-rt-6.4.0-39.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40171",
"url": "https://www.suse.com/security/cve/CVE-2025-40171"
},
{
"category": "external",
"summary": "SUSE Bug 1253412 for CVE-2025-40171",
"url": "https://bugzilla.suse.com/1253412"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.1:kernel-devel-rt-6.4.0-39.1.noarch",
"SUSE Linux Micro 6.1:kernel-rt-6.4.0-39.1.aarch64",
"SUSE Linux Micro 6.1:kernel-rt-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.1:kernel-rt-devel-6.4.0-39.1.aarch64",
"SUSE Linux Micro 6.1:kernel-rt-devel-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.1:kernel-rt-livepatch-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.1:kernel-source-rt-6.4.0-39.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.1:kernel-devel-rt-6.4.0-39.1.noarch",
"SUSE Linux Micro 6.1:kernel-rt-6.4.0-39.1.aarch64",
"SUSE Linux Micro 6.1:kernel-rt-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.1:kernel-rt-devel-6.4.0-39.1.aarch64",
"SUSE Linux Micro 6.1:kernel-rt-devel-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.1:kernel-rt-livepatch-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.1:kernel-source-rt-6.4.0-39.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-07T10:55:44Z",
"details": "moderate"
}
],
"title": "CVE-2025-40171"
},
{
"cve": "CVE-2025-40172",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40172"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\naccel/qaic: Treat remaining == 0 as error in find_and_map_user_pages()\n\nCurrently, if find_and_map_user_pages() takes a DMA xfer request from the\nuser with a length field set to 0, or in a rare case, the host receives\nQAIC_TRANS_DMA_XFER_CONT from the device where resources-\u003exferred_dma_size\nis equal to the requested transaction size, the function will return 0\nbefore allocating an sgt or setting the fields of the dma_xfer struct.\nIn that case, encode_addr_size_pairs() will try to access the sgt which\nwill lead to a general protection fault.\n\nReturn an EINVAL in case the user provides a zero-sized ALP, or the device\nrequests continuation after all of the bytes have been transferred.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.1:kernel-devel-rt-6.4.0-39.1.noarch",
"SUSE Linux Micro 6.1:kernel-rt-6.4.0-39.1.aarch64",
"SUSE Linux Micro 6.1:kernel-rt-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.1:kernel-rt-devel-6.4.0-39.1.aarch64",
"SUSE Linux Micro 6.1:kernel-rt-devel-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.1:kernel-rt-livepatch-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.1:kernel-source-rt-6.4.0-39.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40172",
"url": "https://www.suse.com/security/cve/CVE-2025-40172"
},
{
"category": "external",
"summary": "SUSE Bug 1253424 for CVE-2025-40172",
"url": "https://bugzilla.suse.com/1253424"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.1:kernel-devel-rt-6.4.0-39.1.noarch",
"SUSE Linux Micro 6.1:kernel-rt-6.4.0-39.1.aarch64",
"SUSE Linux Micro 6.1:kernel-rt-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.1:kernel-rt-devel-6.4.0-39.1.aarch64",
"SUSE Linux Micro 6.1:kernel-rt-devel-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.1:kernel-rt-livepatch-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.1:kernel-source-rt-6.4.0-39.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.1:kernel-devel-rt-6.4.0-39.1.noarch",
"SUSE Linux Micro 6.1:kernel-rt-6.4.0-39.1.aarch64",
"SUSE Linux Micro 6.1:kernel-rt-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.1:kernel-rt-devel-6.4.0-39.1.aarch64",
"SUSE Linux Micro 6.1:kernel-rt-devel-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.1:kernel-rt-livepatch-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.1:kernel-source-rt-6.4.0-39.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-07T10:55:44Z",
"details": "moderate"
}
],
"title": "CVE-2025-40172"
},
{
"cve": "CVE-2025-40173",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40173"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnet/ip6_tunnel: Prevent perpetual tunnel growth\n\nSimilarly to ipv4 tunnel, ipv6 version updates dev-\u003eneeded_headroom, too.\nWhile ipv4 tunnel headroom adjustment growth was limited in\ncommit 5ae1e9922bbd (\"net: ip_tunnel: prevent perpetual headroom growth\"),\nipv6 tunnel yet increases the headroom without any ceiling.\n\nReflect ipv4 tunnel headroom adjustment limit on ipv6 version.\n\nCredits to Francesco Ruggeri, who was originally debugging this issue\nand wrote local Arista-specific patch and a reproducer.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.1:kernel-devel-rt-6.4.0-39.1.noarch",
"SUSE Linux Micro 6.1:kernel-rt-6.4.0-39.1.aarch64",
"SUSE Linux Micro 6.1:kernel-rt-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.1:kernel-rt-devel-6.4.0-39.1.aarch64",
"SUSE Linux Micro 6.1:kernel-rt-devel-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.1:kernel-rt-livepatch-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.1:kernel-source-rt-6.4.0-39.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40173",
"url": "https://www.suse.com/security/cve/CVE-2025-40173"
},
{
"category": "external",
"summary": "SUSE Bug 1253421 for CVE-2025-40173",
"url": "https://bugzilla.suse.com/1253421"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.1:kernel-devel-rt-6.4.0-39.1.noarch",
"SUSE Linux Micro 6.1:kernel-rt-6.4.0-39.1.aarch64",
"SUSE Linux Micro 6.1:kernel-rt-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.1:kernel-rt-devel-6.4.0-39.1.aarch64",
"SUSE Linux Micro 6.1:kernel-rt-devel-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.1:kernel-rt-livepatch-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.1:kernel-source-rt-6.4.0-39.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.7,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.1:kernel-devel-rt-6.4.0-39.1.noarch",
"SUSE Linux Micro 6.1:kernel-rt-6.4.0-39.1.aarch64",
"SUSE Linux Micro 6.1:kernel-rt-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.1:kernel-rt-devel-6.4.0-39.1.aarch64",
"SUSE Linux Micro 6.1:kernel-rt-devel-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.1:kernel-rt-livepatch-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.1:kernel-source-rt-6.4.0-39.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-07T10:55:44Z",
"details": "moderate"
}
],
"title": "CVE-2025-40173"
},
{
"cve": "CVE-2025-40176",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40176"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\ntls: wait for pending async decryptions if tls_strp_msg_hold fails\n\nAsync decryption calls tls_strp_msg_hold to create a clone of the\ninput skb to hold references to the memory it uses. If we fail to\nallocate that clone, proceeding with async decryption can lead to\nvarious issues (UAF on the skb, writing into userspace memory after\nthe recv() call has returned).\n\nIn this case, wait for all pending decryption requests.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.1:kernel-devel-rt-6.4.0-39.1.noarch",
"SUSE Linux Micro 6.1:kernel-rt-6.4.0-39.1.aarch64",
"SUSE Linux Micro 6.1:kernel-rt-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.1:kernel-rt-devel-6.4.0-39.1.aarch64",
"SUSE Linux Micro 6.1:kernel-rt-devel-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.1:kernel-rt-livepatch-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.1:kernel-source-rt-6.4.0-39.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40176",
"url": "https://www.suse.com/security/cve/CVE-2025-40176"
},
{
"category": "external",
"summary": "SUSE Bug 1253425 for CVE-2025-40176",
"url": "https://bugzilla.suse.com/1253425"
},
{
"category": "external",
"summary": "SUSE Bug 1254100 for CVE-2025-40176",
"url": "https://bugzilla.suse.com/1254100"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.1:kernel-devel-rt-6.4.0-39.1.noarch",
"SUSE Linux Micro 6.1:kernel-rt-6.4.0-39.1.aarch64",
"SUSE Linux Micro 6.1:kernel-rt-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.1:kernel-rt-devel-6.4.0-39.1.aarch64",
"SUSE Linux Micro 6.1:kernel-rt-devel-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.1:kernel-rt-livepatch-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.1:kernel-source-rt-6.4.0-39.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.1:kernel-devel-rt-6.4.0-39.1.noarch",
"SUSE Linux Micro 6.1:kernel-rt-6.4.0-39.1.aarch64",
"SUSE Linux Micro 6.1:kernel-rt-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.1:kernel-rt-devel-6.4.0-39.1.aarch64",
"SUSE Linux Micro 6.1:kernel-rt-devel-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.1:kernel-rt-livepatch-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.1:kernel-source-rt-6.4.0-39.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-07T10:55:44Z",
"details": "important"
}
],
"title": "CVE-2025-40176"
},
{
"cve": "CVE-2025-40180",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40180"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nmailbox: zynqmp-ipi: Fix out-of-bounds access in mailbox cleanup loop\n\nThe cleanup loop was starting at the wrong array index, causing\nout-of-bounds access.\nStart the loop at the correct index for zero-indexed arrays to prevent\naccessing memory beyond the allocated array bounds.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.1:kernel-devel-rt-6.4.0-39.1.noarch",
"SUSE Linux Micro 6.1:kernel-rt-6.4.0-39.1.aarch64",
"SUSE Linux Micro 6.1:kernel-rt-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.1:kernel-rt-devel-6.4.0-39.1.aarch64",
"SUSE Linux Micro 6.1:kernel-rt-devel-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.1:kernel-rt-livepatch-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.1:kernel-source-rt-6.4.0-39.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40180",
"url": "https://www.suse.com/security/cve/CVE-2025-40180"
},
{
"category": "external",
"summary": "SUSE Bug 1253440 for CVE-2025-40180",
"url": "https://bugzilla.suse.com/1253440"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.1:kernel-devel-rt-6.4.0-39.1.noarch",
"SUSE Linux Micro 6.1:kernel-rt-6.4.0-39.1.aarch64",
"SUSE Linux Micro 6.1:kernel-rt-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.1:kernel-rt-devel-6.4.0-39.1.aarch64",
"SUSE Linux Micro 6.1:kernel-rt-devel-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.1:kernel-rt-livepatch-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.1:kernel-source-rt-6.4.0-39.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.1:kernel-devel-rt-6.4.0-39.1.noarch",
"SUSE Linux Micro 6.1:kernel-rt-6.4.0-39.1.aarch64",
"SUSE Linux Micro 6.1:kernel-rt-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.1:kernel-rt-devel-6.4.0-39.1.aarch64",
"SUSE Linux Micro 6.1:kernel-rt-devel-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.1:kernel-rt-livepatch-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.1:kernel-source-rt-6.4.0-39.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-07T10:55:44Z",
"details": "moderate"
}
],
"title": "CVE-2025-40180"
},
{
"cve": "CVE-2025-40183",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40183"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nbpf: Fix metadata_dst leak __bpf_redirect_neigh_v{4,6}\n\nCilium has a BPF egress gateway feature which forces outgoing K8s Pod\ntraffic to pass through dedicated egress gateways which then SNAT the\ntraffic in order to interact with stable IPs outside the cluster.\n\nThe traffic is directed to the gateway via vxlan tunnel in collect md\nmode. A recent BPF change utilized the bpf_redirect_neigh() helper to\nforward packets after the arrival and decap on vxlan, which turned out\nover time that the kmalloc-256 slab usage in kernel was ever-increasing.\n\nThe issue was that vxlan allocates the metadata_dst object and attaches\nit through a fake dst entry to the skb. The latter was never released\nthough given bpf_redirect_neigh() was merely setting the new dst entry\nvia skb_dst_set() without dropping an existing one first.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.1:kernel-devel-rt-6.4.0-39.1.noarch",
"SUSE Linux Micro 6.1:kernel-rt-6.4.0-39.1.aarch64",
"SUSE Linux Micro 6.1:kernel-rt-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.1:kernel-rt-devel-6.4.0-39.1.aarch64",
"SUSE Linux Micro 6.1:kernel-rt-devel-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.1:kernel-rt-livepatch-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.1:kernel-source-rt-6.4.0-39.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40183",
"url": "https://www.suse.com/security/cve/CVE-2025-40183"
},
{
"category": "external",
"summary": "SUSE Bug 1253441 for CVE-2025-40183",
"url": "https://bugzilla.suse.com/1253441"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.1:kernel-devel-rt-6.4.0-39.1.noarch",
"SUSE Linux Micro 6.1:kernel-rt-6.4.0-39.1.aarch64",
"SUSE Linux Micro 6.1:kernel-rt-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.1:kernel-rt-devel-6.4.0-39.1.aarch64",
"SUSE Linux Micro 6.1:kernel-rt-devel-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.1:kernel-rt-livepatch-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.1:kernel-source-rt-6.4.0-39.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.1:kernel-devel-rt-6.4.0-39.1.noarch",
"SUSE Linux Micro 6.1:kernel-rt-6.4.0-39.1.aarch64",
"SUSE Linux Micro 6.1:kernel-rt-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.1:kernel-rt-devel-6.4.0-39.1.aarch64",
"SUSE Linux Micro 6.1:kernel-rt-devel-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.1:kernel-rt-livepatch-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.1:kernel-source-rt-6.4.0-39.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-07T10:55:44Z",
"details": "moderate"
}
],
"title": "CVE-2025-40183"
},
{
"cve": "CVE-2025-40186",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40186"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\ntcp: Don\u0027t call reqsk_fastopen_remove() in tcp_conn_request().\n\nsyzbot reported the splat below in tcp_conn_request(). [0]\n\nIf a listener is close()d while a TFO socket is being processed in\ntcp_conn_request(), inet_csk_reqsk_queue_add() does not set reqsk-\u003esk\nand calls inet_child_forget(), which calls tcp_disconnect() for the\nTFO socket.\n\nAfter the cited commit, tcp_disconnect() calls reqsk_fastopen_remove(),\nwhere reqsk_put() is called due to !reqsk-\u003esk.\n\nThen, reqsk_fastopen_remove() in tcp_conn_request() decrements the\nlast req-\u003ersk_refcnt and frees reqsk, and __reqsk_free() at the\ndrop_and_free label causes the refcount underflow for the listener\nand double-free of the reqsk.\n\nLet\u0027s remove reqsk_fastopen_remove() in tcp_conn_request().\n\nNote that other callers make sure tp-\u003efastopen_rsk is not NULL.\n\n[0]:\nrefcount_t: underflow; use-after-free.\nWARNING: CPU: 12 PID: 5563 at lib/refcount.c:28 refcount_warn_saturate (lib/refcount.c:28)\nModules linked in:\nCPU: 12 UID: 0 PID: 5563 Comm: syz-executor Not tainted syzkaller #0 PREEMPT(full)\nHardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025\nRIP: 0010:refcount_warn_saturate (lib/refcount.c:28)\nCode: ab e8 8e b4 98 ff 0f 0b c3 cc cc cc cc cc 80 3d a4 e4 d6 01 00 75 9c c6 05 9b e4 d6 01 01 48 c7 c7 e8 df fb ab e8 6a b4 98 ff \u003c0f\u003e 0b e9 03 5b 76 00 cc 80 3d 7d e4 d6 01 00 0f 85 74 ff ff ff c6\nRSP: 0018:ffffa79fc0304a98 EFLAGS: 00010246\nRAX: d83af4db1c6b3900 RBX: ffff9f65c7a69020 RCX: d83af4db1c6b3900\nRDX: 0000000000000000 RSI: 00000000ffff7fff RDI: ffffffffac78a280\nRBP: 000000009d781b60 R08: 0000000000007fff R09: ffffffffac6ca280\nR10: 0000000000017ffd R11: 0000000000000004 R12: ffff9f65c7b4f100\nR13: ffff9f65c7d23c00 R14: ffff9f65c7d26000 R15: ffff9f65c7a64ef8\nFS: 00007f9f962176c0(0000) GS:ffff9f65fcf00000(0000) knlGS:0000000000000000\nCS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033\nCR2: 0000200000000180 CR3: 000000000dbbe006 CR4: 0000000000372ef0\nCall Trace:\n \u003cIRQ\u003e\n tcp_conn_request (./include/linux/refcount.h:400 ./include/linux/refcount.h:432 ./include/linux/refcount.h:450 ./include/net/sock.h:1965 ./include/net/request_sock.h:131 net/ipv4/tcp_input.c:7301)\n tcp_rcv_state_process (net/ipv4/tcp_input.c:6708)\n tcp_v6_do_rcv (net/ipv6/tcp_ipv6.c:1670)\n tcp_v6_rcv (net/ipv6/tcp_ipv6.c:1906)\n ip6_protocol_deliver_rcu (net/ipv6/ip6_input.c:438)\n ip6_input (net/ipv6/ip6_input.c:500)\n ipv6_rcv (net/ipv6/ip6_input.c:311)\n __netif_receive_skb (net/core/dev.c:6104)\n process_backlog (net/core/dev.c:6456)\n __napi_poll (net/core/dev.c:7506)\n net_rx_action (net/core/dev.c:7569 net/core/dev.c:7696)\n handle_softirqs (kernel/softirq.c:579)\n do_softirq (kernel/softirq.c:480)\n \u003c/IRQ\u003e",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.1:kernel-devel-rt-6.4.0-39.1.noarch",
"SUSE Linux Micro 6.1:kernel-rt-6.4.0-39.1.aarch64",
"SUSE Linux Micro 6.1:kernel-rt-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.1:kernel-rt-devel-6.4.0-39.1.aarch64",
"SUSE Linux Micro 6.1:kernel-rt-devel-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.1:kernel-rt-livepatch-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.1:kernel-source-rt-6.4.0-39.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40186",
"url": "https://www.suse.com/security/cve/CVE-2025-40186"
},
{
"category": "external",
"summary": "SUSE Bug 1253438 for CVE-2025-40186",
"url": "https://bugzilla.suse.com/1253438"
},
{
"category": "external",
"summary": "SUSE Bug 1253439 for CVE-2025-40186",
"url": "https://bugzilla.suse.com/1253439"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.1:kernel-devel-rt-6.4.0-39.1.noarch",
"SUSE Linux Micro 6.1:kernel-rt-6.4.0-39.1.aarch64",
"SUSE Linux Micro 6.1:kernel-rt-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.1:kernel-rt-devel-6.4.0-39.1.aarch64",
"SUSE Linux Micro 6.1:kernel-rt-devel-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.1:kernel-rt-livepatch-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.1:kernel-source-rt-6.4.0-39.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.1:kernel-devel-rt-6.4.0-39.1.noarch",
"SUSE Linux Micro 6.1:kernel-rt-6.4.0-39.1.aarch64",
"SUSE Linux Micro 6.1:kernel-rt-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.1:kernel-rt-devel-6.4.0-39.1.aarch64",
"SUSE Linux Micro 6.1:kernel-rt-devel-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.1:kernel-rt-livepatch-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.1:kernel-source-rt-6.4.0-39.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-07T10:55:44Z",
"details": "important"
}
],
"title": "CVE-2025-40186"
},
{
"cve": "CVE-2025-40188",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40188"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\npwm: berlin: Fix wrong register in suspend/resume\n\nThe \u0027enable\u0027 register should be BERLIN_PWM_EN rather than\nBERLIN_PWM_ENABLE, otherwise, the driver accesses wrong address, there\nwill be cpu exception then kernel panic during suspend/resume.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.1:kernel-devel-rt-6.4.0-39.1.noarch",
"SUSE Linux Micro 6.1:kernel-rt-6.4.0-39.1.aarch64",
"SUSE Linux Micro 6.1:kernel-rt-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.1:kernel-rt-devel-6.4.0-39.1.aarch64",
"SUSE Linux Micro 6.1:kernel-rt-devel-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.1:kernel-rt-livepatch-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.1:kernel-source-rt-6.4.0-39.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40188",
"url": "https://www.suse.com/security/cve/CVE-2025-40188"
},
{
"category": "external",
"summary": "SUSE Bug 1253449 for CVE-2025-40188",
"url": "https://bugzilla.suse.com/1253449"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.1:kernel-devel-rt-6.4.0-39.1.noarch",
"SUSE Linux Micro 6.1:kernel-rt-6.4.0-39.1.aarch64",
"SUSE Linux Micro 6.1:kernel-rt-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.1:kernel-rt-devel-6.4.0-39.1.aarch64",
"SUSE Linux Micro 6.1:kernel-rt-devel-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.1:kernel-rt-livepatch-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.1:kernel-source-rt-6.4.0-39.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.1:kernel-devel-rt-6.4.0-39.1.noarch",
"SUSE Linux Micro 6.1:kernel-rt-6.4.0-39.1.aarch64",
"SUSE Linux Micro 6.1:kernel-rt-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.1:kernel-rt-devel-6.4.0-39.1.aarch64",
"SUSE Linux Micro 6.1:kernel-rt-devel-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.1:kernel-rt-livepatch-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.1:kernel-source-rt-6.4.0-39.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-07T10:55:44Z",
"details": "moderate"
}
],
"title": "CVE-2025-40188"
},
{
"cve": "CVE-2025-40194",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40194"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\ncpufreq: intel_pstate: Fix object lifecycle issue in update_qos_request()\n\nThe cpufreq_cpu_put() call in update_qos_request() takes place too early\nbecause the latter subsequently calls freq_qos_update_request() that\nindirectly accesses the policy object in question through the QoS request\nobject passed to it.\n\nFortunately, update_qos_request() is called under intel_pstate_driver_lock,\nso this issue does not matter for changing the intel_pstate operation\nmode, but it theoretically can cause a crash to occur on CPU device hot\nremoval (which currently can only happen in virt, but it is formally\nsupported nevertheless).\n\nAddress this issue by modifying update_qos_request() to drop the\nreference to the policy later.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.1:kernel-devel-rt-6.4.0-39.1.noarch",
"SUSE Linux Micro 6.1:kernel-rt-6.4.0-39.1.aarch64",
"SUSE Linux Micro 6.1:kernel-rt-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.1:kernel-rt-devel-6.4.0-39.1.aarch64",
"SUSE Linux Micro 6.1:kernel-rt-devel-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.1:kernel-rt-livepatch-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.1:kernel-source-rt-6.4.0-39.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40194",
"url": "https://www.suse.com/security/cve/CVE-2025-40194"
},
{
"category": "external",
"summary": "SUSE Bug 1253445 for CVE-2025-40194",
"url": "https://bugzilla.suse.com/1253445"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.1:kernel-devel-rt-6.4.0-39.1.noarch",
"SUSE Linux Micro 6.1:kernel-rt-6.4.0-39.1.aarch64",
"SUSE Linux Micro 6.1:kernel-rt-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.1:kernel-rt-devel-6.4.0-39.1.aarch64",
"SUSE Linux Micro 6.1:kernel-rt-devel-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.1:kernel-rt-livepatch-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.1:kernel-source-rt-6.4.0-39.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.7,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.1:kernel-devel-rt-6.4.0-39.1.noarch",
"SUSE Linux Micro 6.1:kernel-rt-6.4.0-39.1.aarch64",
"SUSE Linux Micro 6.1:kernel-rt-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.1:kernel-rt-devel-6.4.0-39.1.aarch64",
"SUSE Linux Micro 6.1:kernel-rt-devel-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.1:kernel-rt-livepatch-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.1:kernel-source-rt-6.4.0-39.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-07T10:55:44Z",
"details": "moderate"
}
],
"title": "CVE-2025-40194"
},
{
"cve": "CVE-2025-40198",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40198"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\next4: avoid potential buffer over-read in parse_apply_sb_mount_options()\n\nUnlike other strings in the ext4 superblock, we rely on tune2fs to\nmake sure s_mount_opts is NUL terminated. Harden\nparse_apply_sb_mount_options() by treating s_mount_opts as a potential\n__nonstring.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.1:kernel-devel-rt-6.4.0-39.1.noarch",
"SUSE Linux Micro 6.1:kernel-rt-6.4.0-39.1.aarch64",
"SUSE Linux Micro 6.1:kernel-rt-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.1:kernel-rt-devel-6.4.0-39.1.aarch64",
"SUSE Linux Micro 6.1:kernel-rt-devel-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.1:kernel-rt-livepatch-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.1:kernel-source-rt-6.4.0-39.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40198",
"url": "https://www.suse.com/security/cve/CVE-2025-40198"
},
{
"category": "external",
"summary": "SUSE Bug 1253453 for CVE-2025-40198",
"url": "https://bugzilla.suse.com/1253453"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.1:kernel-devel-rt-6.4.0-39.1.noarch",
"SUSE Linux Micro 6.1:kernel-rt-6.4.0-39.1.aarch64",
"SUSE Linux Micro 6.1:kernel-rt-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.1:kernel-rt-devel-6.4.0-39.1.aarch64",
"SUSE Linux Micro 6.1:kernel-rt-devel-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.1:kernel-rt-livepatch-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.1:kernel-source-rt-6.4.0-39.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.1:kernel-devel-rt-6.4.0-39.1.noarch",
"SUSE Linux Micro 6.1:kernel-rt-6.4.0-39.1.aarch64",
"SUSE Linux Micro 6.1:kernel-rt-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.1:kernel-rt-devel-6.4.0-39.1.aarch64",
"SUSE Linux Micro 6.1:kernel-rt-devel-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.1:kernel-rt-livepatch-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.1:kernel-source-rt-6.4.0-39.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-07T10:55:44Z",
"details": "moderate"
}
],
"title": "CVE-2025-40198"
},
{
"cve": "CVE-2025-40200",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40200"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nSquashfs: reject negative file sizes in squashfs_read_inode()\n\nSyskaller reports a \"WARNING in ovl_copy_up_file\" in overlayfs.\n\nThis warning is ultimately caused because the underlying Squashfs file\nsystem returns a file with a negative file size.\n\nThis commit checks for a negative file size and returns EINVAL.\n\n[phillip@squashfs.org.uk: only need to check 64 bit quantity]",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.1:kernel-devel-rt-6.4.0-39.1.noarch",
"SUSE Linux Micro 6.1:kernel-rt-6.4.0-39.1.aarch64",
"SUSE Linux Micro 6.1:kernel-rt-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.1:kernel-rt-devel-6.4.0-39.1.aarch64",
"SUSE Linux Micro 6.1:kernel-rt-devel-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.1:kernel-rt-livepatch-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.1:kernel-source-rt-6.4.0-39.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40200",
"url": "https://www.suse.com/security/cve/CVE-2025-40200"
},
{
"category": "external",
"summary": "SUSE Bug 1253448 for CVE-2025-40200",
"url": "https://bugzilla.suse.com/1253448"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.1:kernel-devel-rt-6.4.0-39.1.noarch",
"SUSE Linux Micro 6.1:kernel-rt-6.4.0-39.1.aarch64",
"SUSE Linux Micro 6.1:kernel-rt-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.1:kernel-rt-devel-6.4.0-39.1.aarch64",
"SUSE Linux Micro 6.1:kernel-rt-devel-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.1:kernel-rt-livepatch-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.1:kernel-source-rt-6.4.0-39.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.1:kernel-devel-rt-6.4.0-39.1.noarch",
"SUSE Linux Micro 6.1:kernel-rt-6.4.0-39.1.aarch64",
"SUSE Linux Micro 6.1:kernel-rt-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.1:kernel-rt-devel-6.4.0-39.1.aarch64",
"SUSE Linux Micro 6.1:kernel-rt-devel-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.1:kernel-rt-livepatch-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.1:kernel-source-rt-6.4.0-39.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-07T10:55:44Z",
"details": "moderate"
}
],
"title": "CVE-2025-40200"
},
{
"cve": "CVE-2025-40204",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40204"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nsctp: Fix MAC comparison to be constant-time\n\nTo prevent timing attacks, MACs need to be compared in constant time.\nUse the appropriate helper function for this.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.1:kernel-devel-rt-6.4.0-39.1.noarch",
"SUSE Linux Micro 6.1:kernel-rt-6.4.0-39.1.aarch64",
"SUSE Linux Micro 6.1:kernel-rt-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.1:kernel-rt-devel-6.4.0-39.1.aarch64",
"SUSE Linux Micro 6.1:kernel-rt-devel-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.1:kernel-rt-livepatch-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.1:kernel-source-rt-6.4.0-39.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40204",
"url": "https://www.suse.com/security/cve/CVE-2025-40204"
},
{
"category": "external",
"summary": "SUSE Bug 1253436 for CVE-2025-40204",
"url": "https://bugzilla.suse.com/1253436"
},
{
"category": "external",
"summary": "SUSE Bug 1253437 for CVE-2025-40204",
"url": "https://bugzilla.suse.com/1253437"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.1:kernel-devel-rt-6.4.0-39.1.noarch",
"SUSE Linux Micro 6.1:kernel-rt-6.4.0-39.1.aarch64",
"SUSE Linux Micro 6.1:kernel-rt-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.1:kernel-rt-devel-6.4.0-39.1.aarch64",
"SUSE Linux Micro 6.1:kernel-rt-devel-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.1:kernel-rt-livepatch-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.1:kernel-source-rt-6.4.0-39.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.1:kernel-devel-rt-6.4.0-39.1.noarch",
"SUSE Linux Micro 6.1:kernel-rt-6.4.0-39.1.aarch64",
"SUSE Linux Micro 6.1:kernel-rt-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.1:kernel-rt-devel-6.4.0-39.1.aarch64",
"SUSE Linux Micro 6.1:kernel-rt-devel-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.1:kernel-rt-livepatch-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.1:kernel-source-rt-6.4.0-39.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-07T10:55:44Z",
"details": "important"
}
],
"title": "CVE-2025-40204"
},
{
"cve": "CVE-2025-40205",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40205"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nbtrfs: avoid potential out-of-bounds in btrfs_encode_fh()\n\nThe function btrfs_encode_fh() does not properly account for the three\ncases it handles.\n\nBefore writing to the file handle (fh), the function only returns to the\nuser BTRFS_FID_SIZE_NON_CONNECTABLE (5 dwords, 20 bytes) or\nBTRFS_FID_SIZE_CONNECTABLE (8 dwords, 32 bytes).\n\nHowever, when a parent exists and the root ID of the parent and the\ninode are different, the function writes BTRFS_FID_SIZE_CONNECTABLE_ROOT\n(10 dwords, 40 bytes).\n\nIf *max_len is not large enough, this write goes out of bounds because\nBTRFS_FID_SIZE_CONNECTABLE_ROOT is greater than\nBTRFS_FID_SIZE_CONNECTABLE originally returned.\n\nThis results in an 8-byte out-of-bounds write at\nfid-\u003eparent_root_objectid = parent_root_id.\n\nA previous attempt to fix this issue was made but was lost.\n\nhttps://lore.kernel.org/all/4CADAEEC020000780001B32C@vpn.id2.novell.com/\n\nAlthough this issue does not seem to be easily triggerable, it is a\npotential memory corruption bug that should be fixed. This patch\nresolves the issue by ensuring the function returns the appropriate size\nfor all three cases and validates that *max_len is large enough before\nwriting any data.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.1:kernel-devel-rt-6.4.0-39.1.noarch",
"SUSE Linux Micro 6.1:kernel-rt-6.4.0-39.1.aarch64",
"SUSE Linux Micro 6.1:kernel-rt-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.1:kernel-rt-devel-6.4.0-39.1.aarch64",
"SUSE Linux Micro 6.1:kernel-rt-devel-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.1:kernel-rt-livepatch-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.1:kernel-source-rt-6.4.0-39.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40205",
"url": "https://www.suse.com/security/cve/CVE-2025-40205"
},
{
"category": "external",
"summary": "SUSE Bug 1253456 for CVE-2025-40205",
"url": "https://bugzilla.suse.com/1253456"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.1:kernel-devel-rt-6.4.0-39.1.noarch",
"SUSE Linux Micro 6.1:kernel-rt-6.4.0-39.1.aarch64",
"SUSE Linux Micro 6.1:kernel-rt-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.1:kernel-rt-devel-6.4.0-39.1.aarch64",
"SUSE Linux Micro 6.1:kernel-rt-devel-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.1:kernel-rt-livepatch-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.1:kernel-source-rt-6.4.0-39.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.1:kernel-devel-rt-6.4.0-39.1.noarch",
"SUSE Linux Micro 6.1:kernel-rt-6.4.0-39.1.aarch64",
"SUSE Linux Micro 6.1:kernel-rt-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.1:kernel-rt-devel-6.4.0-39.1.aarch64",
"SUSE Linux Micro 6.1:kernel-rt-devel-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.1:kernel-rt-livepatch-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.1:kernel-source-rt-6.4.0-39.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-07T10:55:44Z",
"details": "moderate"
}
],
"title": "CVE-2025-40205"
},
{
"cve": "CVE-2025-40206",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40206"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnetfilter: nft_objref: validate objref and objrefmap expressions\n\nReferencing a synproxy stateful object from OUTPUT hook causes kernel\ncrash due to infinite recursive calls:\n\nBUG: TASK stack guard page was hit at 000000008bda5b8c (stack is 000000003ab1c4a5..00000000494d8b12)\n[...]\nCall Trace:\n __find_rr_leaf+0x99/0x230\n fib6_table_lookup+0x13b/0x2d0\n ip6_pol_route+0xa4/0x400\n fib6_rule_lookup+0x156/0x240\n ip6_route_output_flags+0xc6/0x150\n __nf_ip6_route+0x23/0x50\n synproxy_send_tcp_ipv6+0x106/0x200\n synproxy_send_client_synack_ipv6+0x1aa/0x1f0\n nft_synproxy_do_eval+0x263/0x310\n nft_do_chain+0x5a8/0x5f0 [nf_tables\n nft_do_chain_inet+0x98/0x110\n nf_hook_slow+0x43/0xc0\n __ip6_local_out+0xf0/0x170\n ip6_local_out+0x17/0x70\n synproxy_send_tcp_ipv6+0x1a2/0x200\n synproxy_send_client_synack_ipv6+0x1aa/0x1f0\n[...]\n\nImplement objref and objrefmap expression validate functions.\n\nCurrently, only NFT_OBJECT_SYNPROXY object type requires validation.\nThis will also handle a jump to a chain using a synproxy object from the\nOUTPUT hook.\n\nNow when trying to reference a synproxy object in the OUTPUT hook, nft\nwill produce the following error:\n\nsynproxy_crash.nft: Error: Could not process rule: Operation not supported\n synproxy name mysynproxy\n ^^^^^^^^^^^^^^^^^^^^^^^^",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.1:kernel-devel-rt-6.4.0-39.1.noarch",
"SUSE Linux Micro 6.1:kernel-rt-6.4.0-39.1.aarch64",
"SUSE Linux Micro 6.1:kernel-rt-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.1:kernel-rt-devel-6.4.0-39.1.aarch64",
"SUSE Linux Micro 6.1:kernel-rt-devel-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.1:kernel-rt-livepatch-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.1:kernel-source-rt-6.4.0-39.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40206",
"url": "https://www.suse.com/security/cve/CVE-2025-40206"
},
{
"category": "external",
"summary": "SUSE Bug 1253393 for CVE-2025-40206",
"url": "https://bugzilla.suse.com/1253393"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.1:kernel-devel-rt-6.4.0-39.1.noarch",
"SUSE Linux Micro 6.1:kernel-rt-6.4.0-39.1.aarch64",
"SUSE Linux Micro 6.1:kernel-rt-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.1:kernel-rt-devel-6.4.0-39.1.aarch64",
"SUSE Linux Micro 6.1:kernel-rt-devel-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.1:kernel-rt-livepatch-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.1:kernel-source-rt-6.4.0-39.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.1,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.1:kernel-devel-rt-6.4.0-39.1.noarch",
"SUSE Linux Micro 6.1:kernel-rt-6.4.0-39.1.aarch64",
"SUSE Linux Micro 6.1:kernel-rt-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.1:kernel-rt-devel-6.4.0-39.1.aarch64",
"SUSE Linux Micro 6.1:kernel-rt-devel-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.1:kernel-rt-livepatch-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.1:kernel-source-rt-6.4.0-39.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-07T10:55:44Z",
"details": "moderate"
}
],
"title": "CVE-2025-40206"
},
{
"cve": "CVE-2025-40207",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40207"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nmedia: v4l2-subdev: Fix alloc failure check in v4l2_subdev_call_state_try()\n\nv4l2_subdev_call_state_try() macro allocates a subdev state with\n__v4l2_subdev_state_alloc(), but does not check the returned value. If\n__v4l2_subdev_state_alloc fails, it returns an ERR_PTR, and that would\ncause v4l2_subdev_call_state_try() to crash.\n\nAdd proper error handling to v4l2_subdev_call_state_try().",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.1:kernel-devel-rt-6.4.0-39.1.noarch",
"SUSE Linux Micro 6.1:kernel-rt-6.4.0-39.1.aarch64",
"SUSE Linux Micro 6.1:kernel-rt-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.1:kernel-rt-devel-6.4.0-39.1.aarch64",
"SUSE Linux Micro 6.1:kernel-rt-devel-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.1:kernel-rt-livepatch-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.1:kernel-source-rt-6.4.0-39.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40207",
"url": "https://www.suse.com/security/cve/CVE-2025-40207"
},
{
"category": "external",
"summary": "SUSE Bug 1253395 for CVE-2025-40207",
"url": "https://bugzilla.suse.com/1253395"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.1:kernel-devel-rt-6.4.0-39.1.noarch",
"SUSE Linux Micro 6.1:kernel-rt-6.4.0-39.1.aarch64",
"SUSE Linux Micro 6.1:kernel-rt-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.1:kernel-rt-devel-6.4.0-39.1.aarch64",
"SUSE Linux Micro 6.1:kernel-rt-devel-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.1:kernel-rt-livepatch-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.1:kernel-source-rt-6.4.0-39.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.1:kernel-devel-rt-6.4.0-39.1.noarch",
"SUSE Linux Micro 6.1:kernel-rt-6.4.0-39.1.aarch64",
"SUSE Linux Micro 6.1:kernel-rt-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.1:kernel-rt-devel-6.4.0-39.1.aarch64",
"SUSE Linux Micro 6.1:kernel-rt-devel-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.1:kernel-rt-livepatch-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.1:kernel-source-rt-6.4.0-39.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-07T10:55:44Z",
"details": "moderate"
}
],
"title": "CVE-2025-40207"
}
]
}
SUSE-SU-2025:4505-1
Vulnerability from csaf_suse - Published: 2025-12-22 16:35 - Updated: 2025-12-22 16:35Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Security update for the Linux Kernel",
"title": "Title of the patch"
},
{
"category": "description",
"text": "The SUSE Linux Enterprise 15 SP6 Azure kernel was updated to receive various security bugfixes.\n\n\nThe following security bugs were fixed:\n\n- CVE-2022-50253: bpf: make sure skb-\u003elen != 0 when redirecting to a tunneling device (bsc#1249912).\n- CVE-2023-53676: scsi: target: iscsi: Fix buffer overflow in lio_target_nacl_info_show() (bsc#1251786).\n- CVE-2025-21710: tcp: correct handling of extreme memory squeeze (bsc#1237888).\n- CVE-2025-37916: pds_core: remove write-after-free of client_id (bsc#1243474).\n- CVE-2025-38359: s390/mm: Fix in_atomic() handling in do_secure_storage_access() (bsc#1247076).\n- CVE-2025-38361: drm/amd/display: Check dce_hwseq before dereferencing it (bsc#1247079).\n- CVE-2025-39788: scsi: ufs: exynos: Fix programming of HCI_UTRL_NEXUS_TYPE (bsc#1249547).\n- CVE-2025-39805: net: macb: fix unregister_netdev call order in macb_remove() (bsc#1249982).\n- CVE-2025-39819: fs/smb: Fix inconsistent refcnt update (bsc#1250176).\n- CVE-2025-39859: ptp: ocp: fix use-after-free bugs causing by ptp_ocp_watchdog (bsc#1250252).\n- CVE-2025-39944: octeontx2-pf: Fix use-after-free bugs in otx2_sync_tstamp() (bsc#1251120).\n- CVE-2025-39980: nexthop: Forbid FDB status change while nexthop is in a group (bsc#1252063).\n- CVE-2025-40001: scsi: mvsas: Fix use-after-free bugs in mvs_work_queue (bsc#1252303).\n- CVE-2025-40021: tracing: dynevent: Add a missing lockdown check on dynevent (bsc#1252681).\n- CVE-2025-40027: net/9p: fix double req put in p9_fd_cancelled (bsc#1252763).\n- CVE-2025-40030: pinctrl: check the return value of pinmux_ops::get_function_name() (bsc#1252773).\n- CVE-2025-40038: KVM: SVM: Skip fastpath emulation on VM-Exit if next RIP isn\u0027t valid (bsc#1252817).\n- CVE-2025-40040: mm/ksm: fix flag-dropping behavior in ksm_madvise (bsc#1252780).\n- CVE-2025-40048: uio_hv_generic: Let userspace take care of interrupt mask (bsc#1252862).\n- CVE-2025-40055: ocfs2: fix double free in user_cluster_connect() (bsc#1252821).\n- CVE-2025-40059: coresight: Fix incorrect handling for return value of devm_kzalloc (bsc#1252809).\n- CVE-2025-40064: smc: Fix use-after-free in __pnet_find_base_ndev() (bsc#1252845).\n- CVE-2025-40070: pps: fix warning in pps_register_cdev when register device fail (bsc#1252836).\n- CVE-2025-40074: ipv4: start using dst_dev_rcu() (bsc#1252794).\n- CVE-2025-40075: tcp_metrics: use dst_dev_net_rcu() (bsc#1252795).\n- CVE-2025-40083: net/sched: sch_qfq: Fix null-deref in agg_dequeue (bsc#1252912).\n- CVE-2025-40098: ALSA: hda: cs35l41: Fix NULL pointer dereference in cs35l41_get_acpi_mute_state() (bsc#1252917).\n- CVE-2025-40105: vfs: Don\u0027t leak disconnected dentries on umount (bsc#1252928).\n- CVE-2025-40139: smc: Use __sk_dst_get() and dst_dev_rcu() in in smc_clc_prfx_set() (bsc#1253409).\n- CVE-2025-40149: tls: Use __sk_dst_get() and dst_dev_rcu() in get_netdev_for_sock() (bsc#1253355).\n- CVE-2025-40159: xsk: Harden userspace-supplied xdp_desc validation (bsc#1253403).\n- CVE-2025-40168: smc: Use __sk_dst_get() and dst_dev_rcu() in smc_clc_prfx_match() (bsc#1253427).\n- CVE-2025-40169: bpf: Reject negative offsets for ALU ops (bsc#1253416).\n- CVE-2025-40173: net/ip6_tunnel: Prevent perpetual tunnel growth (bsc#1253421).\n- CVE-2025-40176: tls: wait for pending async decryptions if tls_strp_msg_hold fails (bsc#1253425).\n- CVE-2025-40204: sctp: Fix MAC comparison to be constant-time (bsc#1253436).\n\nThe following non-security bugs were fixed:\n\n- ACPI: CPPC: Check _CPC validity for only the online CPUs (git-fixes).\n- ACPI: CPPC: Limit perf ctrs in PCC check only to online CPUs (git-fixes).\n- ACPI: CPPC: Perform fast check switch only for online CPUs (git-fixes).\n- ACPI: PRM: Skip handlers with NULL handler_address or NULL VA (stable-fixes).\n- ACPI: SBS: Fix present test in acpi_battery_read() (git-fixes).\n- ACPI: property: Return present device nodes only on fwnode interface (stable-fixes).\n- ACPI: scan: Add Intel CVS ACPI HIDs to acpi_ignore_dep_ids (stable-fixes).\n- ACPICA: Update dsmethod.c to get rid of unused variable warning (stable-fixes).\n- ACPICA: dispatcher: Use acpi_ds_clear_operands() in acpi_ds_call_control_method() (stable-fixes).\n- ALSA: hda: Fix missing pointer check in hda_component_manager_init function (git-fixes).\n- ALSA: serial-generic: remove shared static buffer (stable-fixes).\n- ALSA: usb-audio: Add validation of UAC2/UAC3 effect units (stable-fixes).\n- ALSA: usb-audio: Fix NULL pointer dereference in snd_usb_mixer_controls_badd (git-fixes).\n- ALSA: usb-audio: Fix potential overflow of PCM transfer buffer (stable-fixes).\n- ALSA: usb-audio: add mono main switch to Presonus S1824c (stable-fixes).\n- ALSA: usb-audio: apply quirk for MOONDROP Quark2 (stable-fixes).\n- ALSA: usb-audio: do not log messages meant for 1810c when initializing 1824c (git-fixes).\n- ALSA: usb-audio: fix uac2 clock source at terminal parser (git-fixes).\n- ASoC: codecs: va-macro: fix resource leak in probe error path (git-fixes).\n- ASoC: cs4271: Fix regulator leak on probe failure (git-fixes).\n- ASoC: max98090/91: fixed max98091 ALSA widget powering up/down (stable-fixes).\n- ASoC: meson: aiu-encoder-i2s: fix bit clock polarity (stable-fixes).\n- ASoC: qcom: sc8280xp: explicitly set S16LE format in sc8280xp_be_hw_params_fixup() (stable-fixes).\n- ASoC: stm32: sai: manage context in set_sysclk callback (stable-fixes).\n- ASoC: tlv320aic3x: Fix class-D initialization for tlv320aic3007 (stable-fixes).\n- Bluetooth: 6lowpan: Do not hold spin lock over sleeping functions (git-fixes).\n- Bluetooth: 6lowpan: add missing l2cap_chan_lock() (git-fixes).\n- Bluetooth: 6lowpan: fix BDADDR_LE vs ADDR_LE_DEV address type confusion (git-fixes).\n- Bluetooth: 6lowpan: reset link-local header on ipv6 recv path (git-fixes).\n- Bluetooth: L2CAP: export l2cap_chan_hold for modules (stable-fixes).\n- Bluetooth: MGMT: cancel mesh send timer when hdev removed (git-fixes).\n- Bluetooth: SCO: Fix UAF on sco_conn_free (stable-fixes).\n- Bluetooth: bcsp: receive data only if registered (stable-fixes).\n- Bluetooth: btrtl: Fix memory leak in rtlbt_parse_firmware_v2() (git-fixes).\n- Bluetooth: btusb: Check for unexpected bytes when defragmenting HCI frames (stable-fixes).\n- Bluetooth: btusb: reorder cleanup in btusb_disconnect to avoid UAF (git-fixes).\n- Bluetooth: hci_event: validate skb length for unknown CC opcode (git-fixes).\n- Documentation: ACPI: i2c-muxes: fix I2C device references (git-fixes).\n- Drivers: hv: vmbus: Add utility function for querying ring size (git-fixes).\n- HID: amd_sfh: Stop sensor before starting (git-fixes).\n- HID: hid-ntrig: Prevent memory leak in ntrig_report_version() (git-fixes).\n- HID: quirks: avoid Cooler Master MM712 dongle wakeup bug (stable-fixes).\n- HID: quirks: work around VID/PID conflict for 0x4c4a/0x4155 (git-fixes).\n- HID: uclogic: Fix potential memory leak in error path (git-fixes).\n- Input: atmel_mxt_ts - allow reset GPIO to sleep (stable-fixes).\n- Input: imx_sc_key - fix memory corruption on unload (git-fixes).\n- Input: pegasus-notetaker - fix potential out-of-bounds access (git-fixes).\n- KVM: Pass new routing entries and irqfd when updating IRTEs (git-fixes).\n- KVM: SVM: Delete IRTE link from previous vCPU before setting new IRTE (git-fixes).\n- KVM: SVM: Delete IRTE link from previous vCPU irrespective of new routing (git-fixes).\n- KVM: SVM: Emulate PERF_CNTR_GLOBAL_STATUS_SET for PerfMonV2 (git-fixes).\n- KVM: SVM: Mark VMCB_LBR dirty when MSR_IA32_DEBUGCTLMSR is updated (git-fixes).\n- KVM: SVM: Re-load current, not host, TSC_AUX on #VMEXIT from SEV-ES guest (git-fixes).\n- KVM: SVM: Track per-vCPU IRTEs using kvm_kernel_irqfd structure (git-fixes).\n- KVM: SVM: WARN if an invalid posted interrupt IRTE entry is added (git-fixes).\n- KVM: VMX: Allow guest to set DEBUGCTL.RTM_DEBUG if RTM is supported (git-fixes).\n- KVM: VMX: Apply MMIO Stale Data mitigation if KVM maps MMIO into the guest (git-fixes).\n- KVM: VMX: Fix check for valid GVA on an EPT violation (git-fixes).\n- KVM: VMX: Preserve host\u0027s DEBUGCTLMSR_FREEZE_IN_SMM while running the guest (git-fixes).\n- KVM: VMX: Wrap all accesses to IA32_DEBUGCTL with getter/setter APIs (git-fixes).\n- KVM: nVMX: Check vmcs12-\u003eguest_ia32_debugctl on nested VM-Enter (git-fixes).\n- KVM: x86/mmu: Locally cache whether a PFN is host MMIO when making a SPTE (git-fixes).\n- KVM: x86: Add helper to retrieve current value of user return MSR (git-fixes).\n- KVM: x86: Convert vcpu_run()\u0027s immediate exit param into a generic bitmap (git-fixes).\n- KVM: x86: Do not treat ENTER and LEAVE as branches, because they are not (git-fixes).\n- KVM: x86: Drop kvm_x86_ops.set_dr6() in favor of a new KVM_RUN flag (git-fixes).\n- NFS4: Fix state renewals missing after boot (git-fixes).\n- NFS: check if suid/sgid was cleared after a write as needed (git-fixes).\n- NFSD: Never cache a COMPOUND when the SEQUENCE operation fails (git-fixes).\n- NFSD: Skip close replay processing if XDR encoding fails (git-fixes).\n- NFSD: free copynotify stateid in nfs4_free_ol_stateid() (git-fixes).\n- NFSv4.1: fix mount hang after CREATE_SESSION failure (git-fixes).\n- NFSv4: handle ERR_GRACE on delegation recalls (git-fixes).\n- PCI/P2PDMA: Fix incorrect pointer usage in devm_kfree() call (stable-fixes).\n- PCI/PM: Skip resuming to D0 if device is disconnected (stable-fixes).\n- PCI: Disable MSI on RDC PCI to PCIe bridges (stable-fixes).\n- PCI: cadence: Check for the existence of cdns_pcie::ops before using it (stable-fixes).\n- PCI: dwc: Verify the single eDMA IRQ in dw_pcie_edma_irq_verify() (stable-fixes).\n- PCI: j721e: Fix incorrect error message in probe() (git-fixes).\n- PCI: rcar-host: Convert struct rcar_msi mask_lock into raw spinlock (git-fixes).\n- PCI: tegra194: Reset BARs when running in PCIe endpoint mode (git-fixes).\n- RDMA/bnxt_re: Do not fail destroy QP and cleanup debugfs earlier (git-fixes).\n- RDMA/bnxt_re: Fix a potential memory leak in destroy_gsi_sqp (git-fixes).\n- RDMA/hns: Fix recv CQ and QP cache affinity (git-fixes).\n- RDMA/hns: Fix the modification of max_send_sge (git-fixes).\n- RDMA/hns: Fix wrong WQE data when QP wraps around (git-fixes).\n- RDMA/irdma: Fix SD index calculation (git-fixes).\n- RDMA/irdma: Set irdma_cq cq_num field during CQ create (git-fixes).\n- Revert \u0027drm/tegra: dsi: Clear enable register if powered by bootloader\u0027 (git-fixes).\n- Revert \u0027wifi: ath10k: avoid unnecessary wait for service ready message\u0027 (git-fixes).\n- accel/habanalabs/gaudi2: fix BMON disable configuration (stable-fixes).\n- accel/habanalabs/gaudi2: read preboot status after recovering from dirty state (stable-fixes).\n- accel/habanalabs: return ENOMEM if less than requested pages were pinned (stable-fixes).\n- accel/habanalabs: support mapping cb with vmalloc-backed coherent memory (stable-fixes).\n- acpi,srat: Fix incorrect device handle check for Generic Initiator (git-fixes).\n- amd/amdkfd: resolve a race in amdgpu_amdkfd_device_fini_sw (stable-fixes).\n- block: avoid possible overflow for chunk_sectors check in blk_stack_limits() (git-fixes).\n- block: fix kobject double initialization in add_disk (git-fixes).\n- btrfs: abort transaction on failure to add link to inode (git-fixes).\n- btrfs: avoid page_lockend underflow in btrfs_punch_hole_lock_range() (git-fix).\n- btrfs: avoid using fixed char array size for tree names (git-fix).\n- btrfs: do not update last_log_commit when logging inode due to a new name (git-fixes).\n- btrfs: fix COW handling in run_delalloc_nocow() (git-fix).\n- btrfs: fix inode leak on failure to add link to inode (git-fixes).\n- btrfs: make btrfs_clear_delalloc_extent() free delalloc reserve (git-fix).\n- btrfs: mark dirty extent range for out of bound prealloc extents (git-fixes).\n- btrfs: qgroup: correctly model root qgroup rsv in convert (git-fix).\n- btrfs: rename err to ret in btrfs_link() (git-fixes).\n- btrfs: run btrfs_error_commit_super() early (git-fix).\n- btrfs: scrub: put bio after errors in scrub_raid56_parity_stripe() (git-fix).\n- btrfs: scrub: put bio after errors in scrub_raid56_parity_stripe() (git-fixes).\n- btrfs: send: fix duplicated rmdir operations when using extrefs (git-fixes).\n- btrfs: set inode flag BTRFS_INODE_COPY_EVERYTHING when logging new name (git-fixes).\n- btrfs: simplify error handling logic for btrfs_link() (git-fixes).\n- btrfs: tree-checker: add dev extent item checks (git-fix).\n- btrfs: tree-checker: add type and sequence check for inline backrefs (git-fix).\n- btrfs: tree-checker: fix the wrong output of data backref objectid (git-fix).\n- btrfs: tree-checker: reject BTRFS_FT_UNKNOWN dir type (git-fix).\n- btrfs: tree-checker: validate dref root and objectid (git-fix).\n- btrfs: use smp_mb__after_atomic() when forcing COW in create_pending_snapshot() (git-fixes).\n- char: misc: Does not request module for miscdevice with dynamic minor (stable-fixes).\n- char: misc: Make misc_register() reentry for miscdevice who wants dynamic minor (stable-fixes).\n- char: misc: restrict the dynamic range to exclude reserved minors (stable-fixes).\n- cramfs: Verify inode mode when loading from disk (git-fixes).\n- crypto: aspeed - fix double free caused by devm (git-fixes).\n- crypto: aspeed-acry - Convert to platform remove callback returning void (stable-fixes).\n- crypto: hisilicon/qm - Fix device reference leak in qm_get_qos_value (git-fixes).\n- crypto: iaa - Do not clobber req-\u003ebase.data (git-fixes).\n- crypto: qat - use kcalloc() in qat_uclo_map_objs_from_mof() (stable-fixes).\n- dmaengine: dw-edma: Set status for callback_result (stable-fixes).\n- dmaengine: mv_xor: match alloc_wc and free_wc (stable-fixes).\n- drm/amd/display: Add AVI infoframe copy in copy_stream_update_to_stream (stable-fixes).\n- drm/amd/display: Disable VRR on DCE 6 (stable-fixes).\n- drm/amd/display: Fix DVI-D/HDMI adapters (stable-fixes).\n- drm/amd/display: Fix NULL deref in debugfs odm_combine_segments (git-fixes).\n- drm/amd/display: Fix black screen with HDMI outputs (git-fixes).\n- drm/amd/display: Increase AUX Intra-Hop Done Max Wait Duration (stable-fixes).\n- drm/amd/display: add more cyan skillfish devices (stable-fixes).\n- drm/amd/display: ensure committing streams is seamless (stable-fixes).\n- drm/amd/display: update dpp/disp clock from smu clock table (stable-fixes).\n- drm/amd/pm: Disable MCLK switching on SI at high pixel clocks (stable-fixes).\n- drm/amd/pm: Use cached metrics data on aldebaran (stable-fixes).\n- drm/amd/pm: Use cached metrics data on arcturus (stable-fixes).\n- drm/amd: Avoid evicting resources at S5 (stable-fixes).\n- drm/amd: Fix suspend failure with secure display TA (git-fixes).\n- drm/amd: add more cyan skillfish PCI ids (stable-fixes).\n- drm/amdgpu/jpeg: Hold pg_lock before jpeg poweroff (stable-fixes).\n- drm/amdgpu: Allow kfd CRIU with no buffer objects (stable-fixes).\n- drm/amdgpu: Fix NULL pointer dereference in VRAM logic for APU devices (stable-fixes).\n- drm/amdgpu: Use memdup_array_user in amdgpu_cs_wait_fences_ioctl (stable-fixes).\n- drm/amdgpu: add support for cyan skillfish gpu_info (stable-fixes).\n- drm/amdgpu: do not enable SMU on cyan skillfish (stable-fixes).\n- drm/amdgpu: reject gang submissions under SRIOV (stable-fixes).\n- drm/amdkfd: Handle lack of READ permissions in SVM mapping (stable-fixes).\n- drm/amdkfd: Tie UNMAP_LATENCY to queue_preemption (stable-fixes).\n- drm/amdkfd: fix vram allocation failure for a special case (stable-fixes).\n- drm/amdkfd: return -ENOTTY for unsupported IOCTLs (stable-fixes).\n- drm/bridge: cdns-dsi: Do not fail on MIPI_DSI_MODE_VIDEO_BURST (stable-fixes).\n- drm/bridge: cdns-dsi: Fix REG_WAKEUP_TIME value (stable-fixes).\n- drm/bridge: display-connector: do not set OP_DETECT for DisplayPorts (stable-fixes).\n- drm/i915: Avoid lock inversion when pinning to GGTT on CHV/BXT+VTD (git-fixes).\n- drm/i915: Fix conversion between clock ticks and nanoseconds (git-fixes).\n- drm/msm/dsi/phy: Toggle back buffer resync after preparing PLL (stable-fixes).\n- drm/msm/dsi/phy_7nm: Fix missing initial VCO rate (stable-fixes).\n- drm/msm: make sure to not queue up recovery more than once (stable-fixes).\n- drm/nouveau: replace snprintf() with scnprintf() in nvkm_snprintbf() (stable-fixes).\n- drm/sched: Fix deadlock in drm_sched_entity_kill_jobs_cb (git-fixes).\n- drm/tegra: Add call to put_pid() (git-fixes).\n- drm/tegra: dc: Fix reference leak in tegra_dc_couple() (git-fixes).\n- drm/tidss: Set crtc modesetting parameters with adjusted mode (stable-fixes).\n- drm/tidss: Use the crtc_* timings when programming the HW (stable-fixes).\n- drm/vmwgfx: Validate command header size against SVGA_CMD_MAX_DATASIZE (git-fixes).\n- exfat: limit log print for IO error (git-fixes).\n- extcon: adc-jack: Cleanup wakeup source only if it was enabled (git-fixes).\n- extcon: adc-jack: Fix wakeup source leaks on device unbind (stable-fixes).\n- fbcon: Set fb_display[i]-\u003emode to NULL when the mode is released (stable-fixes).\n- fbdev: Add bounds checking in bit_putcs to fix vmalloc-out-of-bounds (stable-fixes).\n- fbdev: bitblit: bound-check glyph index in bit_putcs* (stable-fixes).\n- fbdev: pvr2fb: Fix leftover reference to ONCHIP_NR_DMA_CHANNELS (stable-fixes).\n- hwmon: (asus-ec-sensors) increase timeout for locking ACPI mutex (stable-fixes).\n- hwmon: (dell-smm) Add support for Dell OptiPlex 7040 (stable-fixes).\n- hwmon: (k10temp) Add device ID for Strix Halo (stable-fixes).\n- hwmon: (k10temp) Add thermal support for AMD Family 1Ah-based models (stable-fixes).\n- hwmon: (sbtsi_temp) AMD CPU extended temperature range support (stable-fixes).\n- hwmon: sy7636a: add alias (stable-fixes).\n- iio: adc: imx93_adc: load calibrated values even calibration failed (stable-fixes).\n- iio: adc: spear_adc: mask SPEAR_ADC_STATUS channel and avg sample before setting register (stable-fixes).\n- ima: do not clear IMA_DIGSIG flag when setting or removing non-IMA xattr (stable-fixes).\n- iommu/amd: Return an error if vCPU affinity is set for non-vCPU IRTE (git-fixes).\n- isdn: mISDN: hfcsusb: fix memory leak in hfcsusb_probe() (git-fixes).\n- jfs: Verify inode mode when loading from disk (git-fixes).\n- jfs: fix uninitialized waitqueue in transaction manager (git-fixes).\n- kABI fix for KVM: VMX: Apply MMIO Stale Data mitigation if KVM maps MMIO into the guest (git-fixes).\n- kabi/severities: drop xfer_to_guest_mode_handle_work.\n- lib/crypto: curve25519-hacl64: Fix older clang KASAN workaround for GCC (git-fixes).\n- md/raid1: fix data lost for writemostly rdev (git-fixes).\n- md: fix mssing blktrace bio split events (git-fixes).\n- media: adv7180: Add missing lock in suspend callback (stable-fixes).\n- media: adv7180: Do not write format to device in set_fmt (stable-fixes).\n- media: adv7180: Only validate format in querystd (stable-fixes).\n- media: amphion: Delete v4l2_fh synchronously in .release() (stable-fixes).\n- media: fix uninitialized symbol warnings (stable-fixes).\n- media: i2c: Kconfig: Ensure a dependency on HAVE_CLK for VIDEO_CAMERA_SENSOR (stable-fixes).\n- media: i2c: og01a1b: Specify monochrome media bus format instead of Bayer (stable-fixes).\n- media: imon: make send_packet() more robust (stable-fixes).\n- media: ov08x40: Fix the horizontal flip control (stable-fixes).\n- media: redrat3: use int type to store negative error codes (stable-fixes).\n- media: uvcvideo: Use heuristic to find stream entity (git-fixes).\n- memstick: Add timeout to prevent indefinite waiting (stable-fixes).\n- mfd: da9063: Split chip variant reading in two bus transactions (stable-fixes).\n- mfd: madera: Work around false-positive -Wininitialized warning (stable-fixes).\n- mfd: stmpe-i2c: Add missing MODULE_LICENSE (stable-fixes).\n- mfd: stmpe: Remove IRQ domain upon removal (stable-fixes).\n- minixfs: Verify inode mode when loading from disk (git-fixes).\n- mm/mm_init: fix hash table order logging in alloc_large_system_hash() (git-fixes).\n- mm/secretmem: fix use-after-free race in fault handler (git-fixes).\n- mmc: host: renesas_sdhi: Fix the actual clock (stable-fixes).\n- mmc: sdhci-msm: Enable tuning for SDR50 mode for SD card (stable-fixes).\n- mmc: sdhci-of-dwcmshc: Change DLL_STRBIN_TAPNUM_DEFAULT to 0x4 (git-fixes).\n- mtd: onenand: Pass correct pointer to IRQ handler (git-fixes).\n- mtd: rawnand: cadence: fix DMA device NULL pointer dereference (git-fixes).\n- mtdchar: fix integer overflow in read/write ioctls (git-fixes).\n- net/mana: fix warning in the writer of client oob (git-fixes).\n- net/smc: Remove validation of reserved bits in CLC Decline message (bsc#1253779).\n- net: nfc: nci: Increase NCI_DATA_TIMEOUT to 3000 ms (stable-fixes).\n- net: phy: clear link parameters on admin link down (stable-fixes).\n- net: phy: fixed_phy: let fixed_phy_unregister free the phy_device (stable-fixes).\n- net: phy: marvell: Fix 88e1510 downshift counter errata (stable-fixes).\n- net: tcp: send zero-window ACK when no memory (bsc#1253779).\n- net: usb: qmi_wwan: initialize MAC header offset in qmimux_rx_fixup (git-fixes).\n- nfs4_setup_readdir(): insufficient locking for -\u003ed_parent-\u003ed_inode dereferencing (git-fixes).\n- nfsd: do not defer requests during idmap lookup in v4 compound decode (bsc#1232223).\n- nfsd: fix return error codes for nfsd_map_name_to_id (bsc#1232223).\n- nouveau/firmware: Add missing kfree() of nvkm_falcon_fw::boot (git-fixes).\n- perf script: add --addr2line option (bsc#1247509).\n- phy: cadence: cdns-dphy: Enable lower resolutions in dphy (stable-fixes).\n- phy: renesas: r8a779f0-ether-serdes: add new step added to latest datasheet (stable-fixes).\n- phy: rockchip: phy-rockchip-inno-csidphy: allow writes to grf register 0 (stable-fixes).\n- pinctrl: s32cc: fix uninitialized memory in s32_pinctrl_desc (git-fixes).\n- pinctrl: s32cc: initialize gpio_pin_config::list after kmalloc() (git-fixes).\n- pinctrl: single: fix bias pull up/down handling in pin_config_set (stable-fixes).\n- platform/x86/intel/speed_select_if: Convert PCIBIOS_* return codes to errnos (git-fixes).\n- power: supply: qcom_battmgr: add OOI chemistry (stable-fixes).\n- power: supply: qcom_battmgr: handle charging state change notifications (stable-fixes).\n- power: supply: sbs-charger: Support multiple devices (stable-fixes).\n- powerpc: export MIN RMA size (bsc#1236743).\n- powerpc: increase MIN RMA size for CAS negotiation (bsc#1236743, bsc#1252269).\n- regulator: fixed: fix GPIO descriptor leak on register failure (git-fixes).\n- rtc: rx8025: fix incorrect register reference (git-fixes).\n- s390/mm,fault: simplify kfence fault handling (bsc#1247076).\n- scsi: Fix sas_user_scan() to handle wildcard and multi-channel scans (git-fixes).\n- scsi: aacraid: Stop using PCI_IRQ_AFFINITY (git-fixes).\n- scsi: core: sysfs: Correct sysfs attributes access rights (git-fixes).\n- scsi: hpsa: Fix potential memory leak in hpsa_big_passthru_ioctl() (git-fixes).\n- scsi: libfc: Prevent integer overflow in fc_fcp_recv_data() (git-fixes).\n- scsi: mpi3mr: Correctly handle ATA device errors (git-fixes).\n- scsi: mpi3mr: Drop unnecessary volatile from __iomem pointers (git-fixes).\n- scsi: mpt3sas: Correctly handle ATA device errors (git-fixes).\n- scsi: mpt3sas: Fix crash in transport port remove by using ioc_info() (git-fixes).\n- scsi: pm80xx: Fix array-index-out-of-of-bounds on rmmod (git-fixes).\n- scsi: storvsc: Prefer returning channel with the same CPU as on the I/O issuing CPU (bsc#1252267).\n- selftests/bpf: Close fd in error path in drop_on_reuseport (git-fixes).\n- selftests/bpf: Close obj in error path in xdp_adjust_tail (git-fixes).\n- selftests/bpf: Fix missing ARRAY_SIZE() definition in bench.c (git-fixes).\n- selftests/bpf: Fix missing BUILD_BUG_ON() declaration (git-fixes).\n- selftests/bpf: Fix missing UINT_MAX definitions in benchmarks (git-fixes).\n- selftests/bpf: Fix string read in strncmp benchmark (git-fixes).\n- selftests/bpf: Mitigate sockmap_ktls disconnect_after_delete failure (git-fixes).\n- selftests/bpf: Use pid_t consistently in test_progs.c (git-fixes).\n- selftests/bpf: fix signedness bug in redir_partial() (git-fixes).\n- serial: 8250_exar: add support for Advantech 2 port card with Device ID 0x0018 (git-fixes).\n- serial: 8250_mtk: Enable baud clock and manage in runtime PM (git-fixes).\n- soc/tegra: fuse: Add Tegra114 nvmem cells and fuse lookups (stable-fixes).\n- soc: aspeed: socinfo: Add AST27xx silicon IDs (stable-fixes).\n- soc: qcom: smem: Fix endian-unaware access of num_entries (stable-fixes).\n- spi: Try to get ACPI GPIO IRQ earlier (git-fixes).\n- spi: loopback-test: Do not use %pK through printk (stable-fixes).\n- spi: rpc-if: Add resume support for RZ/G3E (stable-fixes).\n- strparser: Fix signed/unsigned mismatch bug (git-fixes).\n- tcp_bpf: Call sk_msg_free() when tcp_bpf_send_verdict() fails to allocate psock-\u003ecork (bsc#1250705).\n- thunderbolt: Use is_pciehp instead of is_hotplug_bridge (stable-fixes).\n- tools/cpupower: Fix incorrect size in cpuidle_state_disable() (stable-fixes).\n- tools/cpupower: fix error return value in cpupower_write_sysfs() (stable-fixes).\n- tools/power x86_energy_perf_policy: Enhance HWP enable (stable-fixes).\n- tools/power x86_energy_perf_policy: Fix incorrect fopen mode usage (stable-fixes).\n- tools/power x86_energy_perf_policy: Prefer driver HWP limits (stable-fixes).\n- tools: lib: thermal: do not preserve owner in install (stable-fixes).\n- tools: lib: thermal: use pkg-config to locate libnl3 (stable-fixes).\n- uio_hv_generic: Query the ringbuffer size for device (git-fixes).\n- usb/core/quirks: Add Huawei ME906S to wakeup quirk (git-fixes).\n- usb: cdns3: gadget: Use-after-free during failed initialization and exit of cdnsp gadget (stable-fixes).\n- usb: gadget: f_fs: Fix epfile null pointer access after ep enable (stable-fixes).\n- usb: gadget: f_hid: Fix zero length packet transfer (stable-fixes).\n- usb: gadget: f_ncm: Fix MAC assignment NCM ethernet (stable-fixes).\n- usb: mon: Increase BUFF_MAX to 64 MiB to support multi-MB URBs (stable-fixes).\n- usb: xhci: plat: Facilitate using autosuspend for xhci plat devices (stable-fixes).\n- video: backlight: lp855x_bl: Set correct EPROM start for LP8556 (stable-fixes).\n- watchdog: s3c2410_wdt: Fix max_timeout being calculated larger (stable-fixes).\n- wifi: ath10k: Fix connection after GTK rekeying (stable-fixes).\n- wifi: ath11k: zero init info-\u003estatus in wmi_process_mgmt_tx_comp() (git-fixes).\n- wifi: ath12k: Increase DP_REO_CMD_RING_SIZE to 256 (stable-fixes).\n- wifi: mac80211: Fix HE capabilities element check (stable-fixes).\n- wifi: mac80211: reject address change while connecting (git-fixes).\n- wifi: mac80211: skip rate verification for not captured PSDUs (git-fixes).\n- wifi: mac80211_hwsim: Limit destroy_on_close radio removal to netgroup (git-fixes).\n- wifi: mt76: mt7921: Add 160MHz beamformee capability for mt7922 device (stable-fixes).\n- wifi: mt76: mt7996: Temporarily disable EPCS (stable-fixes).\n- wifi: mwl8k: inject DSSS Parameter Set element into beacons if missing (git-fixes).\n- wifi: rtw88: sdio: use indirect IO for device registers before power-on (stable-fixes).\n- wifi: zd1211rw: fix potential memory leak in __zd_usb_enable_rx() (git-fixes).\n- x86/CPU/AMD: Add RDSEED fix for Zen5 (git-fixes).\n- x86/CPU/AMD: Add additional fixed RDSEED microcode revisions (git-fixes).\n- x86/CPU/AMD: Add missing terminator for zen5_rdseed_microcode (git-fixes).\n- x86/CPU/AMD: Do the common init on future Zens too (git-fixes).\n- x86/amd_nb: Add new PCI IDs for AMD family 0x1a (stable-fixes).\n- x86/bugs: Fix reporting of LFENCE retpoline (git-fixes).\n- x86/bugs: Report correct retbleed mitigation status (git-fixes).\n- x86/vmscape: Add old Intel CPUs to affected list (git-fixes).\n- xhci: dbc: Allow users to modify DbC poll interval via sysfs (stable-fixes).\n- xhci: dbc: Avoid event polling busyloop if pending rx transfers are inactive (git-fixes).\n- xhci: dbc: Improve performance by removing delay in transfer event polling (stable-fixes).\n- xhci: dbc: fix bogus 1024 byte prefix if ttyDBC read races with stall event (git-fixes).\n- xhci: dbc: poll at different rate depending on data transfer activity (stable-fixes).\n",
"title": "Description of the patch"
},
{
"category": "details",
"text": "SUSE-2025-4505,SUSE-SLE-Module-Public-Cloud-15-SP6-2025-4505,openSUSE-SLE-15.6-2025-4505",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2025_4505-1.json"
},
{
"category": "self",
"summary": "URL for SUSE-SU-2025:4505-1",
"url": "https://www.suse.com/support/update/announcement/2025/suse-su-20254505-1/"
},
{
"category": "self",
"summary": "E-Mail link for SUSE-SU-2025:4505-1",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-December/023640.html"
},
{
"category": "self",
"summary": "SUSE Bug 1232223",
"url": "https://bugzilla.suse.com/1232223"
},
{
"category": "self",
"summary": "SUSE Bug 1236743",
"url": "https://bugzilla.suse.com/1236743"
},
{
"category": "self",
"summary": "SUSE Bug 1237888",
"url": "https://bugzilla.suse.com/1237888"
},
{
"category": "self",
"summary": "SUSE Bug 1243474",
"url": "https://bugzilla.suse.com/1243474"
},
{
"category": "self",
"summary": "SUSE Bug 1245193",
"url": "https://bugzilla.suse.com/1245193"
},
{
"category": "self",
"summary": "SUSE Bug 1247076",
"url": "https://bugzilla.suse.com/1247076"
},
{
"category": "self",
"summary": "SUSE Bug 1247079",
"url": "https://bugzilla.suse.com/1247079"
},
{
"category": "self",
"summary": "SUSE Bug 1247500",
"url": "https://bugzilla.suse.com/1247500"
},
{
"category": "self",
"summary": "SUSE Bug 1247509",
"url": "https://bugzilla.suse.com/1247509"
},
{
"category": "self",
"summary": "SUSE Bug 1249547",
"url": "https://bugzilla.suse.com/1249547"
},
{
"category": "self",
"summary": "SUSE Bug 1249912",
"url": "https://bugzilla.suse.com/1249912"
},
{
"category": "self",
"summary": "SUSE Bug 1249982",
"url": "https://bugzilla.suse.com/1249982"
},
{
"category": "self",
"summary": "SUSE Bug 1250176",
"url": "https://bugzilla.suse.com/1250176"
},
{
"category": "self",
"summary": "SUSE Bug 1250237",
"url": "https://bugzilla.suse.com/1250237"
},
{
"category": "self",
"summary": "SUSE Bug 1250252",
"url": "https://bugzilla.suse.com/1250252"
},
{
"category": "self",
"summary": "SUSE Bug 1250705",
"url": "https://bugzilla.suse.com/1250705"
},
{
"category": "self",
"summary": "SUSE Bug 1251120",
"url": "https://bugzilla.suse.com/1251120"
},
{
"category": "self",
"summary": "SUSE Bug 1251786",
"url": "https://bugzilla.suse.com/1251786"
},
{
"category": "self",
"summary": "SUSE Bug 1252063",
"url": "https://bugzilla.suse.com/1252063"
},
{
"category": "self",
"summary": "SUSE Bug 1252267",
"url": "https://bugzilla.suse.com/1252267"
},
{
"category": "self",
"summary": "SUSE Bug 1252269",
"url": "https://bugzilla.suse.com/1252269"
},
{
"category": "self",
"summary": "SUSE Bug 1252303",
"url": "https://bugzilla.suse.com/1252303"
},
{
"category": "self",
"summary": "SUSE Bug 1252353",
"url": "https://bugzilla.suse.com/1252353"
},
{
"category": "self",
"summary": "SUSE Bug 1252681",
"url": "https://bugzilla.suse.com/1252681"
},
{
"category": "self",
"summary": "SUSE Bug 1252763",
"url": "https://bugzilla.suse.com/1252763"
},
{
"category": "self",
"summary": "SUSE Bug 1252773",
"url": "https://bugzilla.suse.com/1252773"
},
{
"category": "self",
"summary": "SUSE Bug 1252780",
"url": "https://bugzilla.suse.com/1252780"
},
{
"category": "self",
"summary": "SUSE Bug 1252794",
"url": "https://bugzilla.suse.com/1252794"
},
{
"category": "self",
"summary": "SUSE Bug 1252795",
"url": "https://bugzilla.suse.com/1252795"
},
{
"category": "self",
"summary": "SUSE Bug 1252809",
"url": "https://bugzilla.suse.com/1252809"
},
{
"category": "self",
"summary": "SUSE Bug 1252817",
"url": "https://bugzilla.suse.com/1252817"
},
{
"category": "self",
"summary": "SUSE Bug 1252821",
"url": "https://bugzilla.suse.com/1252821"
},
{
"category": "self",
"summary": "SUSE Bug 1252836",
"url": "https://bugzilla.suse.com/1252836"
},
{
"category": "self",
"summary": "SUSE Bug 1252845",
"url": "https://bugzilla.suse.com/1252845"
},
{
"category": "self",
"summary": "SUSE Bug 1252862",
"url": "https://bugzilla.suse.com/1252862"
},
{
"category": "self",
"summary": "SUSE Bug 1252912",
"url": "https://bugzilla.suse.com/1252912"
},
{
"category": "self",
"summary": "SUSE Bug 1252917",
"url": "https://bugzilla.suse.com/1252917"
},
{
"category": "self",
"summary": "SUSE Bug 1252928",
"url": "https://bugzilla.suse.com/1252928"
},
{
"category": "self",
"summary": "SUSE Bug 1253018",
"url": "https://bugzilla.suse.com/1253018"
},
{
"category": "self",
"summary": "SUSE Bug 1253176",
"url": "https://bugzilla.suse.com/1253176"
},
{
"category": "self",
"summary": "SUSE Bug 1253275",
"url": "https://bugzilla.suse.com/1253275"
},
{
"category": "self",
"summary": "SUSE Bug 1253318",
"url": "https://bugzilla.suse.com/1253318"
},
{
"category": "self",
"summary": "SUSE Bug 1253324",
"url": "https://bugzilla.suse.com/1253324"
},
{
"category": "self",
"summary": "SUSE Bug 1253349",
"url": "https://bugzilla.suse.com/1253349"
},
{
"category": "self",
"summary": "SUSE Bug 1253352",
"url": "https://bugzilla.suse.com/1253352"
},
{
"category": "self",
"summary": "SUSE Bug 1253355",
"url": "https://bugzilla.suse.com/1253355"
},
{
"category": "self",
"summary": "SUSE Bug 1253360",
"url": "https://bugzilla.suse.com/1253360"
},
{
"category": "self",
"summary": "SUSE Bug 1253362",
"url": "https://bugzilla.suse.com/1253362"
},
{
"category": "self",
"summary": "SUSE Bug 1253363",
"url": "https://bugzilla.suse.com/1253363"
},
{
"category": "self",
"summary": "SUSE Bug 1253367",
"url": "https://bugzilla.suse.com/1253367"
},
{
"category": "self",
"summary": "SUSE Bug 1253369",
"url": "https://bugzilla.suse.com/1253369"
},
{
"category": "self",
"summary": "SUSE Bug 1253393",
"url": "https://bugzilla.suse.com/1253393"
},
{
"category": "self",
"summary": "SUSE Bug 1253395",
"url": "https://bugzilla.suse.com/1253395"
},
{
"category": "self",
"summary": "SUSE Bug 1253403",
"url": "https://bugzilla.suse.com/1253403"
},
{
"category": "self",
"summary": "SUSE Bug 1253407",
"url": "https://bugzilla.suse.com/1253407"
},
{
"category": "self",
"summary": "SUSE Bug 1253409",
"url": "https://bugzilla.suse.com/1253409"
},
{
"category": "self",
"summary": "SUSE Bug 1253412",
"url": "https://bugzilla.suse.com/1253412"
},
{
"category": "self",
"summary": "SUSE Bug 1253416",
"url": "https://bugzilla.suse.com/1253416"
},
{
"category": "self",
"summary": "SUSE Bug 1253421",
"url": "https://bugzilla.suse.com/1253421"
},
{
"category": "self",
"summary": "SUSE Bug 1253423",
"url": "https://bugzilla.suse.com/1253423"
},
{
"category": "self",
"summary": "SUSE Bug 1253424",
"url": "https://bugzilla.suse.com/1253424"
},
{
"category": "self",
"summary": "SUSE Bug 1253425",
"url": "https://bugzilla.suse.com/1253425"
},
{
"category": "self",
"summary": "SUSE Bug 1253427",
"url": "https://bugzilla.suse.com/1253427"
},
{
"category": "self",
"summary": "SUSE Bug 1253428",
"url": "https://bugzilla.suse.com/1253428"
},
{
"category": "self",
"summary": "SUSE Bug 1253431",
"url": "https://bugzilla.suse.com/1253431"
},
{
"category": "self",
"summary": "SUSE Bug 1253436",
"url": "https://bugzilla.suse.com/1253436"
},
{
"category": "self",
"summary": "SUSE Bug 1253438",
"url": "https://bugzilla.suse.com/1253438"
},
{
"category": "self",
"summary": "SUSE Bug 1253440",
"url": "https://bugzilla.suse.com/1253440"
},
{
"category": "self",
"summary": "SUSE Bug 1253441",
"url": "https://bugzilla.suse.com/1253441"
},
{
"category": "self",
"summary": "SUSE Bug 1253445",
"url": "https://bugzilla.suse.com/1253445"
},
{
"category": "self",
"summary": "SUSE Bug 1253448",
"url": "https://bugzilla.suse.com/1253448"
},
{
"category": "self",
"summary": "SUSE Bug 1253449",
"url": "https://bugzilla.suse.com/1253449"
},
{
"category": "self",
"summary": "SUSE Bug 1253453",
"url": "https://bugzilla.suse.com/1253453"
},
{
"category": "self",
"summary": "SUSE Bug 1253456",
"url": "https://bugzilla.suse.com/1253456"
},
{
"category": "self",
"summary": "SUSE Bug 1253472",
"url": "https://bugzilla.suse.com/1253472"
},
{
"category": "self",
"summary": "SUSE Bug 1253779",
"url": "https://bugzilla.suse.com/1253779"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-50253 page",
"url": "https://www.suse.com/security/cve/CVE-2022-50253/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2023-53676 page",
"url": "https://www.suse.com/security/cve/CVE-2023-53676/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-21710 page",
"url": "https://www.suse.com/security/cve/CVE-2025-21710/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-37916 page",
"url": "https://www.suse.com/security/cve/CVE-2025-37916/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-38359 page",
"url": "https://www.suse.com/security/cve/CVE-2025-38359/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-38361 page",
"url": "https://www.suse.com/security/cve/CVE-2025-38361/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-39788 page",
"url": "https://www.suse.com/security/cve/CVE-2025-39788/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-39805 page",
"url": "https://www.suse.com/security/cve/CVE-2025-39805/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-39819 page",
"url": "https://www.suse.com/security/cve/CVE-2025-39819/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-39859 page",
"url": "https://www.suse.com/security/cve/CVE-2025-39859/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-39944 page",
"url": "https://www.suse.com/security/cve/CVE-2025-39944/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-39980 page",
"url": "https://www.suse.com/security/cve/CVE-2025-39980/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40001 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40001/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40021 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40021/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40027 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40027/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40030 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40030/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40038 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40038/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40040 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40040/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40048 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40048/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40055 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40055/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40059 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40059/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40064 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40064/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40070 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40070/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40074 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40074/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40075 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40075/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40083 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40083/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40098 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40098/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40105 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40105/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40107 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40107/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40109 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40109/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40110 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40110/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40111 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40111/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40115 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40115/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40116 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40116/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40118 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40118/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40120 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40120/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40121 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40121/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40127 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40127/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40129 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40129/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40139 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40139/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40140 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40140/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40141 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40141/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40149 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40149/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40154 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40154/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40156 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40156/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40157 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40157/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40159 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40159/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40164 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40164/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40168 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40168/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40169 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40169/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40171 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40171/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40172 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40172/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40173 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40173/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40176 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40176/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40180 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40180/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40183 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40183/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40186 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40186/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40188 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40188/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40194 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40194/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40198 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40198/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40200 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40200/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40204 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40204/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40205 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40205/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40206 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40206/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40207 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40207/"
}
],
"title": "Security update for the Linux Kernel",
"tracking": {
"current_release_date": "2025-12-22T16:35:13Z",
"generator": {
"date": "2025-12-22T16:35:13Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "SUSE-SU-2025:4505-1",
"initial_release_date": "2025-12-22T16:35:13Z",
"revision_history": [
{
"date": "2025-12-22T16:35:13Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "cluster-md-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"product": {
"name": "cluster-md-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"product_id": "cluster-md-kmp-azure-6.4.0-150600.8.58.1.aarch64"
}
},
{
"category": "product_version",
"name": "dlm-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"product": {
"name": "dlm-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"product_id": "dlm-kmp-azure-6.4.0-150600.8.58.1.aarch64"
}
},
{
"category": "product_version",
"name": "gfs2-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"product": {
"name": "gfs2-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"product_id": "gfs2-kmp-azure-6.4.0-150600.8.58.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-azure-6.4.0-150600.8.58.1.aarch64",
"product": {
"name": "kernel-azure-6.4.0-150600.8.58.1.aarch64",
"product_id": "kernel-azure-6.4.0-150600.8.58.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-azure-devel-6.4.0-150600.8.58.1.aarch64",
"product": {
"name": "kernel-azure-devel-6.4.0-150600.8.58.1.aarch64",
"product_id": "kernel-azure-devel-6.4.0-150600.8.58.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-azure-extra-6.4.0-150600.8.58.1.aarch64",
"product": {
"name": "kernel-azure-extra-6.4.0-150600.8.58.1.aarch64",
"product_id": "kernel-azure-extra-6.4.0-150600.8.58.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-azure-optional-6.4.0-150600.8.58.1.aarch64",
"product": {
"name": "kernel-azure-optional-6.4.0-150600.8.58.1.aarch64",
"product_id": "kernel-azure-optional-6.4.0-150600.8.58.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-syms-azure-6.4.0-150600.8.58.1.aarch64",
"product": {
"name": "kernel-syms-azure-6.4.0-150600.8.58.1.aarch64",
"product_id": "kernel-syms-azure-6.4.0-150600.8.58.1.aarch64"
}
},
{
"category": "product_version",
"name": "kselftests-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"product": {
"name": "kselftests-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"product_id": "kselftests-kmp-azure-6.4.0-150600.8.58.1.aarch64"
}
},
{
"category": "product_version",
"name": "ocfs2-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"product": {
"name": "ocfs2-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"product_id": "ocfs2-kmp-azure-6.4.0-150600.8.58.1.aarch64"
}
},
{
"category": "product_version",
"name": "reiserfs-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"product": {
"name": "reiserfs-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"product_id": "reiserfs-kmp-azure-6.4.0-150600.8.58.1.aarch64"
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-devel-azure-6.4.0-150600.8.58.1.noarch",
"product": {
"name": "kernel-devel-azure-6.4.0-150600.8.58.1.noarch",
"product_id": "kernel-devel-azure-6.4.0-150600.8.58.1.noarch"
}
},
{
"category": "product_version",
"name": "kernel-source-azure-6.4.0-150600.8.58.1.noarch",
"product": {
"name": "kernel-source-azure-6.4.0-150600.8.58.1.noarch",
"product_id": "kernel-source-azure-6.4.0-150600.8.58.1.noarch"
}
}
],
"category": "architecture",
"name": "noarch"
},
{
"branches": [
{
"category": "product_version",
"name": "cluster-md-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"product": {
"name": "cluster-md-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"product_id": "cluster-md-kmp-azure-6.4.0-150600.8.58.1.x86_64"
}
},
{
"category": "product_version",
"name": "dlm-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"product": {
"name": "dlm-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"product_id": "dlm-kmp-azure-6.4.0-150600.8.58.1.x86_64"
}
},
{
"category": "product_version",
"name": "gfs2-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"product": {
"name": "gfs2-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"product_id": "gfs2-kmp-azure-6.4.0-150600.8.58.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-azure-6.4.0-150600.8.58.1.x86_64",
"product": {
"name": "kernel-azure-6.4.0-150600.8.58.1.x86_64",
"product_id": "kernel-azure-6.4.0-150600.8.58.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-azure-devel-6.4.0-150600.8.58.1.x86_64",
"product": {
"name": "kernel-azure-devel-6.4.0-150600.8.58.1.x86_64",
"product_id": "kernel-azure-devel-6.4.0-150600.8.58.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-azure-extra-6.4.0-150600.8.58.1.x86_64",
"product": {
"name": "kernel-azure-extra-6.4.0-150600.8.58.1.x86_64",
"product_id": "kernel-azure-extra-6.4.0-150600.8.58.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-azure-optional-6.4.0-150600.8.58.1.x86_64",
"product": {
"name": "kernel-azure-optional-6.4.0-150600.8.58.1.x86_64",
"product_id": "kernel-azure-optional-6.4.0-150600.8.58.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-azure-vdso-6.4.0-150600.8.58.1.x86_64",
"product": {
"name": "kernel-azure-vdso-6.4.0-150600.8.58.1.x86_64",
"product_id": "kernel-azure-vdso-6.4.0-150600.8.58.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-syms-azure-6.4.0-150600.8.58.1.x86_64",
"product": {
"name": "kernel-syms-azure-6.4.0-150600.8.58.1.x86_64",
"product_id": "kernel-syms-azure-6.4.0-150600.8.58.1.x86_64"
}
},
{
"category": "product_version",
"name": "kselftests-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"product": {
"name": "kselftests-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"product_id": "kselftests-kmp-azure-6.4.0-150600.8.58.1.x86_64"
}
},
{
"category": "product_version",
"name": "ocfs2-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"product": {
"name": "ocfs2-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"product_id": "ocfs2-kmp-azure-6.4.0-150600.8.58.1.x86_64"
}
},
{
"category": "product_version",
"name": "reiserfs-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"product": {
"name": "reiserfs-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"product_id": "reiserfs-kmp-azure-6.4.0-150600.8.58.1.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "SUSE Linux Enterprise Module for Public Cloud 15 SP6",
"product": {
"name": "SUSE Linux Enterprise Module for Public Cloud 15 SP6",
"product_id": "SUSE Linux Enterprise Module for Public Cloud 15 SP6",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-module-public-cloud:15:sp6"
}
}
},
{
"category": "product_name",
"name": "openSUSE Leap 15.6",
"product": {
"name": "openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6",
"product_identification_helper": {
"cpe": "cpe:/o:opensuse:leap:15.6"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-azure-6.4.0-150600.8.58.1.aarch64 as component of SUSE Linux Enterprise Module for Public Cloud 15 SP6",
"product_id": "SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-6.4.0-150600.8.58.1.aarch64"
},
"product_reference": "kernel-azure-6.4.0-150600.8.58.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Public Cloud 15 SP6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-azure-6.4.0-150600.8.58.1.x86_64 as component of SUSE Linux Enterprise Module for Public Cloud 15 SP6",
"product_id": "SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-6.4.0-150600.8.58.1.x86_64"
},
"product_reference": "kernel-azure-6.4.0-150600.8.58.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Public Cloud 15 SP6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-azure-devel-6.4.0-150600.8.58.1.aarch64 as component of SUSE Linux Enterprise Module for Public Cloud 15 SP6",
"product_id": "SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-devel-6.4.0-150600.8.58.1.aarch64"
},
"product_reference": "kernel-azure-devel-6.4.0-150600.8.58.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Public Cloud 15 SP6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-azure-devel-6.4.0-150600.8.58.1.x86_64 as component of SUSE Linux Enterprise Module for Public Cloud 15 SP6",
"product_id": "SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-devel-6.4.0-150600.8.58.1.x86_64"
},
"product_reference": "kernel-azure-devel-6.4.0-150600.8.58.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Public Cloud 15 SP6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-azure-6.4.0-150600.8.58.1.noarch as component of SUSE Linux Enterprise Module for Public Cloud 15 SP6",
"product_id": "SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-devel-azure-6.4.0-150600.8.58.1.noarch"
},
"product_reference": "kernel-devel-azure-6.4.0-150600.8.58.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Public Cloud 15 SP6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-source-azure-6.4.0-150600.8.58.1.noarch as component of SUSE Linux Enterprise Module for Public Cloud 15 SP6",
"product_id": "SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-source-azure-6.4.0-150600.8.58.1.noarch"
},
"product_reference": "kernel-source-azure-6.4.0-150600.8.58.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Public Cloud 15 SP6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-azure-6.4.0-150600.8.58.1.aarch64 as component of SUSE Linux Enterprise Module for Public Cloud 15 SP6",
"product_id": "SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-syms-azure-6.4.0-150600.8.58.1.aarch64"
},
"product_reference": "kernel-syms-azure-6.4.0-150600.8.58.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Public Cloud 15 SP6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-azure-6.4.0-150600.8.58.1.x86_64 as component of SUSE Linux Enterprise Module for Public Cloud 15 SP6",
"product_id": "SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-syms-azure-6.4.0-150600.8.58.1.x86_64"
},
"product_reference": "kernel-syms-azure-6.4.0-150600.8.58.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Public Cloud 15 SP6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cluster-md-kmp-azure-6.4.0-150600.8.58.1.aarch64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:cluster-md-kmp-azure-6.4.0-150600.8.58.1.aarch64"
},
"product_reference": "cluster-md-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cluster-md-kmp-azure-6.4.0-150600.8.58.1.x86_64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:cluster-md-kmp-azure-6.4.0-150600.8.58.1.x86_64"
},
"product_reference": "cluster-md-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dlm-kmp-azure-6.4.0-150600.8.58.1.aarch64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:dlm-kmp-azure-6.4.0-150600.8.58.1.aarch64"
},
"product_reference": "dlm-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dlm-kmp-azure-6.4.0-150600.8.58.1.x86_64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:dlm-kmp-azure-6.4.0-150600.8.58.1.x86_64"
},
"product_reference": "dlm-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gfs2-kmp-azure-6.4.0-150600.8.58.1.aarch64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:gfs2-kmp-azure-6.4.0-150600.8.58.1.aarch64"
},
"product_reference": "gfs2-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gfs2-kmp-azure-6.4.0-150600.8.58.1.x86_64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:gfs2-kmp-azure-6.4.0-150600.8.58.1.x86_64"
},
"product_reference": "gfs2-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-azure-6.4.0-150600.8.58.1.aarch64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:kernel-azure-6.4.0-150600.8.58.1.aarch64"
},
"product_reference": "kernel-azure-6.4.0-150600.8.58.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-azure-6.4.0-150600.8.58.1.x86_64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:kernel-azure-6.4.0-150600.8.58.1.x86_64"
},
"product_reference": "kernel-azure-6.4.0-150600.8.58.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-azure-devel-6.4.0-150600.8.58.1.aarch64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:kernel-azure-devel-6.4.0-150600.8.58.1.aarch64"
},
"product_reference": "kernel-azure-devel-6.4.0-150600.8.58.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-azure-devel-6.4.0-150600.8.58.1.x86_64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:kernel-azure-devel-6.4.0-150600.8.58.1.x86_64"
},
"product_reference": "kernel-azure-devel-6.4.0-150600.8.58.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-azure-extra-6.4.0-150600.8.58.1.aarch64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:kernel-azure-extra-6.4.0-150600.8.58.1.aarch64"
},
"product_reference": "kernel-azure-extra-6.4.0-150600.8.58.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-azure-extra-6.4.0-150600.8.58.1.x86_64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:kernel-azure-extra-6.4.0-150600.8.58.1.x86_64"
},
"product_reference": "kernel-azure-extra-6.4.0-150600.8.58.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-azure-optional-6.4.0-150600.8.58.1.aarch64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:kernel-azure-optional-6.4.0-150600.8.58.1.aarch64"
},
"product_reference": "kernel-azure-optional-6.4.0-150600.8.58.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-azure-optional-6.4.0-150600.8.58.1.x86_64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:kernel-azure-optional-6.4.0-150600.8.58.1.x86_64"
},
"product_reference": "kernel-azure-optional-6.4.0-150600.8.58.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-azure-vdso-6.4.0-150600.8.58.1.x86_64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:kernel-azure-vdso-6.4.0-150600.8.58.1.x86_64"
},
"product_reference": "kernel-azure-vdso-6.4.0-150600.8.58.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-azure-6.4.0-150600.8.58.1.noarch as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:kernel-devel-azure-6.4.0-150600.8.58.1.noarch"
},
"product_reference": "kernel-devel-azure-6.4.0-150600.8.58.1.noarch",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-source-azure-6.4.0-150600.8.58.1.noarch as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:kernel-source-azure-6.4.0-150600.8.58.1.noarch"
},
"product_reference": "kernel-source-azure-6.4.0-150600.8.58.1.noarch",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-azure-6.4.0-150600.8.58.1.aarch64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:kernel-syms-azure-6.4.0-150600.8.58.1.aarch64"
},
"product_reference": "kernel-syms-azure-6.4.0-150600.8.58.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-azure-6.4.0-150600.8.58.1.x86_64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:kernel-syms-azure-6.4.0-150600.8.58.1.x86_64"
},
"product_reference": "kernel-syms-azure-6.4.0-150600.8.58.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kselftests-kmp-azure-6.4.0-150600.8.58.1.aarch64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:kselftests-kmp-azure-6.4.0-150600.8.58.1.aarch64"
},
"product_reference": "kselftests-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kselftests-kmp-azure-6.4.0-150600.8.58.1.x86_64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:kselftests-kmp-azure-6.4.0-150600.8.58.1.x86_64"
},
"product_reference": "kselftests-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ocfs2-kmp-azure-6.4.0-150600.8.58.1.aarch64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:ocfs2-kmp-azure-6.4.0-150600.8.58.1.aarch64"
},
"product_reference": "ocfs2-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ocfs2-kmp-azure-6.4.0-150600.8.58.1.x86_64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:ocfs2-kmp-azure-6.4.0-150600.8.58.1.x86_64"
},
"product_reference": "ocfs2-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "reiserfs-kmp-azure-6.4.0-150600.8.58.1.aarch64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:reiserfs-kmp-azure-6.4.0-150600.8.58.1.aarch64"
},
"product_reference": "reiserfs-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "reiserfs-kmp-azure-6.4.0-150600.8.58.1.x86_64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:reiserfs-kmp-azure-6.4.0-150600.8.58.1.x86_64"
},
"product_reference": "reiserfs-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.6"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2022-50253",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-50253"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nbpf: make sure skb-\u003elen != 0 when redirecting to a tunneling device\n\nsyzkaller managed to trigger another case where skb-\u003elen == 0\nwhen we enter __dev_queue_xmit:\n\nWARNING: CPU: 0 PID: 2470 at include/linux/skbuff.h:2576 skb_assert_len include/linux/skbuff.h:2576 [inline]\nWARNING: CPU: 0 PID: 2470 at include/linux/skbuff.h:2576 __dev_queue_xmit+0x2069/0x35e0 net/core/dev.c:4295\n\nCall Trace:\n dev_queue_xmit+0x17/0x20 net/core/dev.c:4406\n __bpf_tx_skb net/core/filter.c:2115 [inline]\n __bpf_redirect_no_mac net/core/filter.c:2140 [inline]\n __bpf_redirect+0x5fb/0xda0 net/core/filter.c:2163\n ____bpf_clone_redirect net/core/filter.c:2447 [inline]\n bpf_clone_redirect+0x247/0x390 net/core/filter.c:2419\n bpf_prog_48159a89cb4a9a16+0x59/0x5e\n bpf_dispatcher_nop_func include/linux/bpf.h:897 [inline]\n __bpf_prog_run include/linux/filter.h:596 [inline]\n bpf_prog_run include/linux/filter.h:603 [inline]\n bpf_test_run+0x46c/0x890 net/bpf/test_run.c:402\n bpf_prog_test_run_skb+0xbdc/0x14c0 net/bpf/test_run.c:1170\n bpf_prog_test_run+0x345/0x3c0 kernel/bpf/syscall.c:3648\n __sys_bpf+0x43a/0x6c0 kernel/bpf/syscall.c:5005\n __do_sys_bpf kernel/bpf/syscall.c:5091 [inline]\n __se_sys_bpf kernel/bpf/syscall.c:5089 [inline]\n __x64_sys_bpf+0x7c/0x90 kernel/bpf/syscall.c:5089\n do_syscall_64+0x54/0x70 arch/x86/entry/common.c:48\n entry_SYSCALL_64_after_hwframe+0x61/0xc6\n\nThe reproducer doesn\u0027t really reproduce outside of syzkaller\nenvironment, so I\u0027m taking a guess here. It looks like we\ndo generate correct ETH_HLEN-sized packet, but we redirect\nthe packet to the tunneling device. Before we do so, we\n__skb_pull l2 header and arrive again at skb-\u003elen == 0.\nDoesn\u0027t seem like we can do anything better than having\nan explicit check after __skb_pull?",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-6.4.0-150600.8.58.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-6.4.0-150600.8.58.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-devel-6.4.0-150600.8.58.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-devel-6.4.0-150600.8.58.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-devel-azure-6.4.0-150600.8.58.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-source-azure-6.4.0-150600.8.58.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-syms-azure-6.4.0-150600.8.58.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-syms-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:gfs2-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-devel-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-devel-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-extra-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-extra-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-optional-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-optional-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-vdso-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-azure-6.4.0-150600.8.58.1.noarch",
"openSUSE Leap 15.6:kernel-source-azure-6.4.0-150600.8.58.1.noarch",
"openSUSE Leap 15.6:kernel-syms-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kselftests-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-azure-6.4.0-150600.8.58.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-50253",
"url": "https://www.suse.com/security/cve/CVE-2022-50253"
},
{
"category": "external",
"summary": "SUSE Bug 1249912 for CVE-2022-50253",
"url": "https://bugzilla.suse.com/1249912"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-6.4.0-150600.8.58.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-6.4.0-150600.8.58.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-devel-6.4.0-150600.8.58.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-devel-6.4.0-150600.8.58.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-devel-azure-6.4.0-150600.8.58.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-source-azure-6.4.0-150600.8.58.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-syms-azure-6.4.0-150600.8.58.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-syms-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:gfs2-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-devel-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-devel-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-extra-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-extra-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-optional-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-optional-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-vdso-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-azure-6.4.0-150600.8.58.1.noarch",
"openSUSE Leap 15.6:kernel-source-azure-6.4.0-150600.8.58.1.noarch",
"openSUSE Leap 15.6:kernel-syms-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kselftests-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-azure-6.4.0-150600.8.58.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-6.4.0-150600.8.58.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-6.4.0-150600.8.58.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-devel-6.4.0-150600.8.58.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-devel-6.4.0-150600.8.58.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-devel-azure-6.4.0-150600.8.58.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-source-azure-6.4.0-150600.8.58.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-syms-azure-6.4.0-150600.8.58.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-syms-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:gfs2-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-devel-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-devel-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-extra-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-extra-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-optional-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-optional-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-vdso-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-azure-6.4.0-150600.8.58.1.noarch",
"openSUSE Leap 15.6:kernel-source-azure-6.4.0-150600.8.58.1.noarch",
"openSUSE Leap 15.6:kernel-syms-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kselftests-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-azure-6.4.0-150600.8.58.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-22T16:35:13Z",
"details": "moderate"
}
],
"title": "CVE-2022-50253"
},
{
"cve": "CVE-2023-53676",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2023-53676"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nscsi: target: iscsi: Fix buffer overflow in lio_target_nacl_info_show()\n\nThe function lio_target_nacl_info_show() uses sprintf() in a loop to print\ndetails for every iSCSI connection in a session without checking for the\nbuffer length. With enough iSCSI connections it\u0027s possible to overflow the\nbuffer provided by configfs and corrupt the memory.\n\nThis patch replaces sprintf() with sysfs_emit_at() that checks for buffer\nboundries.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-6.4.0-150600.8.58.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-6.4.0-150600.8.58.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-devel-6.4.0-150600.8.58.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-devel-6.4.0-150600.8.58.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-devel-azure-6.4.0-150600.8.58.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-source-azure-6.4.0-150600.8.58.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-syms-azure-6.4.0-150600.8.58.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-syms-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:gfs2-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-devel-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-devel-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-extra-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-extra-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-optional-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-optional-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-vdso-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-azure-6.4.0-150600.8.58.1.noarch",
"openSUSE Leap 15.6:kernel-source-azure-6.4.0-150600.8.58.1.noarch",
"openSUSE Leap 15.6:kernel-syms-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kselftests-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-azure-6.4.0-150600.8.58.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2023-53676",
"url": "https://www.suse.com/security/cve/CVE-2023-53676"
},
{
"category": "external",
"summary": "SUSE Bug 1251786 for CVE-2023-53676",
"url": "https://bugzilla.suse.com/1251786"
},
{
"category": "external",
"summary": "SUSE Bug 1251787 for CVE-2023-53676",
"url": "https://bugzilla.suse.com/1251787"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-6.4.0-150600.8.58.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-6.4.0-150600.8.58.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-devel-6.4.0-150600.8.58.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-devel-6.4.0-150600.8.58.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-devel-azure-6.4.0-150600.8.58.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-source-azure-6.4.0-150600.8.58.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-syms-azure-6.4.0-150600.8.58.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-syms-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:gfs2-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-devel-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-devel-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-extra-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-extra-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-optional-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-optional-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-vdso-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-azure-6.4.0-150600.8.58.1.noarch",
"openSUSE Leap 15.6:kernel-source-azure-6.4.0-150600.8.58.1.noarch",
"openSUSE Leap 15.6:kernel-syms-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kselftests-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-azure-6.4.0-150600.8.58.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-6.4.0-150600.8.58.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-6.4.0-150600.8.58.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-devel-6.4.0-150600.8.58.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-devel-6.4.0-150600.8.58.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-devel-azure-6.4.0-150600.8.58.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-source-azure-6.4.0-150600.8.58.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-syms-azure-6.4.0-150600.8.58.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-syms-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:gfs2-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-devel-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-devel-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-extra-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-extra-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-optional-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-optional-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-vdso-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-azure-6.4.0-150600.8.58.1.noarch",
"openSUSE Leap 15.6:kernel-source-azure-6.4.0-150600.8.58.1.noarch",
"openSUSE Leap 15.6:kernel-syms-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kselftests-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-azure-6.4.0-150600.8.58.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-22T16:35:13Z",
"details": "important"
}
],
"title": "CVE-2023-53676"
},
{
"cve": "CVE-2025-21710",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-21710"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\ntcp: correct handling of extreme memory squeeze\n\nTesting with iperf3 using the \"pasta\" protocol splicer has revealed\na problem in the way tcp handles window advertising in extreme memory\nsqueeze situations.\n\nUnder memory pressure, a socket endpoint may temporarily advertise\na zero-sized window, but this is not stored as part of the socket data.\nThe reasoning behind this is that it is considered a temporary setting\nwhich shouldn\u0027t influence any further calculations.\n\nHowever, if we happen to stall at an unfortunate value of the current\nwindow size, the algorithm selecting a new value will consistently fail\nto advertise a non-zero window once we have freed up enough memory.\nThis means that this side\u0027s notion of the current window size is\ndifferent from the one last advertised to the peer, causing the latter\nto not send any data to resolve the sitution.\n\nThe problem occurs on the iperf3 server side, and the socket in question\nis a completely regular socket with the default settings for the\nfedora40 kernel. We do not use SO_PEEK or SO_RCVBUF on the socket.\n\nThe following excerpt of a logging session, with own comments added,\nshows more in detail what is happening:\n\n// tcp_v4_rcv(-\u003e)\n// tcp_rcv_established(-\u003e)\n[5201\u003c-\u003e39222]: ==== Activating log @ net/ipv4/tcp_input.c/tcp_data_queue()/5257 ====\n[5201\u003c-\u003e39222]: tcp_data_queue(-\u003e)\n[5201\u003c-\u003e39222]: DROPPING skb [265600160..265665640], reason: SKB_DROP_REASON_PROTO_MEM\n [rcv_nxt 265600160, rcv_wnd 262144, snt_ack 265469200, win_now 131184]\n [copied_seq 259909392-\u003e260034360 (124968), unread 5565800, qlen 85, ofoq 0]\n [OFO queue: gap: 65480, len: 0]\n[5201\u003c-\u003e39222]: tcp_data_queue(\u003c-)\n[5201\u003c-\u003e39222]: __tcp_transmit_skb(-\u003e)\n [tp-\u003ercv_wup: 265469200, tp-\u003ercv_wnd: 262144, tp-\u003ercv_nxt 265600160]\n[5201\u003c-\u003e39222]: tcp_select_window(-\u003e)\n[5201\u003c-\u003e39222]: (inet_csk(sk)-\u003eicsk_ack.pending \u0026 ICSK_ACK_NOMEM) ? --\u003e TRUE\n [tp-\u003ercv_wup: 265469200, tp-\u003ercv_wnd: 262144, tp-\u003ercv_nxt 265600160]\n returning 0\n[5201\u003c-\u003e39222]: tcp_select_window(\u003c-)\n[5201\u003c-\u003e39222]: ADVERTISING WIN 0, ACK_SEQ: 265600160\n[5201\u003c-\u003e39222]: [__tcp_transmit_skb(\u003c-)\n[5201\u003c-\u003e39222]: tcp_rcv_established(\u003c-)\n[5201\u003c-\u003e39222]: tcp_v4_rcv(\u003c-)\n\n// Receive queue is at 85 buffers and we are out of memory.\n// We drop the incoming buffer, although it is in sequence, and decide\n// to send an advertisement with a window of zero.\n// We don\u0027t update tp-\u003ercv_wnd and tp-\u003ercv_wup accordingly, which means\n// we unconditionally shrink the window.\n\n[5201\u003c-\u003e39222]: tcp_recvmsg_locked(-\u003e)\n[5201\u003c-\u003e39222]: __tcp_cleanup_rbuf(-\u003e) tp-\u003ercv_wup: 265469200, tp-\u003ercv_wnd: 262144, tp-\u003ercv_nxt 265600160\n[5201\u003c-\u003e39222]: [new_win = 0, win_now = 131184, 2 * win_now = 262368]\n[5201\u003c-\u003e39222]: [new_win \u003e= (2 * win_now) ? --\u003e time_to_ack = 0]\n[5201\u003c-\u003e39222]: NOT calling tcp_send_ack()\n [tp-\u003ercv_wup: 265469200, tp-\u003ercv_wnd: 262144, tp-\u003ercv_nxt 265600160]\n[5201\u003c-\u003e39222]: __tcp_cleanup_rbuf(\u003c-)\n [rcv_nxt 265600160, rcv_wnd 262144, snt_ack 265469200, win_now 131184]\n [copied_seq 260040464-\u003e260040464 (0), unread 5559696, qlen 85, ofoq 0]\n returning 6104 bytes\n[5201\u003c-\u003e39222]: tcp_recvmsg_locked(\u003c-)\n\n// After each read, the algorithm for calculating the new receive\n// window in __tcp_cleanup_rbuf() finds it is too small to advertise\n// or to update tp-\u003ercv_wnd.\n// Meanwhile, the peer thinks the window is zero, and will not send\n// any more data to trigger an update from the interrupt mode side.\n\n[5201\u003c-\u003e39222]: tcp_recvmsg_locked(-\u003e)\n[5201\u003c-\u003e39222]: __tcp_cleanup_rbuf(-\u003e) tp-\u003ercv_wup: 265469200, tp-\u003ercv_wnd: 262144, tp-\u003ercv_nxt 265600160\n[5201\u003c-\u003e39222]: [new_win = 262144, win_now = 131184, 2 * win_n\n---truncated---",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-6.4.0-150600.8.58.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-6.4.0-150600.8.58.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-devel-6.4.0-150600.8.58.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-devel-6.4.0-150600.8.58.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-devel-azure-6.4.0-150600.8.58.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-source-azure-6.4.0-150600.8.58.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-syms-azure-6.4.0-150600.8.58.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-syms-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:gfs2-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-devel-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-devel-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-extra-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-extra-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-optional-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-optional-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-vdso-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-azure-6.4.0-150600.8.58.1.noarch",
"openSUSE Leap 15.6:kernel-source-azure-6.4.0-150600.8.58.1.noarch",
"openSUSE Leap 15.6:kernel-syms-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kselftests-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-azure-6.4.0-150600.8.58.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-21710",
"url": "https://www.suse.com/security/cve/CVE-2025-21710"
},
{
"category": "external",
"summary": "SUSE Bug 1237888 for CVE-2025-21710",
"url": "https://bugzilla.suse.com/1237888"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-6.4.0-150600.8.58.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-6.4.0-150600.8.58.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-devel-6.4.0-150600.8.58.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-devel-6.4.0-150600.8.58.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-devel-azure-6.4.0-150600.8.58.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-source-azure-6.4.0-150600.8.58.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-syms-azure-6.4.0-150600.8.58.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-syms-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:gfs2-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-devel-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-devel-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-extra-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-extra-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-optional-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-optional-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-vdso-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-azure-6.4.0-150600.8.58.1.noarch",
"openSUSE Leap 15.6:kernel-source-azure-6.4.0-150600.8.58.1.noarch",
"openSUSE Leap 15.6:kernel-syms-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kselftests-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-azure-6.4.0-150600.8.58.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-6.4.0-150600.8.58.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-6.4.0-150600.8.58.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-devel-6.4.0-150600.8.58.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-devel-6.4.0-150600.8.58.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-devel-azure-6.4.0-150600.8.58.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-source-azure-6.4.0-150600.8.58.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-syms-azure-6.4.0-150600.8.58.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-syms-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:gfs2-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-devel-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-devel-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-extra-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-extra-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-optional-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-optional-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-vdso-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-azure-6.4.0-150600.8.58.1.noarch",
"openSUSE Leap 15.6:kernel-source-azure-6.4.0-150600.8.58.1.noarch",
"openSUSE Leap 15.6:kernel-syms-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kselftests-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-azure-6.4.0-150600.8.58.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-22T16:35:13Z",
"details": "moderate"
}
],
"title": "CVE-2025-21710"
},
{
"cve": "CVE-2025-37916",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-37916"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\npds_core: remove write-after-free of client_id\n\nA use-after-free error popped up in stress testing:\n\n[Mon Apr 21 21:21:33 2025] BUG: KFENCE: use-after-free write in pdsc_auxbus_dev_del+0xef/0x160 [pds_core]\n[Mon Apr 21 21:21:33 2025] Use-after-free write at 0x000000007013ecd1 (in kfence-#47):\n[Mon Apr 21 21:21:33 2025] pdsc_auxbus_dev_del+0xef/0x160 [pds_core]\n[Mon Apr 21 21:21:33 2025] pdsc_remove+0xc0/0x1b0 [pds_core]\n[Mon Apr 21 21:21:33 2025] pci_device_remove+0x24/0x70\n[Mon Apr 21 21:21:33 2025] device_release_driver_internal+0x11f/0x180\n[Mon Apr 21 21:21:33 2025] driver_detach+0x45/0x80\n[Mon Apr 21 21:21:33 2025] bus_remove_driver+0x83/0xe0\n[Mon Apr 21 21:21:33 2025] pci_unregister_driver+0x1a/0x80\n\nThe actual device uninit usually happens on a separate thread\nscheduled after this code runs, but there is no guarantee of order\nof thread execution, so this could be a problem. There\u0027s no\nactual need to clear the client_id at this point, so simply\nremove the offending code.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-6.4.0-150600.8.58.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-6.4.0-150600.8.58.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-devel-6.4.0-150600.8.58.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-devel-6.4.0-150600.8.58.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-devel-azure-6.4.0-150600.8.58.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-source-azure-6.4.0-150600.8.58.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-syms-azure-6.4.0-150600.8.58.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-syms-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:gfs2-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-devel-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-devel-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-extra-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-extra-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-optional-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-optional-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-vdso-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-azure-6.4.0-150600.8.58.1.noarch",
"openSUSE Leap 15.6:kernel-source-azure-6.4.0-150600.8.58.1.noarch",
"openSUSE Leap 15.6:kernel-syms-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kselftests-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-azure-6.4.0-150600.8.58.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-37916",
"url": "https://www.suse.com/security/cve/CVE-2025-37916"
},
{
"category": "external",
"summary": "SUSE Bug 1243474 for CVE-2025-37916",
"url": "https://bugzilla.suse.com/1243474"
},
{
"category": "external",
"summary": "SUSE Bug 1243535 for CVE-2025-37916",
"url": "https://bugzilla.suse.com/1243535"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-6.4.0-150600.8.58.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-6.4.0-150600.8.58.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-devel-6.4.0-150600.8.58.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-devel-6.4.0-150600.8.58.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-devel-azure-6.4.0-150600.8.58.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-source-azure-6.4.0-150600.8.58.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-syms-azure-6.4.0-150600.8.58.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-syms-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:gfs2-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-devel-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-devel-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-extra-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-extra-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-optional-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-optional-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-vdso-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-azure-6.4.0-150600.8.58.1.noarch",
"openSUSE Leap 15.6:kernel-source-azure-6.4.0-150600.8.58.1.noarch",
"openSUSE Leap 15.6:kernel-syms-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kselftests-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-azure-6.4.0-150600.8.58.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-6.4.0-150600.8.58.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-6.4.0-150600.8.58.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-devel-6.4.0-150600.8.58.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-devel-6.4.0-150600.8.58.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-devel-azure-6.4.0-150600.8.58.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-source-azure-6.4.0-150600.8.58.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-syms-azure-6.4.0-150600.8.58.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-syms-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:gfs2-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-devel-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-devel-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-extra-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-extra-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-optional-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-optional-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-vdso-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-azure-6.4.0-150600.8.58.1.noarch",
"openSUSE Leap 15.6:kernel-source-azure-6.4.0-150600.8.58.1.noarch",
"openSUSE Leap 15.6:kernel-syms-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kselftests-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-azure-6.4.0-150600.8.58.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-22T16:35:13Z",
"details": "moderate"
}
],
"title": "CVE-2025-37916"
},
{
"cve": "CVE-2025-38359",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-38359"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\ns390/mm: Fix in_atomic() handling in do_secure_storage_access()\n\nKernel user spaces accesses to not exported pages in atomic context\nincorrectly try to resolve the page fault.\nWith debug options enabled call traces like this can be seen:\n\nBUG: sleeping function called from invalid context at kernel/locking/rwsem.c:1523\nin_atomic(): 1, irqs_disabled(): 0, non_block: 0, pid: 419074, name: qemu-system-s39\npreempt_count: 1, expected: 0\nRCU nest depth: 0, expected: 0\nINFO: lockdep is turned off.\nPreemption disabled at:\n[\u003c00000383ea47cfa2\u003e] copy_page_from_iter_atomic+0xa2/0x8a0\nCPU: 12 UID: 0 PID: 419074 Comm: qemu-system-s39\nTainted: G W 6.16.0-20250531.rc0.git0.69b3a602feac.63.fc42.s390x+debug #1 PREEMPT\nTainted: [W]=WARN\nHardware name: IBM 3931 A01 703 (LPAR)\nCall Trace:\n [\u003c00000383e990d282\u003e] dump_stack_lvl+0xa2/0xe8\n [\u003c00000383e99bf152\u003e] __might_resched+0x292/0x2d0\n [\u003c00000383eaa7c374\u003e] down_read+0x34/0x2d0\n [\u003c00000383e99432f8\u003e] do_secure_storage_access+0x108/0x360\n [\u003c00000383eaa724b0\u003e] __do_pgm_check+0x130/0x220\n [\u003c00000383eaa842e4\u003e] pgm_check_handler+0x114/0x160\n [\u003c00000383ea47d028\u003e] copy_page_from_iter_atomic+0x128/0x8a0\n([\u003c00000383ea47d016\u003e] copy_page_from_iter_atomic+0x116/0x8a0)\n [\u003c00000383e9c45eae\u003e] generic_perform_write+0x16e/0x310\n [\u003c00000383e9eb87f4\u003e] ext4_buffered_write_iter+0x84/0x160\n [\u003c00000383e9da0de4\u003e] vfs_write+0x1c4/0x460\n [\u003c00000383e9da123c\u003e] ksys_write+0x7c/0x100\n [\u003c00000383eaa7284e\u003e] __do_syscall+0x15e/0x280\n [\u003c00000383eaa8417e\u003e] system_call+0x6e/0x90\nINFO: lockdep is turned off.\n\nIt is not allowed to take the mmap_lock while in atomic context. Therefore\nhandle such a secure storage access fault as if the accessed page is not\nmapped: the uaccess function will return -EFAULT, and the caller has to\ndeal with this. Usually this means that the access is retried in process\ncontext, which allows to resolve the page fault (or in this case export the\npage).",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-6.4.0-150600.8.58.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-6.4.0-150600.8.58.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-devel-6.4.0-150600.8.58.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-devel-6.4.0-150600.8.58.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-devel-azure-6.4.0-150600.8.58.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-source-azure-6.4.0-150600.8.58.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-syms-azure-6.4.0-150600.8.58.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-syms-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:gfs2-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-devel-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-devel-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-extra-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-extra-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-optional-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-optional-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-vdso-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-azure-6.4.0-150600.8.58.1.noarch",
"openSUSE Leap 15.6:kernel-source-azure-6.4.0-150600.8.58.1.noarch",
"openSUSE Leap 15.6:kernel-syms-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kselftests-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-azure-6.4.0-150600.8.58.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-38359",
"url": "https://www.suse.com/security/cve/CVE-2025-38359"
},
{
"category": "external",
"summary": "SUSE Bug 1247076 for CVE-2025-38359",
"url": "https://bugzilla.suse.com/1247076"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-6.4.0-150600.8.58.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-6.4.0-150600.8.58.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-devel-6.4.0-150600.8.58.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-devel-6.4.0-150600.8.58.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-devel-azure-6.4.0-150600.8.58.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-source-azure-6.4.0-150600.8.58.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-syms-azure-6.4.0-150600.8.58.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-syms-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:gfs2-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-devel-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-devel-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-extra-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-extra-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-optional-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-optional-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-vdso-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-azure-6.4.0-150600.8.58.1.noarch",
"openSUSE Leap 15.6:kernel-source-azure-6.4.0-150600.8.58.1.noarch",
"openSUSE Leap 15.6:kernel-syms-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kselftests-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-azure-6.4.0-150600.8.58.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-6.4.0-150600.8.58.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-6.4.0-150600.8.58.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-devel-6.4.0-150600.8.58.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-devel-6.4.0-150600.8.58.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-devel-azure-6.4.0-150600.8.58.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-source-azure-6.4.0-150600.8.58.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-syms-azure-6.4.0-150600.8.58.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-syms-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:gfs2-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-devel-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-devel-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-extra-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-extra-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-optional-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-optional-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-vdso-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-azure-6.4.0-150600.8.58.1.noarch",
"openSUSE Leap 15.6:kernel-source-azure-6.4.0-150600.8.58.1.noarch",
"openSUSE Leap 15.6:kernel-syms-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kselftests-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-azure-6.4.0-150600.8.58.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-22T16:35:13Z",
"details": "moderate"
}
],
"title": "CVE-2025-38359"
},
{
"cve": "CVE-2025-38361",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-38361"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\ndrm/amd/display: Check dce_hwseq before dereferencing it\n\n[WHAT]\n\nhws was checked for null earlier in dce110_blank_stream, indicating hws\ncan be null, and should be checked whenever it is used.\n\n(cherry picked from commit 79db43611ff61280b6de58ce1305e0b2ecf675ad)",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-6.4.0-150600.8.58.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-6.4.0-150600.8.58.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-devel-6.4.0-150600.8.58.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-devel-6.4.0-150600.8.58.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-devel-azure-6.4.0-150600.8.58.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-source-azure-6.4.0-150600.8.58.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-syms-azure-6.4.0-150600.8.58.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-syms-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:gfs2-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-devel-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-devel-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-extra-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-extra-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-optional-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-optional-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-vdso-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-azure-6.4.0-150600.8.58.1.noarch",
"openSUSE Leap 15.6:kernel-source-azure-6.4.0-150600.8.58.1.noarch",
"openSUSE Leap 15.6:kernel-syms-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kselftests-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-azure-6.4.0-150600.8.58.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-38361",
"url": "https://www.suse.com/security/cve/CVE-2025-38361"
},
{
"category": "external",
"summary": "SUSE Bug 1247079 for CVE-2025-38361",
"url": "https://bugzilla.suse.com/1247079"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-6.4.0-150600.8.58.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-6.4.0-150600.8.58.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-devel-6.4.0-150600.8.58.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-devel-6.4.0-150600.8.58.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-devel-azure-6.4.0-150600.8.58.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-source-azure-6.4.0-150600.8.58.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-syms-azure-6.4.0-150600.8.58.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-syms-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:gfs2-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-devel-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-devel-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-extra-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-extra-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-optional-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-optional-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-vdso-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-azure-6.4.0-150600.8.58.1.noarch",
"openSUSE Leap 15.6:kernel-source-azure-6.4.0-150600.8.58.1.noarch",
"openSUSE Leap 15.6:kernel-syms-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kselftests-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-azure-6.4.0-150600.8.58.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-6.4.0-150600.8.58.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-6.4.0-150600.8.58.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-devel-6.4.0-150600.8.58.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-devel-6.4.0-150600.8.58.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-devel-azure-6.4.0-150600.8.58.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-source-azure-6.4.0-150600.8.58.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-syms-azure-6.4.0-150600.8.58.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-syms-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:gfs2-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-devel-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-devel-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-extra-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-extra-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-optional-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-optional-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-vdso-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-azure-6.4.0-150600.8.58.1.noarch",
"openSUSE Leap 15.6:kernel-source-azure-6.4.0-150600.8.58.1.noarch",
"openSUSE Leap 15.6:kernel-syms-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kselftests-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-azure-6.4.0-150600.8.58.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-22T16:35:13Z",
"details": "moderate"
}
],
"title": "CVE-2025-38361"
},
{
"cve": "CVE-2025-39788",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-39788"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nscsi: ufs: exynos: Fix programming of HCI_UTRL_NEXUS_TYPE\n\nOn Google gs101, the number of UTP transfer request slots (nutrs) is 32,\nand in this case the driver ends up programming the UTRL_NEXUS_TYPE\nincorrectly as 0.\n\nThis is because the left hand side of the shift is 1, which is of type\nint, i.e. 31 bits wide. Shifting by more than that width results in\nundefined behaviour.\n\nFix this by switching to the BIT() macro, which applies correct type\ncasting as required. This ensures the correct value is written to\nUTRL_NEXUS_TYPE (0xffffffff on gs101), and it also fixes a UBSAN shift\nwarning:\n\n UBSAN: shift-out-of-bounds in drivers/ufs/host/ufs-exynos.c:1113:21\n shift exponent 32 is too large for 32-bit type \u0027int\u0027\n\nFor consistency, apply the same change to the nutmrs / UTMRL_NEXUS_TYPE\nwrite.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-6.4.0-150600.8.58.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-6.4.0-150600.8.58.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-devel-6.4.0-150600.8.58.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-devel-6.4.0-150600.8.58.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-devel-azure-6.4.0-150600.8.58.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-source-azure-6.4.0-150600.8.58.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-syms-azure-6.4.0-150600.8.58.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-syms-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:gfs2-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-devel-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-devel-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-extra-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-extra-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-optional-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-optional-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-vdso-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-azure-6.4.0-150600.8.58.1.noarch",
"openSUSE Leap 15.6:kernel-source-azure-6.4.0-150600.8.58.1.noarch",
"openSUSE Leap 15.6:kernel-syms-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kselftests-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-azure-6.4.0-150600.8.58.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-39788",
"url": "https://www.suse.com/security/cve/CVE-2025-39788"
},
{
"category": "external",
"summary": "SUSE Bug 1249547 for CVE-2025-39788",
"url": "https://bugzilla.suse.com/1249547"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-6.4.0-150600.8.58.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-6.4.0-150600.8.58.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-devel-6.4.0-150600.8.58.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-devel-6.4.0-150600.8.58.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-devel-azure-6.4.0-150600.8.58.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-source-azure-6.4.0-150600.8.58.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-syms-azure-6.4.0-150600.8.58.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-syms-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:gfs2-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-devel-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-devel-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-extra-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-extra-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-optional-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-optional-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-vdso-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-azure-6.4.0-150600.8.58.1.noarch",
"openSUSE Leap 15.6:kernel-source-azure-6.4.0-150600.8.58.1.noarch",
"openSUSE Leap 15.6:kernel-syms-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kselftests-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-azure-6.4.0-150600.8.58.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-6.4.0-150600.8.58.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-6.4.0-150600.8.58.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-devel-6.4.0-150600.8.58.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-devel-6.4.0-150600.8.58.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-devel-azure-6.4.0-150600.8.58.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-source-azure-6.4.0-150600.8.58.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-syms-azure-6.4.0-150600.8.58.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-syms-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:gfs2-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-devel-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-devel-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-extra-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-extra-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-optional-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-optional-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-vdso-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-azure-6.4.0-150600.8.58.1.noarch",
"openSUSE Leap 15.6:kernel-source-azure-6.4.0-150600.8.58.1.noarch",
"openSUSE Leap 15.6:kernel-syms-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kselftests-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-azure-6.4.0-150600.8.58.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-22T16:35:13Z",
"details": "moderate"
}
],
"title": "CVE-2025-39788"
},
{
"cve": "CVE-2025-39805",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-39805"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnet: macb: fix unregister_netdev call order in macb_remove()\n\nWhen removing a macb device, the driver calls phy_exit() before\nunregister_netdev(). This leads to a WARN from kernfs:\n\n ------------[ cut here ]------------\n kernfs: can not remove \u0027attached_dev\u0027, no directory\n WARNING: CPU: 1 PID: 27146 at fs/kernfs/dir.c:1683\n Call trace:\n kernfs_remove_by_name_ns+0xd8/0xf0\n sysfs_remove_link+0x24/0x58\n phy_detach+0x5c/0x168\n phy_disconnect+0x4c/0x70\n phylink_disconnect_phy+0x6c/0xc0 [phylink]\n macb_close+0x6c/0x170 [macb]\n ...\n macb_remove+0x60/0x168 [macb]\n platform_remove+0x5c/0x80\n ...\n\nThe warning happens because the PHY is being exited while the netdev\nis still registered. The correct order is to unregister the netdev\nbefore shutting down the PHY and cleaning up the MDIO bus.\n\nFix this by moving unregister_netdev() ahead of phy_exit() in\nmacb_remove().",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-6.4.0-150600.8.58.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-6.4.0-150600.8.58.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-devel-6.4.0-150600.8.58.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-devel-6.4.0-150600.8.58.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-devel-azure-6.4.0-150600.8.58.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-source-azure-6.4.0-150600.8.58.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-syms-azure-6.4.0-150600.8.58.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-syms-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:gfs2-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-devel-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-devel-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-extra-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-extra-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-optional-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-optional-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-vdso-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-azure-6.4.0-150600.8.58.1.noarch",
"openSUSE Leap 15.6:kernel-source-azure-6.4.0-150600.8.58.1.noarch",
"openSUSE Leap 15.6:kernel-syms-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kselftests-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-azure-6.4.0-150600.8.58.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-39805",
"url": "https://www.suse.com/security/cve/CVE-2025-39805"
},
{
"category": "external",
"summary": "SUSE Bug 1249982 for CVE-2025-39805",
"url": "https://bugzilla.suse.com/1249982"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-6.4.0-150600.8.58.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-6.4.0-150600.8.58.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-devel-6.4.0-150600.8.58.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-devel-6.4.0-150600.8.58.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-devel-azure-6.4.0-150600.8.58.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-source-azure-6.4.0-150600.8.58.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-syms-azure-6.4.0-150600.8.58.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-syms-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:gfs2-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-devel-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-devel-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-extra-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-extra-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-optional-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-optional-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-vdso-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-azure-6.4.0-150600.8.58.1.noarch",
"openSUSE Leap 15.6:kernel-source-azure-6.4.0-150600.8.58.1.noarch",
"openSUSE Leap 15.6:kernel-syms-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kselftests-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-azure-6.4.0-150600.8.58.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-6.4.0-150600.8.58.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-6.4.0-150600.8.58.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-devel-6.4.0-150600.8.58.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-devel-6.4.0-150600.8.58.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-devel-azure-6.4.0-150600.8.58.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-source-azure-6.4.0-150600.8.58.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-syms-azure-6.4.0-150600.8.58.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-syms-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:gfs2-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-devel-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-devel-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-extra-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-extra-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-optional-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-optional-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-vdso-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-azure-6.4.0-150600.8.58.1.noarch",
"openSUSE Leap 15.6:kernel-source-azure-6.4.0-150600.8.58.1.noarch",
"openSUSE Leap 15.6:kernel-syms-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kselftests-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-azure-6.4.0-150600.8.58.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-22T16:35:13Z",
"details": "moderate"
}
],
"title": "CVE-2025-39805"
},
{
"cve": "CVE-2025-39819",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-39819"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nfs/smb: Fix inconsistent refcnt update\n\nA possible inconsistent update of refcount was identified in `smb2_compound_op`.\nSuch inconsistent update could lead to possible resource leaks.\n\nWhy it is a possible bug:\n1. In the comment section of the function, it clearly states that the\nreference to `cfile` should be dropped after calling this function.\n2. Every control flow path would check and drop the reference to\n`cfile`, except the patched one.\n3. Existing callers would not handle refcount update of `cfile` if\n-ENOMEM is returned.\n\nTo fix the bug, an extra goto label \"out\" is added, to make sure that the\ncleanup logic would always be respected. As the problem is caused by the\nallocation failure of `vars`, the cleanup logic between label \"finished\"\nand \"out\" can be safely ignored. According to the definition of function\n`is_replayable_error`, the error code of \"-ENOMEM\" is not recoverable.\nTherefore, the replay logic also gets ignored.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-6.4.0-150600.8.58.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-6.4.0-150600.8.58.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-devel-6.4.0-150600.8.58.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-devel-6.4.0-150600.8.58.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-devel-azure-6.4.0-150600.8.58.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-source-azure-6.4.0-150600.8.58.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-syms-azure-6.4.0-150600.8.58.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-syms-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:gfs2-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-devel-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-devel-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-extra-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-extra-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-optional-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-optional-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-vdso-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-azure-6.4.0-150600.8.58.1.noarch",
"openSUSE Leap 15.6:kernel-source-azure-6.4.0-150600.8.58.1.noarch",
"openSUSE Leap 15.6:kernel-syms-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kselftests-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-azure-6.4.0-150600.8.58.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-39819",
"url": "https://www.suse.com/security/cve/CVE-2025-39819"
},
{
"category": "external",
"summary": "SUSE Bug 1250176 for CVE-2025-39819",
"url": "https://bugzilla.suse.com/1250176"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-6.4.0-150600.8.58.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-6.4.0-150600.8.58.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-devel-6.4.0-150600.8.58.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-devel-6.4.0-150600.8.58.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-devel-azure-6.4.0-150600.8.58.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-source-azure-6.4.0-150600.8.58.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-syms-azure-6.4.0-150600.8.58.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-syms-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:gfs2-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-devel-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-devel-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-extra-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-extra-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-optional-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-optional-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-vdso-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-azure-6.4.0-150600.8.58.1.noarch",
"openSUSE Leap 15.6:kernel-source-azure-6.4.0-150600.8.58.1.noarch",
"openSUSE Leap 15.6:kernel-syms-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kselftests-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-azure-6.4.0-150600.8.58.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-6.4.0-150600.8.58.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-6.4.0-150600.8.58.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-devel-6.4.0-150600.8.58.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-devel-6.4.0-150600.8.58.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-devel-azure-6.4.0-150600.8.58.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-source-azure-6.4.0-150600.8.58.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-syms-azure-6.4.0-150600.8.58.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-syms-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:gfs2-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-devel-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-devel-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-extra-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-extra-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-optional-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-optional-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-vdso-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-azure-6.4.0-150600.8.58.1.noarch",
"openSUSE Leap 15.6:kernel-source-azure-6.4.0-150600.8.58.1.noarch",
"openSUSE Leap 15.6:kernel-syms-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kselftests-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-azure-6.4.0-150600.8.58.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-22T16:35:13Z",
"details": "moderate"
}
],
"title": "CVE-2025-39819"
},
{
"cve": "CVE-2025-39859",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-39859"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nptp: ocp: fix use-after-free bugs causing by ptp_ocp_watchdog\n\nThe ptp_ocp_detach() only shuts down the watchdog timer if it is\npending. However, if the timer handler is already running, the\ntimer_delete_sync() is not called. This leads to race conditions\nwhere the devlink that contains the ptp_ocp is deallocated while\nthe timer handler is still accessing it, resulting in use-after-free\nbugs. The following details one of the race scenarios.\n\n(thread 1) | (thread 2)\nptp_ocp_remove() |\n ptp_ocp_detach() | ptp_ocp_watchdog()\n if (timer_pending(\u0026bp-\u003ewatchdog))| bp = timer_container_of()\n timer_delete_sync() |\n |\n devlink_free(devlink) //free |\n | bp-\u003e //use\n\nResolve this by unconditionally calling timer_delete_sync() to ensure\nthe timer is reliably deactivated, preventing any access after free.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-6.4.0-150600.8.58.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-6.4.0-150600.8.58.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-devel-6.4.0-150600.8.58.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-devel-6.4.0-150600.8.58.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-devel-azure-6.4.0-150600.8.58.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-source-azure-6.4.0-150600.8.58.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-syms-azure-6.4.0-150600.8.58.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-syms-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:gfs2-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-devel-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-devel-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-extra-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-extra-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-optional-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-optional-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-vdso-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-azure-6.4.0-150600.8.58.1.noarch",
"openSUSE Leap 15.6:kernel-source-azure-6.4.0-150600.8.58.1.noarch",
"openSUSE Leap 15.6:kernel-syms-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kselftests-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-azure-6.4.0-150600.8.58.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-39859",
"url": "https://www.suse.com/security/cve/CVE-2025-39859"
},
{
"category": "external",
"summary": "SUSE Bug 1250252 for CVE-2025-39859",
"url": "https://bugzilla.suse.com/1250252"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-6.4.0-150600.8.58.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-6.4.0-150600.8.58.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-devel-6.4.0-150600.8.58.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-devel-6.4.0-150600.8.58.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-devel-azure-6.4.0-150600.8.58.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-source-azure-6.4.0-150600.8.58.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-syms-azure-6.4.0-150600.8.58.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-syms-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:gfs2-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-devel-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-devel-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-extra-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-extra-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-optional-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-optional-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-vdso-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-azure-6.4.0-150600.8.58.1.noarch",
"openSUSE Leap 15.6:kernel-source-azure-6.4.0-150600.8.58.1.noarch",
"openSUSE Leap 15.6:kernel-syms-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kselftests-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-azure-6.4.0-150600.8.58.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-6.4.0-150600.8.58.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-6.4.0-150600.8.58.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-devel-6.4.0-150600.8.58.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-devel-6.4.0-150600.8.58.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-devel-azure-6.4.0-150600.8.58.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-source-azure-6.4.0-150600.8.58.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-syms-azure-6.4.0-150600.8.58.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-syms-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:gfs2-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-devel-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-devel-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-extra-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-extra-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-optional-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-optional-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-vdso-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-azure-6.4.0-150600.8.58.1.noarch",
"openSUSE Leap 15.6:kernel-source-azure-6.4.0-150600.8.58.1.noarch",
"openSUSE Leap 15.6:kernel-syms-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kselftests-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-azure-6.4.0-150600.8.58.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-22T16:35:13Z",
"details": "moderate"
}
],
"title": "CVE-2025-39859"
},
{
"cve": "CVE-2025-39944",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-39944"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nocteontx2-pf: Fix use-after-free bugs in otx2_sync_tstamp()\n\nThe original code relies on cancel_delayed_work() in otx2_ptp_destroy(),\nwhich does not ensure that the delayed work item synctstamp_work has fully\ncompleted if it was already running. This leads to use-after-free scenarios\nwhere otx2_ptp is deallocated by otx2_ptp_destroy(), while synctstamp_work\nremains active and attempts to dereference otx2_ptp in otx2_sync_tstamp().\nFurthermore, the synctstamp_work is cyclic, the likelihood of triggering\nthe bug is nonnegligible.\n\nA typical race condition is illustrated below:\n\nCPU 0 (cleanup) | CPU 1 (delayed work callback)\notx2_remove() |\n otx2_ptp_destroy() | otx2_sync_tstamp()\n cancel_delayed_work() |\n kfree(ptp) |\n | ptp = container_of(...); //UAF\n | ptp-\u003e //UAF\n\nThis is confirmed by a KASAN report:\n\nBUG: KASAN: slab-use-after-free in __run_timer_base.part.0+0x7d7/0x8c0\nWrite of size 8 at addr ffff88800aa09a18 by task bash/136\n...\nCall Trace:\n \u003cIRQ\u003e\n dump_stack_lvl+0x55/0x70\n print_report+0xcf/0x610\n ? __run_timer_base.part.0+0x7d7/0x8c0\n kasan_report+0xb8/0xf0\n ? __run_timer_base.part.0+0x7d7/0x8c0\n __run_timer_base.part.0+0x7d7/0x8c0\n ? __pfx___run_timer_base.part.0+0x10/0x10\n ? __pfx_read_tsc+0x10/0x10\n ? ktime_get+0x60/0x140\n ? lapic_next_event+0x11/0x20\n ? clockevents_program_event+0x1d4/0x2a0\n run_timer_softirq+0xd1/0x190\n handle_softirqs+0x16a/0x550\n irq_exit_rcu+0xaf/0xe0\n sysvec_apic_timer_interrupt+0x70/0x80\n \u003c/IRQ\u003e\n...\nAllocated by task 1:\n kasan_save_stack+0x24/0x50\n kasan_save_track+0x14/0x30\n __kasan_kmalloc+0x7f/0x90\n otx2_ptp_init+0xb1/0x860\n otx2_probe+0x4eb/0xc30\n local_pci_probe+0xdc/0x190\n pci_device_probe+0x2fe/0x470\n really_probe+0x1ca/0x5c0\n __driver_probe_device+0x248/0x310\n driver_probe_device+0x44/0x120\n __driver_attach+0xd2/0x310\n bus_for_each_dev+0xed/0x170\n bus_add_driver+0x208/0x500\n driver_register+0x132/0x460\n do_one_initcall+0x89/0x300\n kernel_init_freeable+0x40d/0x720\n kernel_init+0x1a/0x150\n ret_from_fork+0x10c/0x1a0\n ret_from_fork_asm+0x1a/0x30\n\nFreed by task 136:\n kasan_save_stack+0x24/0x50\n kasan_save_track+0x14/0x30\n kasan_save_free_info+0x3a/0x60\n __kasan_slab_free+0x3f/0x50\n kfree+0x137/0x370\n otx2_ptp_destroy+0x38/0x80\n otx2_remove+0x10d/0x4c0\n pci_device_remove+0xa6/0x1d0\n device_release_driver_internal+0xf8/0x210\n pci_stop_bus_device+0x105/0x150\n pci_stop_and_remove_bus_device_locked+0x15/0x30\n remove_store+0xcc/0xe0\n kernfs_fop_write_iter+0x2c3/0x440\n vfs_write+0x871/0xd70\n ksys_write+0xee/0x1c0\n do_syscall_64+0xac/0x280\n entry_SYSCALL_64_after_hwframe+0x77/0x7f\n...\n\nReplace cancel_delayed_work() with cancel_delayed_work_sync() to ensure\nthat the delayed work item is properly canceled before the otx2_ptp is\ndeallocated.\n\nThis bug was initially identified through static analysis. To reproduce\nand test it, I simulated the OcteonTX2 PCI device in QEMU and introduced\nartificial delays within the otx2_sync_tstamp() function to increase the\nlikelihood of triggering the bug.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-6.4.0-150600.8.58.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-6.4.0-150600.8.58.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-devel-6.4.0-150600.8.58.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-devel-6.4.0-150600.8.58.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-devel-azure-6.4.0-150600.8.58.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-source-azure-6.4.0-150600.8.58.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-syms-azure-6.4.0-150600.8.58.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-syms-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:gfs2-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-devel-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-devel-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-extra-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-extra-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-optional-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-optional-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-vdso-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-azure-6.4.0-150600.8.58.1.noarch",
"openSUSE Leap 15.6:kernel-source-azure-6.4.0-150600.8.58.1.noarch",
"openSUSE Leap 15.6:kernel-syms-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kselftests-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-azure-6.4.0-150600.8.58.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-39944",
"url": "https://www.suse.com/security/cve/CVE-2025-39944"
},
{
"category": "external",
"summary": "SUSE Bug 1251120 for CVE-2025-39944",
"url": "https://bugzilla.suse.com/1251120"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-6.4.0-150600.8.58.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-6.4.0-150600.8.58.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-devel-6.4.0-150600.8.58.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-devel-6.4.0-150600.8.58.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-devel-azure-6.4.0-150600.8.58.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-source-azure-6.4.0-150600.8.58.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-syms-azure-6.4.0-150600.8.58.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-syms-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:gfs2-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-devel-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-devel-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-extra-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-extra-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-optional-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-optional-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-vdso-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-azure-6.4.0-150600.8.58.1.noarch",
"openSUSE Leap 15.6:kernel-source-azure-6.4.0-150600.8.58.1.noarch",
"openSUSE Leap 15.6:kernel-syms-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kselftests-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-azure-6.4.0-150600.8.58.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-6.4.0-150600.8.58.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-6.4.0-150600.8.58.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-devel-6.4.0-150600.8.58.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-devel-6.4.0-150600.8.58.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-devel-azure-6.4.0-150600.8.58.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-source-azure-6.4.0-150600.8.58.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-syms-azure-6.4.0-150600.8.58.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-syms-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:gfs2-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-devel-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-devel-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-extra-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-extra-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-optional-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-optional-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-vdso-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-azure-6.4.0-150600.8.58.1.noarch",
"openSUSE Leap 15.6:kernel-source-azure-6.4.0-150600.8.58.1.noarch",
"openSUSE Leap 15.6:kernel-syms-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kselftests-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-azure-6.4.0-150600.8.58.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-22T16:35:13Z",
"details": "moderate"
}
],
"title": "CVE-2025-39944"
},
{
"cve": "CVE-2025-39980",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-39980"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnexthop: Forbid FDB status change while nexthop is in a group\n\nThe kernel forbids the creation of non-FDB nexthop groups with FDB\nnexthops:\n\n # ip nexthop add id 1 via 192.0.2.1 fdb\n # ip nexthop add id 2 group 1\n Error: Non FDB nexthop group cannot have fdb nexthops.\n\nAnd vice versa:\n\n # ip nexthop add id 3 via 192.0.2.2 dev dummy1\n # ip nexthop add id 4 group 3 fdb\n Error: FDB nexthop group can only have fdb nexthops.\n\nHowever, as long as no routes are pointing to a non-FDB nexthop group,\nthe kernel allows changing the type of a nexthop from FDB to non-FDB and\nvice versa:\n\n # ip nexthop add id 5 via 192.0.2.2 dev dummy1\n # ip nexthop add id 6 group 5\n # ip nexthop replace id 5 via 192.0.2.2 fdb\n # echo $?\n 0\n\nThis configuration is invalid and can result in a NPD [1] since FDB\nnexthops are not associated with a nexthop device:\n\n # ip route add 198.51.100.1/32 nhid 6\n # ping 198.51.100.1\n\nFix by preventing nexthop FDB status change while the nexthop is in a\ngroup:\n\n # ip nexthop add id 7 via 192.0.2.2 dev dummy1\n # ip nexthop add id 8 group 7\n # ip nexthop replace id 7 via 192.0.2.2 fdb\n Error: Cannot change nexthop FDB status while in a group.\n\n[1]\nBUG: kernel NULL pointer dereference, address: 00000000000003c0\n[...]\nOops: Oops: 0000 [#1] SMP\nCPU: 6 UID: 0 PID: 367 Comm: ping Not tainted 6.17.0-rc6-virtme-gb65678cacc03 #1 PREEMPT(voluntary)\nHardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.17.0-4.fc41 04/01/2014\nRIP: 0010:fib_lookup_good_nhc+0x1e/0x80\n[...]\nCall Trace:\n \u003cTASK\u003e\n fib_table_lookup+0x541/0x650\n ip_route_output_key_hash_rcu+0x2ea/0x970\n ip_route_output_key_hash+0x55/0x80\n __ip4_datagram_connect+0x250/0x330\n udp_connect+0x2b/0x60\n __sys_connect+0x9c/0xd0\n __x64_sys_connect+0x18/0x20\n do_syscall_64+0xa4/0x2a0\n entry_SYSCALL_64_after_hwframe+0x4b/0x53",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-6.4.0-150600.8.58.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-6.4.0-150600.8.58.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-devel-6.4.0-150600.8.58.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-devel-6.4.0-150600.8.58.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-devel-azure-6.4.0-150600.8.58.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-source-azure-6.4.0-150600.8.58.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-syms-azure-6.4.0-150600.8.58.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-syms-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:gfs2-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-devel-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-devel-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-extra-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-extra-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-optional-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-optional-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-vdso-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-azure-6.4.0-150600.8.58.1.noarch",
"openSUSE Leap 15.6:kernel-source-azure-6.4.0-150600.8.58.1.noarch",
"openSUSE Leap 15.6:kernel-syms-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kselftests-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-azure-6.4.0-150600.8.58.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-39980",
"url": "https://www.suse.com/security/cve/CVE-2025-39980"
},
{
"category": "external",
"summary": "SUSE Bug 1252063 for CVE-2025-39980",
"url": "https://bugzilla.suse.com/1252063"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-6.4.0-150600.8.58.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-6.4.0-150600.8.58.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-devel-6.4.0-150600.8.58.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-devel-6.4.0-150600.8.58.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-devel-azure-6.4.0-150600.8.58.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-source-azure-6.4.0-150600.8.58.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-syms-azure-6.4.0-150600.8.58.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-syms-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:gfs2-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-devel-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-devel-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-extra-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-extra-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-optional-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-optional-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-vdso-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-azure-6.4.0-150600.8.58.1.noarch",
"openSUSE Leap 15.6:kernel-source-azure-6.4.0-150600.8.58.1.noarch",
"openSUSE Leap 15.6:kernel-syms-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kselftests-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-azure-6.4.0-150600.8.58.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-6.4.0-150600.8.58.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-6.4.0-150600.8.58.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-devel-6.4.0-150600.8.58.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-devel-6.4.0-150600.8.58.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-devel-azure-6.4.0-150600.8.58.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-source-azure-6.4.0-150600.8.58.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-syms-azure-6.4.0-150600.8.58.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-syms-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:gfs2-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-devel-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-devel-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-extra-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-extra-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-optional-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-optional-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-vdso-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-azure-6.4.0-150600.8.58.1.noarch",
"openSUSE Leap 15.6:kernel-source-azure-6.4.0-150600.8.58.1.noarch",
"openSUSE Leap 15.6:kernel-syms-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kselftests-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-azure-6.4.0-150600.8.58.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-22T16:35:13Z",
"details": "moderate"
}
],
"title": "CVE-2025-39980"
},
{
"cve": "CVE-2025-40001",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40001"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nscsi: mvsas: Fix use-after-free bugs in mvs_work_queue\n\nDuring the detaching of Marvell\u0027s SAS/SATA controller, the original code\ncalls cancel_delayed_work() in mvs_free() to cancel the delayed work\nitem mwq-\u003ework_q. However, if mwq-\u003ework_q is already running, the\ncancel_delayed_work() may fail to cancel it. This can lead to\nuse-after-free scenarios where mvs_free() frees the mvs_info while\nmvs_work_queue() is still executing and attempts to access the\nalready-freed mvs_info.\n\nA typical race condition is illustrated below:\n\nCPU 0 (remove) | CPU 1 (delayed work callback)\nmvs_pci_remove() |\n mvs_free() | mvs_work_queue()\n cancel_delayed_work() |\n kfree(mvi) |\n | mvi-\u003e // UAF\n\nReplace cancel_delayed_work() with cancel_delayed_work_sync() to ensure\nthat the delayed work item is properly canceled and any executing\ndelayed work item completes before the mvs_info is deallocated.\n\nThis bug was found by static analysis.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-6.4.0-150600.8.58.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-6.4.0-150600.8.58.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-devel-6.4.0-150600.8.58.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-devel-6.4.0-150600.8.58.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-devel-azure-6.4.0-150600.8.58.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-source-azure-6.4.0-150600.8.58.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-syms-azure-6.4.0-150600.8.58.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-syms-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:gfs2-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-devel-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-devel-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-extra-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-extra-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-optional-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-optional-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-vdso-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-azure-6.4.0-150600.8.58.1.noarch",
"openSUSE Leap 15.6:kernel-source-azure-6.4.0-150600.8.58.1.noarch",
"openSUSE Leap 15.6:kernel-syms-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kselftests-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-azure-6.4.0-150600.8.58.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40001",
"url": "https://www.suse.com/security/cve/CVE-2025-40001"
},
{
"category": "external",
"summary": "SUSE Bug 1252303 for CVE-2025-40001",
"url": "https://bugzilla.suse.com/1252303"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-6.4.0-150600.8.58.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-6.4.0-150600.8.58.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-devel-6.4.0-150600.8.58.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-devel-6.4.0-150600.8.58.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-devel-azure-6.4.0-150600.8.58.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-source-azure-6.4.0-150600.8.58.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-syms-azure-6.4.0-150600.8.58.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-syms-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:gfs2-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-devel-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-devel-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-extra-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-extra-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-optional-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-optional-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-vdso-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-azure-6.4.0-150600.8.58.1.noarch",
"openSUSE Leap 15.6:kernel-source-azure-6.4.0-150600.8.58.1.noarch",
"openSUSE Leap 15.6:kernel-syms-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kselftests-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-azure-6.4.0-150600.8.58.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.8,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-6.4.0-150600.8.58.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-6.4.0-150600.8.58.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-devel-6.4.0-150600.8.58.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-devel-6.4.0-150600.8.58.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-devel-azure-6.4.0-150600.8.58.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-source-azure-6.4.0-150600.8.58.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-syms-azure-6.4.0-150600.8.58.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-syms-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:gfs2-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-devel-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-devel-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-extra-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-extra-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-optional-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-optional-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-vdso-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-azure-6.4.0-150600.8.58.1.noarch",
"openSUSE Leap 15.6:kernel-source-azure-6.4.0-150600.8.58.1.noarch",
"openSUSE Leap 15.6:kernel-syms-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kselftests-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-azure-6.4.0-150600.8.58.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-22T16:35:13Z",
"details": "moderate"
}
],
"title": "CVE-2025-40001"
},
{
"cve": "CVE-2025-40021",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40021"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\ntracing: dynevent: Add a missing lockdown check on dynevent\n\nSince dynamic_events interface on tracefs is compatible with\nkprobe_events and uprobe_events, it should also check the lockdown\nstatus and reject if it is set.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-6.4.0-150600.8.58.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-6.4.0-150600.8.58.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-devel-6.4.0-150600.8.58.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-devel-6.4.0-150600.8.58.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-devel-azure-6.4.0-150600.8.58.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-source-azure-6.4.0-150600.8.58.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-syms-azure-6.4.0-150600.8.58.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-syms-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:gfs2-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-devel-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-devel-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-extra-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-extra-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-optional-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-optional-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-vdso-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-azure-6.4.0-150600.8.58.1.noarch",
"openSUSE Leap 15.6:kernel-source-azure-6.4.0-150600.8.58.1.noarch",
"openSUSE Leap 15.6:kernel-syms-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kselftests-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-azure-6.4.0-150600.8.58.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40021",
"url": "https://www.suse.com/security/cve/CVE-2025-40021"
},
{
"category": "external",
"summary": "SUSE Bug 1252681 for CVE-2025-40021",
"url": "https://bugzilla.suse.com/1252681"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-6.4.0-150600.8.58.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-6.4.0-150600.8.58.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-devel-6.4.0-150600.8.58.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-devel-6.4.0-150600.8.58.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-devel-azure-6.4.0-150600.8.58.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-source-azure-6.4.0-150600.8.58.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-syms-azure-6.4.0-150600.8.58.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-syms-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:gfs2-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-devel-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-devel-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-extra-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-extra-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-optional-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-optional-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-vdso-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-azure-6.4.0-150600.8.58.1.noarch",
"openSUSE Leap 15.6:kernel-source-azure-6.4.0-150600.8.58.1.noarch",
"openSUSE Leap 15.6:kernel-syms-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kselftests-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-azure-6.4.0-150600.8.58.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-6.4.0-150600.8.58.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-6.4.0-150600.8.58.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-devel-6.4.0-150600.8.58.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-devel-6.4.0-150600.8.58.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-devel-azure-6.4.0-150600.8.58.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-source-azure-6.4.0-150600.8.58.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-syms-azure-6.4.0-150600.8.58.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-syms-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:gfs2-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-devel-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-devel-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-extra-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-extra-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-optional-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-optional-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-vdso-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-azure-6.4.0-150600.8.58.1.noarch",
"openSUSE Leap 15.6:kernel-source-azure-6.4.0-150600.8.58.1.noarch",
"openSUSE Leap 15.6:kernel-syms-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kselftests-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-azure-6.4.0-150600.8.58.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-22T16:35:13Z",
"details": "moderate"
}
],
"title": "CVE-2025-40021"
},
{
"cve": "CVE-2025-40027",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40027"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnet/9p: fix double req put in p9_fd_cancelled\n\nSyzkaller reports a KASAN issue as below:\n\ngeneral protection fault, probably for non-canonical address 0xfbd59c0000000021: 0000 [#1] PREEMPT SMP KASAN NOPTI\nKASAN: maybe wild-memory-access in range [0xdead000000000108-0xdead00000000010f]\nCPU: 0 PID: 5083 Comm: syz-executor.2 Not tainted 6.1.134-syzkaller-00037-g855bd1d7d838 #0\nHardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014\nRIP: 0010:__list_del include/linux/list.h:114 [inline]\nRIP: 0010:__list_del_entry include/linux/list.h:137 [inline]\nRIP: 0010:list_del include/linux/list.h:148 [inline]\nRIP: 0010:p9_fd_cancelled+0xe9/0x200 net/9p/trans_fd.c:734\n\nCall Trace:\n \u003cTASK\u003e\n p9_client_flush+0x351/0x440 net/9p/client.c:614\n p9_client_rpc+0xb6b/0xc70 net/9p/client.c:734\n p9_client_version net/9p/client.c:920 [inline]\n p9_client_create+0xb51/0x1240 net/9p/client.c:1027\n v9fs_session_init+0x1f0/0x18f0 fs/9p/v9fs.c:408\n v9fs_mount+0xba/0xcb0 fs/9p/vfs_super.c:126\n legacy_get_tree+0x108/0x220 fs/fs_context.c:632\n vfs_get_tree+0x8e/0x300 fs/super.c:1573\n do_new_mount fs/namespace.c:3056 [inline]\n path_mount+0x6a6/0x1e90 fs/namespace.c:3386\n do_mount fs/namespace.c:3399 [inline]\n __do_sys_mount fs/namespace.c:3607 [inline]\n __se_sys_mount fs/namespace.c:3584 [inline]\n __x64_sys_mount+0x283/0x300 fs/namespace.c:3584\n do_syscall_x64 arch/x86/entry/common.c:51 [inline]\n do_syscall_64+0x35/0x80 arch/x86/entry/common.c:81\n entry_SYSCALL_64_after_hwframe+0x6e/0xd8\n\nThis happens because of a race condition between:\n\n- The 9p client sending an invalid flush request and later cleaning it up;\n- The 9p client in p9_read_work() canceled all pending requests.\n\n Thread 1 Thread 2\n ...\n p9_client_create()\n ...\n p9_fd_create()\n ...\n p9_conn_create()\n ...\n // start Thread 2\n INIT_WORK(\u0026m-\u003erq, p9_read_work);\n p9_read_work()\n ...\n p9_client_rpc()\n ...\n ...\n p9_conn_cancel()\n ...\n spin_lock(\u0026m-\u003ereq_lock);\n ...\n p9_fd_cancelled()\n ...\n ...\n spin_unlock(\u0026m-\u003ereq_lock);\n // status rewrite\n p9_client_cb(m-\u003eclient, req, REQ_STATUS_ERROR)\n // first remove\n list_del(\u0026req-\u003ereq_list);\n ...\n\n spin_lock(\u0026m-\u003ereq_lock)\n ...\n // second remove\n list_del(\u0026req-\u003ereq_list);\n spin_unlock(\u0026m-\u003ereq_lock)\n ...\n\nCommit 74d6a5d56629 (\"9p/trans_fd: Fix concurrency del of req_list in\np9_fd_cancelled/p9_read_work\") fixes a concurrency issue in the 9p filesystem\nclient where the req_list could be deleted simultaneously by both\np9_read_work and p9_fd_cancelled functions, but for the case where req-\u003estatus\nequals REQ_STATUS_RCVD.\n\nUpdate the check for req-\u003estatus in p9_fd_cancelled to skip processing not\njust received requests, but anything that is not SENT, as whatever\nchanged the state from SENT also removed the request from its list.\n\nFound by Linux Verification Center (linuxtesting.org) with Syzkaller.\n\n[updated the check from status == RECV || status == ERROR to status != SENT]",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-6.4.0-150600.8.58.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-6.4.0-150600.8.58.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-devel-6.4.0-150600.8.58.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-devel-6.4.0-150600.8.58.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-devel-azure-6.4.0-150600.8.58.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-source-azure-6.4.0-150600.8.58.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-syms-azure-6.4.0-150600.8.58.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-syms-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:gfs2-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-devel-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-devel-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-extra-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-extra-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-optional-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-optional-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-vdso-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-azure-6.4.0-150600.8.58.1.noarch",
"openSUSE Leap 15.6:kernel-source-azure-6.4.0-150600.8.58.1.noarch",
"openSUSE Leap 15.6:kernel-syms-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kselftests-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-azure-6.4.0-150600.8.58.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40027",
"url": "https://www.suse.com/security/cve/CVE-2025-40027"
},
{
"category": "external",
"summary": "SUSE Bug 1252763 for CVE-2025-40027",
"url": "https://bugzilla.suse.com/1252763"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-6.4.0-150600.8.58.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-6.4.0-150600.8.58.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-devel-6.4.0-150600.8.58.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-devel-6.4.0-150600.8.58.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-devel-azure-6.4.0-150600.8.58.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-source-azure-6.4.0-150600.8.58.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-syms-azure-6.4.0-150600.8.58.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-syms-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:gfs2-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-devel-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-devel-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-extra-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-extra-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-optional-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-optional-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-vdso-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-azure-6.4.0-150600.8.58.1.noarch",
"openSUSE Leap 15.6:kernel-source-azure-6.4.0-150600.8.58.1.noarch",
"openSUSE Leap 15.6:kernel-syms-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kselftests-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-azure-6.4.0-150600.8.58.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-6.4.0-150600.8.58.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-6.4.0-150600.8.58.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-devel-6.4.0-150600.8.58.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-devel-6.4.0-150600.8.58.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-devel-azure-6.4.0-150600.8.58.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-source-azure-6.4.0-150600.8.58.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-syms-azure-6.4.0-150600.8.58.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-syms-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:gfs2-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-devel-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-devel-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-extra-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-extra-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-optional-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-optional-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-vdso-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-azure-6.4.0-150600.8.58.1.noarch",
"openSUSE Leap 15.6:kernel-source-azure-6.4.0-150600.8.58.1.noarch",
"openSUSE Leap 15.6:kernel-syms-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kselftests-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-azure-6.4.0-150600.8.58.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-22T16:35:13Z",
"details": "moderate"
}
],
"title": "CVE-2025-40027"
},
{
"cve": "CVE-2025-40030",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40030"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\npinctrl: check the return value of pinmux_ops::get_function_name()\n\nWhile the API contract in docs doesn\u0027t specify it explicitly, the\ngeneric implementation of the get_function_name() callback from struct\npinmux_ops - pinmux_generic_get_function_name() - can fail and return\nNULL. This is already checked in pinmux_check_ops() so add a similar\ncheck in pinmux_func_name_to_selector() instead of passing the returned\npointer right down to strcmp() where the NULL can get dereferenced. This\nis normal operation when adding new pinfunctions.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-6.4.0-150600.8.58.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-6.4.0-150600.8.58.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-devel-6.4.0-150600.8.58.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-devel-6.4.0-150600.8.58.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-devel-azure-6.4.0-150600.8.58.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-source-azure-6.4.0-150600.8.58.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-syms-azure-6.4.0-150600.8.58.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-syms-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:gfs2-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-devel-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-devel-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-extra-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-extra-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-optional-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-optional-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-vdso-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-azure-6.4.0-150600.8.58.1.noarch",
"openSUSE Leap 15.6:kernel-source-azure-6.4.0-150600.8.58.1.noarch",
"openSUSE Leap 15.6:kernel-syms-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kselftests-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-azure-6.4.0-150600.8.58.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40030",
"url": "https://www.suse.com/security/cve/CVE-2025-40030"
},
{
"category": "external",
"summary": "SUSE Bug 1252773 for CVE-2025-40030",
"url": "https://bugzilla.suse.com/1252773"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-6.4.0-150600.8.58.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-6.4.0-150600.8.58.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-devel-6.4.0-150600.8.58.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-devel-6.4.0-150600.8.58.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-devel-azure-6.4.0-150600.8.58.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-source-azure-6.4.0-150600.8.58.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-syms-azure-6.4.0-150600.8.58.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-syms-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:gfs2-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-devel-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-devel-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-extra-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-extra-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-optional-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-optional-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-vdso-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-azure-6.4.0-150600.8.58.1.noarch",
"openSUSE Leap 15.6:kernel-source-azure-6.4.0-150600.8.58.1.noarch",
"openSUSE Leap 15.6:kernel-syms-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kselftests-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-azure-6.4.0-150600.8.58.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-6.4.0-150600.8.58.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-6.4.0-150600.8.58.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-devel-6.4.0-150600.8.58.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-devel-6.4.0-150600.8.58.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-devel-azure-6.4.0-150600.8.58.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-source-azure-6.4.0-150600.8.58.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-syms-azure-6.4.0-150600.8.58.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-syms-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:gfs2-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-devel-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-devel-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-extra-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-extra-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-optional-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-optional-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-vdso-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-azure-6.4.0-150600.8.58.1.noarch",
"openSUSE Leap 15.6:kernel-source-azure-6.4.0-150600.8.58.1.noarch",
"openSUSE Leap 15.6:kernel-syms-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kselftests-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-azure-6.4.0-150600.8.58.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-22T16:35:13Z",
"details": "moderate"
}
],
"title": "CVE-2025-40030"
},
{
"cve": "CVE-2025-40038",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40038"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nKVM: SVM: Skip fastpath emulation on VM-Exit if next RIP isn\u0027t valid\n\nSkip the WRMSR and HLT fastpaths in SVM\u0027s VM-Exit handler if the next RIP\nisn\u0027t valid, e.g. because KVM is running with nrips=false. SVM must\ndecode and emulate to skip the instruction if the CPU doesn\u0027t provide the\nnext RIP, and getting the instruction bytes to decode requires reading\nguest memory. Reading guest memory through the emulator can fault, i.e.\ncan sleep, which is disallowed since the fastpath handlers run with IRQs\ndisabled.\n\n BUG: sleeping function called from invalid context at ./include/linux/uaccess.h:106\n in_atomic(): 1, irqs_disabled(): 1, non_block: 0, pid: 32611, name: qemu\n preempt_count: 1, expected: 0\n INFO: lockdep is turned off.\n irq event stamp: 30580\n hardirqs last enabled at (30579): [\u003cffffffffc08b2527\u003e] vcpu_run+0x1787/0x1db0 [kvm]\n hardirqs last disabled at (30580): [\u003cffffffffb4f62e32\u003e] __schedule+0x1e2/0xed0\n softirqs last enabled at (30570): [\u003cffffffffb4247a64\u003e] fpu_swap_kvm_fpstate+0x44/0x210\n softirqs last disabled at (30568): [\u003cffffffffb4247a64\u003e] fpu_swap_kvm_fpstate+0x44/0x210\n CPU: 298 UID: 0 PID: 32611 Comm: qemu Tainted: G U 6.16.0-smp--e6c618b51cfe-sleep #782 NONE\n Tainted: [U]=USER\n Hardware name: Google Astoria-Turin/astoria, BIOS 0.20241223.2-0 01/17/2025\n Call Trace:\n \u003cTASK\u003e\n dump_stack_lvl+0x7d/0xb0\n __might_resched+0x271/0x290\n __might_fault+0x28/0x80\n kvm_vcpu_read_guest_page+0x8d/0xc0 [kvm]\n kvm_fetch_guest_virt+0x92/0xc0 [kvm]\n __do_insn_fetch_bytes+0xf3/0x1e0 [kvm]\n x86_decode_insn+0xd1/0x1010 [kvm]\n x86_emulate_instruction+0x105/0x810 [kvm]\n __svm_skip_emulated_instruction+0xc4/0x140 [kvm_amd]\n handle_fastpath_invd+0xc4/0x1a0 [kvm]\n vcpu_run+0x11a1/0x1db0 [kvm]\n kvm_arch_vcpu_ioctl_run+0x5cc/0x730 [kvm]\n kvm_vcpu_ioctl+0x578/0x6a0 [kvm]\n __se_sys_ioctl+0x6d/0xb0\n do_syscall_64+0x8a/0x2c0\n entry_SYSCALL_64_after_hwframe+0x4b/0x53\n RIP: 0033:0x7f479d57a94b\n \u003c/TASK\u003e\n\nNote, this is essentially a reapply of commit 5c30e8101e8d (\"KVM: SVM:\nSkip WRMSR fastpath on VM-Exit if next RIP isn\u0027t valid\"), but with\ndifferent justification (KVM now grabs SRCU when skipping the instruction\nfor other reasons).",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-6.4.0-150600.8.58.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-6.4.0-150600.8.58.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-devel-6.4.0-150600.8.58.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-devel-6.4.0-150600.8.58.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-devel-azure-6.4.0-150600.8.58.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-source-azure-6.4.0-150600.8.58.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-syms-azure-6.4.0-150600.8.58.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-syms-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:gfs2-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-devel-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-devel-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-extra-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-extra-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-optional-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-optional-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-vdso-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-azure-6.4.0-150600.8.58.1.noarch",
"openSUSE Leap 15.6:kernel-source-azure-6.4.0-150600.8.58.1.noarch",
"openSUSE Leap 15.6:kernel-syms-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kselftests-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-azure-6.4.0-150600.8.58.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40038",
"url": "https://www.suse.com/security/cve/CVE-2025-40038"
},
{
"category": "external",
"summary": "SUSE Bug 1252817 for CVE-2025-40038",
"url": "https://bugzilla.suse.com/1252817"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-6.4.0-150600.8.58.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-6.4.0-150600.8.58.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-devel-6.4.0-150600.8.58.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-devel-6.4.0-150600.8.58.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-devel-azure-6.4.0-150600.8.58.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-source-azure-6.4.0-150600.8.58.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-syms-azure-6.4.0-150600.8.58.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-syms-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:gfs2-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-devel-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-devel-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-extra-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-extra-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-optional-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-optional-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-vdso-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-azure-6.4.0-150600.8.58.1.noarch",
"openSUSE Leap 15.6:kernel-source-azure-6.4.0-150600.8.58.1.noarch",
"openSUSE Leap 15.6:kernel-syms-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kselftests-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-azure-6.4.0-150600.8.58.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-6.4.0-150600.8.58.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-6.4.0-150600.8.58.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-devel-6.4.0-150600.8.58.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-devel-6.4.0-150600.8.58.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-devel-azure-6.4.0-150600.8.58.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-source-azure-6.4.0-150600.8.58.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-syms-azure-6.4.0-150600.8.58.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-syms-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:gfs2-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-devel-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-devel-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-extra-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-extra-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-optional-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-optional-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-vdso-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-azure-6.4.0-150600.8.58.1.noarch",
"openSUSE Leap 15.6:kernel-source-azure-6.4.0-150600.8.58.1.noarch",
"openSUSE Leap 15.6:kernel-syms-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kselftests-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-azure-6.4.0-150600.8.58.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-22T16:35:13Z",
"details": "moderate"
}
],
"title": "CVE-2025-40038"
},
{
"cve": "CVE-2025-40040",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40040"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nmm/ksm: fix flag-dropping behavior in ksm_madvise\n\nsyzkaller discovered the following crash: (kernel BUG)\n\n[ 44.607039] ------------[ cut here ]------------\n[ 44.607422] kernel BUG at mm/userfaultfd.c:2067!\n[ 44.608148] Oops: invalid opcode: 0000 [#1] SMP DEBUG_PAGEALLOC KASAN NOPTI\n[ 44.608814] CPU: 1 UID: 0 PID: 2475 Comm: reproducer Not tainted 6.16.0-rc6 #1 PREEMPT(none)\n[ 44.609635] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.16.3-0-ga6ed6b701f0a-prebuilt.qemu.org 04/01/2014\n[ 44.610695] RIP: 0010:userfaultfd_release_all+0x3a8/0x460\n\n\u003csnip other registers, drop unreliable trace\u003e\n\n[ 44.617726] Call Trace:\n[ 44.617926] \u003cTASK\u003e\n[ 44.619284] userfaultfd_release+0xef/0x1b0\n[ 44.620976] __fput+0x3f9/0xb60\n[ 44.621240] fput_close_sync+0x110/0x210\n[ 44.622222] __x64_sys_close+0x8f/0x120\n[ 44.622530] do_syscall_64+0x5b/0x2f0\n[ 44.622840] entry_SYSCALL_64_after_hwframe+0x76/0x7e\n[ 44.623244] RIP: 0033:0x7f365bb3f227\n\nKernel panics because it detects UFFD inconsistency during\nuserfaultfd_release_all(). Specifically, a VMA which has a valid pointer\nto vma-\u003evm_userfaultfd_ctx, but no UFFD flags in vma-\u003evm_flags.\n\nThe inconsistency is caused in ksm_madvise(): when user calls madvise()\nwith MADV_UNMEARGEABLE on a VMA that is registered for UFFD in MINOR mode,\nit accidentally clears all flags stored in the upper 32 bits of\nvma-\u003evm_flags.\n\nAssuming x86_64 kernel build, unsigned long is 64-bit and unsigned int and\nint are 32-bit wide. This setup causes the following mishap during the \u0026=\n~VM_MERGEABLE assignment.\n\nVM_MERGEABLE is a 32-bit constant of type unsigned int, 0x8000\u00270000. \nAfter ~ is applied, it becomes 0x7fff\u0027ffff unsigned int, which is then\npromoted to unsigned long before the \u0026 operation. This promotion fills\nupper 32 bits with leading 0s, as we\u0027re doing unsigned conversion (and\neven for a signed conversion, this wouldn\u0027t help as the leading bit is 0).\n\u0026 operation thus ends up AND-ing vm_flags with 0x0000\u00270000\u00277fff\u0027ffff\ninstead of intended 0xffff\u0027ffff\u00277fff\u0027ffff and hence accidentally clears\nthe upper 32-bits of its value.\n\nFix it by changing `VM_MERGEABLE` constant to unsigned long, using the\nBIT() macro.\n\nNote: other VM_* flags are not affected: This only happens to the\nVM_MERGEABLE flag, as the other VM_* flags are all constants of type int\nand after ~ operation, they end up with leading 1 and are thus converted\nto unsigned long with leading 1s.\n\nNote 2:\nAfter commit 31defc3b01d9 (\"userfaultfd: remove (VM_)BUG_ON()s\"), this is\nno longer a kernel BUG, but a WARNING at the same place:\n\n[ 45.595973] WARNING: CPU: 1 PID: 2474 at mm/userfaultfd.c:2067\n\nbut the root-cause (flag-drop) remains the same.\n\n[akpm@linux-foundation.org: rust bindgen wasn\u0027t able to handle BIT(), from Miguel]",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-6.4.0-150600.8.58.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-6.4.0-150600.8.58.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-devel-6.4.0-150600.8.58.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-devel-6.4.0-150600.8.58.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-devel-azure-6.4.0-150600.8.58.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-source-azure-6.4.0-150600.8.58.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-syms-azure-6.4.0-150600.8.58.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-syms-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:gfs2-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-devel-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-devel-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-extra-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-extra-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-optional-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-optional-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-vdso-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-azure-6.4.0-150600.8.58.1.noarch",
"openSUSE Leap 15.6:kernel-source-azure-6.4.0-150600.8.58.1.noarch",
"openSUSE Leap 15.6:kernel-syms-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kselftests-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-azure-6.4.0-150600.8.58.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40040",
"url": "https://www.suse.com/security/cve/CVE-2025-40040"
},
{
"category": "external",
"summary": "SUSE Bug 1252780 for CVE-2025-40040",
"url": "https://bugzilla.suse.com/1252780"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-6.4.0-150600.8.58.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-6.4.0-150600.8.58.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-devel-6.4.0-150600.8.58.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-devel-6.4.0-150600.8.58.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-devel-azure-6.4.0-150600.8.58.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-source-azure-6.4.0-150600.8.58.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-syms-azure-6.4.0-150600.8.58.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-syms-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:gfs2-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-devel-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-devel-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-extra-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-extra-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-optional-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-optional-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-vdso-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-azure-6.4.0-150600.8.58.1.noarch",
"openSUSE Leap 15.6:kernel-source-azure-6.4.0-150600.8.58.1.noarch",
"openSUSE Leap 15.6:kernel-syms-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kselftests-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-azure-6.4.0-150600.8.58.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-6.4.0-150600.8.58.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-6.4.0-150600.8.58.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-devel-6.4.0-150600.8.58.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-devel-6.4.0-150600.8.58.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-devel-azure-6.4.0-150600.8.58.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-source-azure-6.4.0-150600.8.58.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-syms-azure-6.4.0-150600.8.58.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-syms-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:gfs2-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-devel-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-devel-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-extra-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-extra-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-optional-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-optional-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-vdso-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-azure-6.4.0-150600.8.58.1.noarch",
"openSUSE Leap 15.6:kernel-source-azure-6.4.0-150600.8.58.1.noarch",
"openSUSE Leap 15.6:kernel-syms-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kselftests-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-azure-6.4.0-150600.8.58.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-22T16:35:13Z",
"details": "moderate"
}
],
"title": "CVE-2025-40040"
},
{
"cve": "CVE-2025-40048",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40048"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nuio_hv_generic: Let userspace take care of interrupt mask\n\nRemove the logic to set interrupt mask by default in uio_hv_generic\ndriver as the interrupt mask value is supposed to be controlled\ncompletely by the user space. If the mask bit gets changed\nby the driver, concurrently with user mode operating on the ring,\nthe mask bit may be set when it is supposed to be clear, and the\nuser-mode driver will miss an interrupt which will cause a hang.\n\nFor eg- when the driver sets inbound ring buffer interrupt mask to 1,\nthe host does not interrupt the guest on the UIO VMBus channel.\nHowever, setting the mask does not prevent the host from putting a\nmessage in the inbound ring buffer. So let\u0027s assume that happens,\nthe host puts a message into the ring buffer but does not interrupt.\n\nSubsequently, the user space code in the guest sets the inbound ring\nbuffer interrupt mask to 0, saying \"Hey, I\u0027m ready for interrupts\".\nUser space code then calls pread() to wait for an interrupt.\nThen one of two things happens:\n\n* The host never sends another message. So the pread() waits forever.\n* The host does send another message. But because there\u0027s already a\n message in the ring buffer, it doesn\u0027t generate an interrupt.\n This is the correct behavior, because the host should only send an\n interrupt when the inbound ring buffer transitions from empty to\n not-empty. Adding an additional message to a ring buffer that is not\n empty is not supposed to generate an interrupt on the guest.\n Since the guest is waiting in pread() and not removing messages from\n the ring buffer, the pread() waits forever.\n\nThis could be easily reproduced in hv_fcopy_uio_daemon if we delay\nsetting interrupt mask to 0.\n\nSimilarly if hv_uio_channel_cb() sets the interrupt_mask to 1,\nthere\u0027s a race condition. Once user space empties the inbound ring\nbuffer, but before user space sets interrupt_mask to 0, the host could\nput another message in the ring buffer but it wouldn\u0027t interrupt.\nThen the next pread() would hang.\n\nFix these by removing all instances where interrupt_mask is changed,\nwhile keeping the one in set_event() unchanged to enable userspace\ncontrol the interrupt mask by writing 0/1 to /dev/uioX.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-6.4.0-150600.8.58.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-6.4.0-150600.8.58.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-devel-6.4.0-150600.8.58.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-devel-6.4.0-150600.8.58.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-devel-azure-6.4.0-150600.8.58.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-source-azure-6.4.0-150600.8.58.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-syms-azure-6.4.0-150600.8.58.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-syms-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:gfs2-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-devel-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-devel-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-extra-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-extra-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-optional-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-optional-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-vdso-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-azure-6.4.0-150600.8.58.1.noarch",
"openSUSE Leap 15.6:kernel-source-azure-6.4.0-150600.8.58.1.noarch",
"openSUSE Leap 15.6:kernel-syms-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kselftests-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-azure-6.4.0-150600.8.58.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40048",
"url": "https://www.suse.com/security/cve/CVE-2025-40048"
},
{
"category": "external",
"summary": "SUSE Bug 1252862 for CVE-2025-40048",
"url": "https://bugzilla.suse.com/1252862"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-6.4.0-150600.8.58.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-6.4.0-150600.8.58.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-devel-6.4.0-150600.8.58.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-devel-6.4.0-150600.8.58.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-devel-azure-6.4.0-150600.8.58.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-source-azure-6.4.0-150600.8.58.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-syms-azure-6.4.0-150600.8.58.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-syms-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:gfs2-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-devel-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-devel-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-extra-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-extra-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-optional-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-optional-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-vdso-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-azure-6.4.0-150600.8.58.1.noarch",
"openSUSE Leap 15.6:kernel-source-azure-6.4.0-150600.8.58.1.noarch",
"openSUSE Leap 15.6:kernel-syms-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kselftests-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-azure-6.4.0-150600.8.58.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-6.4.0-150600.8.58.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-6.4.0-150600.8.58.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-devel-6.4.0-150600.8.58.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-devel-6.4.0-150600.8.58.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-devel-azure-6.4.0-150600.8.58.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-source-azure-6.4.0-150600.8.58.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-syms-azure-6.4.0-150600.8.58.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-syms-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:gfs2-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-devel-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-devel-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-extra-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-extra-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-optional-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-optional-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-vdso-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-azure-6.4.0-150600.8.58.1.noarch",
"openSUSE Leap 15.6:kernel-source-azure-6.4.0-150600.8.58.1.noarch",
"openSUSE Leap 15.6:kernel-syms-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kselftests-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-azure-6.4.0-150600.8.58.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-22T16:35:13Z",
"details": "moderate"
}
],
"title": "CVE-2025-40048"
},
{
"cve": "CVE-2025-40055",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40055"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nocfs2: fix double free in user_cluster_connect()\n\nuser_cluster_disconnect() frees \"conn-\u003ecc_private\" which is \"lc\" but then\nthe error handling frees \"lc\" a second time. Set \"lc\" to NULL on this\npath to avoid a double free.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-6.4.0-150600.8.58.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-6.4.0-150600.8.58.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-devel-6.4.0-150600.8.58.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-devel-6.4.0-150600.8.58.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-devel-azure-6.4.0-150600.8.58.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-source-azure-6.4.0-150600.8.58.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-syms-azure-6.4.0-150600.8.58.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-syms-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:gfs2-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-devel-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-devel-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-extra-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-extra-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-optional-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-optional-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-vdso-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-azure-6.4.0-150600.8.58.1.noarch",
"openSUSE Leap 15.6:kernel-source-azure-6.4.0-150600.8.58.1.noarch",
"openSUSE Leap 15.6:kernel-syms-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kselftests-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-azure-6.4.0-150600.8.58.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40055",
"url": "https://www.suse.com/security/cve/CVE-2025-40055"
},
{
"category": "external",
"summary": "SUSE Bug 1252821 for CVE-2025-40055",
"url": "https://bugzilla.suse.com/1252821"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-6.4.0-150600.8.58.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-6.4.0-150600.8.58.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-devel-6.4.0-150600.8.58.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-devel-6.4.0-150600.8.58.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-devel-azure-6.4.0-150600.8.58.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-source-azure-6.4.0-150600.8.58.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-syms-azure-6.4.0-150600.8.58.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-syms-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:gfs2-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-devel-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-devel-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-extra-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-extra-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-optional-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-optional-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-vdso-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-azure-6.4.0-150600.8.58.1.noarch",
"openSUSE Leap 15.6:kernel-source-azure-6.4.0-150600.8.58.1.noarch",
"openSUSE Leap 15.6:kernel-syms-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kselftests-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-azure-6.4.0-150600.8.58.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-6.4.0-150600.8.58.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-6.4.0-150600.8.58.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-devel-6.4.0-150600.8.58.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-devel-6.4.0-150600.8.58.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-devel-azure-6.4.0-150600.8.58.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-source-azure-6.4.0-150600.8.58.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-syms-azure-6.4.0-150600.8.58.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-syms-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:gfs2-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-devel-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-devel-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-extra-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-extra-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-optional-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-optional-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-vdso-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-azure-6.4.0-150600.8.58.1.noarch",
"openSUSE Leap 15.6:kernel-source-azure-6.4.0-150600.8.58.1.noarch",
"openSUSE Leap 15.6:kernel-syms-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kselftests-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-azure-6.4.0-150600.8.58.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-22T16:35:13Z",
"details": "moderate"
}
],
"title": "CVE-2025-40055"
},
{
"cve": "CVE-2025-40059",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40059"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\ncoresight: Fix incorrect handling for return value of devm_kzalloc\n\nThe return value of devm_kzalloc could be an null pointer,\nuse \"!desc.pdata\" to fix incorrect handling return value\nof devm_kzalloc.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-6.4.0-150600.8.58.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-6.4.0-150600.8.58.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-devel-6.4.0-150600.8.58.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-devel-6.4.0-150600.8.58.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-devel-azure-6.4.0-150600.8.58.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-source-azure-6.4.0-150600.8.58.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-syms-azure-6.4.0-150600.8.58.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-syms-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:gfs2-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-devel-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-devel-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-extra-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-extra-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-optional-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-optional-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-vdso-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-azure-6.4.0-150600.8.58.1.noarch",
"openSUSE Leap 15.6:kernel-source-azure-6.4.0-150600.8.58.1.noarch",
"openSUSE Leap 15.6:kernel-syms-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kselftests-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-azure-6.4.0-150600.8.58.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40059",
"url": "https://www.suse.com/security/cve/CVE-2025-40059"
},
{
"category": "external",
"summary": "SUSE Bug 1252809 for CVE-2025-40059",
"url": "https://bugzilla.suse.com/1252809"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-6.4.0-150600.8.58.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-6.4.0-150600.8.58.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-devel-6.4.0-150600.8.58.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-devel-6.4.0-150600.8.58.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-devel-azure-6.4.0-150600.8.58.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-source-azure-6.4.0-150600.8.58.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-syms-azure-6.4.0-150600.8.58.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-syms-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:gfs2-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-devel-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-devel-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-extra-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-extra-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-optional-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-optional-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-vdso-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-azure-6.4.0-150600.8.58.1.noarch",
"openSUSE Leap 15.6:kernel-source-azure-6.4.0-150600.8.58.1.noarch",
"openSUSE Leap 15.6:kernel-syms-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kselftests-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-azure-6.4.0-150600.8.58.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-6.4.0-150600.8.58.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-6.4.0-150600.8.58.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-devel-6.4.0-150600.8.58.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-devel-6.4.0-150600.8.58.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-devel-azure-6.4.0-150600.8.58.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-source-azure-6.4.0-150600.8.58.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-syms-azure-6.4.0-150600.8.58.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-syms-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:gfs2-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-devel-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-devel-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-extra-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-extra-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-optional-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-optional-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-vdso-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-azure-6.4.0-150600.8.58.1.noarch",
"openSUSE Leap 15.6:kernel-source-azure-6.4.0-150600.8.58.1.noarch",
"openSUSE Leap 15.6:kernel-syms-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kselftests-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-azure-6.4.0-150600.8.58.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-22T16:35:13Z",
"details": "moderate"
}
],
"title": "CVE-2025-40059"
},
{
"cve": "CVE-2025-40064",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40064"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nsmc: Fix use-after-free in __pnet_find_base_ndev().\n\nsyzbot reported use-after-free of net_device in __pnet_find_base_ndev(),\nwhich was called during connect(). [0]\n\nsmc_pnet_find_ism_resource() fetches sk_dst_get(sk)-\u003edev and passes\ndown to pnet_find_base_ndev(), where RTNL is held. Then, UAF happened\nat __pnet_find_base_ndev() when the dev is first used.\n\nThis means dev had already been freed before acquiring RTNL in\npnet_find_base_ndev().\n\nWhile dev is going away, dst-\u003edev could be swapped with blackhole_netdev,\nand the dev\u0027s refcnt by dst will be released.\n\nWe must hold dev\u0027s refcnt before calling smc_pnet_find_ism_resource().\n\nAlso, smc_pnet_find_roce_resource() has the same problem.\n\nLet\u0027s use __sk_dst_get() and dst_dev_rcu() in the two functions.\n\n[0]:\nBUG: KASAN: use-after-free in __pnet_find_base_ndev+0x1b1/0x1c0 net/smc/smc_pnet.c:926\nRead of size 1 at addr ffff888036bac33a by task syz.0.3632/18609\n\nCPU: 1 UID: 0 PID: 18609 Comm: syz.0.3632 Not tainted syzkaller #0 PREEMPT(full)\nHardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/18/2025\nCall Trace:\n \u003cTASK\u003e\n dump_stack_lvl+0x189/0x250 lib/dump_stack.c:120\n print_address_description mm/kasan/report.c:378 [inline]\n print_report+0xca/0x240 mm/kasan/report.c:482\n kasan_report+0x118/0x150 mm/kasan/report.c:595\n __pnet_find_base_ndev+0x1b1/0x1c0 net/smc/smc_pnet.c:926\n pnet_find_base_ndev net/smc/smc_pnet.c:946 [inline]\n smc_pnet_find_ism_by_pnetid net/smc/smc_pnet.c:1103 [inline]\n smc_pnet_find_ism_resource+0xef/0x390 net/smc/smc_pnet.c:1154\n smc_find_ism_device net/smc/af_smc.c:1030 [inline]\n smc_find_proposal_devices net/smc/af_smc.c:1115 [inline]\n __smc_connect+0x372/0x1890 net/smc/af_smc.c:1545\n smc_connect+0x877/0xd90 net/smc/af_smc.c:1715\n __sys_connect_file net/socket.c:2086 [inline]\n __sys_connect+0x313/0x440 net/socket.c:2105\n __do_sys_connect net/socket.c:2111 [inline]\n __se_sys_connect net/socket.c:2108 [inline]\n __x64_sys_connect+0x7a/0x90 net/socket.c:2108\n do_syscall_x64 arch/x86/entry/syscall_64.c:63 [inline]\n do_syscall_64+0xfa/0x3b0 arch/x86/entry/syscall_64.c:94\n entry_SYSCALL_64_after_hwframe+0x77/0x7f\nRIP: 0033:0x7f47cbf8eba9\nCode: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 \u003c48\u003e 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48\nRSP: 002b:00007f47ccdb1038 EFLAGS: 00000246 ORIG_RAX: 000000000000002a\nRAX: ffffffffffffffda RBX: 00007f47cc1d5fa0 RCX: 00007f47cbf8eba9\nRDX: 0000000000000010 RSI: 0000200000000280 RDI: 000000000000000b\nRBP: 00007f47cc011e19 R08: 0000000000000000 R09: 0000000000000000\nR10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000\nR13: 00007f47cc1d6038 R14: 00007f47cc1d5fa0 R15: 00007ffc512f8aa8\n \u003c/TASK\u003e\n\nThe buggy address belongs to the physical page:\npage: refcount:0 mapcount:0 mapping:0000000000000000 index:0xffff888036bacd00 pfn:0x36bac\nflags: 0xfff00000000000(node=0|zone=1|lastcpupid=0x7ff)\nraw: 00fff00000000000 ffffea0001243d08 ffff8880b863fdc0 0000000000000000\nraw: ffff888036bacd00 0000000000000000 00000000ffffffff 0000000000000000\npage dumped because: kasan: bad access detected\npage_owner tracks the page as freed\npage last allocated via order 2, migratetype Unmovable, gfp_mask 0x446dc0(GFP_KERNEL_ACCOUNT|__GFP_ZERO|__GFP_NOWARN|__GFP_RETRY_MAYFAIL|__GFP_COMP), pid 16741, tgid 16741 (syz-executor), ts 343313197788, free_ts 380670750466\n set_page_owner include/linux/page_owner.h:32 [inline]\n post_alloc_hook+0x240/0x2a0 mm/page_alloc.c:1851\n prep_new_page mm/page_alloc.c:1859 [inline]\n get_page_from_freelist+0x21e4/0x22c0 mm/page_alloc.c:3858\n __alloc_frozen_pages_noprof+0x181/0x370 mm/page_alloc.c:5148\n alloc_pages_mpol+0x232/0x4a0 mm/mempolicy.c:2416\n ___kmalloc_large_node+0x5f/0x1b0 mm/slub.c:4317\n __kmalloc_large_node_noprof+0x18/0x90 mm/slub.c:4348\n __do_kmalloc_node mm/slub.c:4364 [inline]\n __kvmalloc_node\n---truncated---",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-6.4.0-150600.8.58.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-6.4.0-150600.8.58.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-devel-6.4.0-150600.8.58.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-devel-6.4.0-150600.8.58.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-devel-azure-6.4.0-150600.8.58.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-source-azure-6.4.0-150600.8.58.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-syms-azure-6.4.0-150600.8.58.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-syms-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:gfs2-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-devel-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-devel-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-extra-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-extra-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-optional-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-optional-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-vdso-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-azure-6.4.0-150600.8.58.1.noarch",
"openSUSE Leap 15.6:kernel-source-azure-6.4.0-150600.8.58.1.noarch",
"openSUSE Leap 15.6:kernel-syms-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kselftests-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-azure-6.4.0-150600.8.58.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40064",
"url": "https://www.suse.com/security/cve/CVE-2025-40064"
},
{
"category": "external",
"summary": "SUSE Bug 1252845 for CVE-2025-40064",
"url": "https://bugzilla.suse.com/1252845"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-6.4.0-150600.8.58.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-6.4.0-150600.8.58.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-devel-6.4.0-150600.8.58.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-devel-6.4.0-150600.8.58.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-devel-azure-6.4.0-150600.8.58.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-source-azure-6.4.0-150600.8.58.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-syms-azure-6.4.0-150600.8.58.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-syms-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:gfs2-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-devel-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-devel-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-extra-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-extra-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-optional-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-optional-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-vdso-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-azure-6.4.0-150600.8.58.1.noarch",
"openSUSE Leap 15.6:kernel-source-azure-6.4.0-150600.8.58.1.noarch",
"openSUSE Leap 15.6:kernel-syms-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kselftests-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-azure-6.4.0-150600.8.58.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-6.4.0-150600.8.58.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-6.4.0-150600.8.58.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-devel-6.4.0-150600.8.58.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-devel-6.4.0-150600.8.58.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-devel-azure-6.4.0-150600.8.58.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-source-azure-6.4.0-150600.8.58.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-syms-azure-6.4.0-150600.8.58.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-syms-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:gfs2-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-devel-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-devel-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-extra-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-extra-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-optional-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-optional-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-vdso-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-azure-6.4.0-150600.8.58.1.noarch",
"openSUSE Leap 15.6:kernel-source-azure-6.4.0-150600.8.58.1.noarch",
"openSUSE Leap 15.6:kernel-syms-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kselftests-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-azure-6.4.0-150600.8.58.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-22T16:35:13Z",
"details": "moderate"
}
],
"title": "CVE-2025-40064"
},
{
"cve": "CVE-2025-40070",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40070"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\npps: fix warning in pps_register_cdev when register device fail\n\nSimilar to previous commit 2a934fdb01db (\"media: v4l2-dev: fix error\nhandling in __video_register_device()\"), the release hook should be set\nbefore device_register(). Otherwise, when device_register() return error\nand put_device() try to callback the release function, the below warning\nmay happen.\n\n ------------[ cut here ]------------\n WARNING: CPU: 1 PID: 4760 at drivers/base/core.c:2567 device_release+0x1bd/0x240 drivers/base/core.c:2567\n Modules linked in:\n CPU: 1 UID: 0 PID: 4760 Comm: syz.4.914 Not tainted 6.17.0-rc3+ #1 NONE\n RIP: 0010:device_release+0x1bd/0x240 drivers/base/core.c:2567\n Call Trace:\n \u003cTASK\u003e\n kobject_cleanup+0x136/0x410 lib/kobject.c:689\n kobject_release lib/kobject.c:720 [inline]\n kref_put include/linux/kref.h:65 [inline]\n kobject_put+0xe9/0x130 lib/kobject.c:737\n put_device+0x24/0x30 drivers/base/core.c:3797\n pps_register_cdev+0x2da/0x370 drivers/pps/pps.c:402\n pps_register_source+0x2f6/0x480 drivers/pps/kapi.c:108\n pps_tty_open+0x190/0x310 drivers/pps/clients/pps-ldisc.c:57\n tty_ldisc_open+0xa7/0x120 drivers/tty/tty_ldisc.c:432\n tty_set_ldisc+0x333/0x780 drivers/tty/tty_ldisc.c:563\n tiocsetd drivers/tty/tty_io.c:2429 [inline]\n tty_ioctl+0x5d1/0x1700 drivers/tty/tty_io.c:2728\n vfs_ioctl fs/ioctl.c:51 [inline]\n __do_sys_ioctl fs/ioctl.c:598 [inline]\n __se_sys_ioctl fs/ioctl.c:584 [inline]\n __x64_sys_ioctl+0x194/0x210 fs/ioctl.c:584\n do_syscall_x64 arch/x86/entry/syscall_64.c:63 [inline]\n do_syscall_64+0x5f/0x2a0 arch/x86/entry/syscall_64.c:94\n entry_SYSCALL_64_after_hwframe+0x76/0x7e\n \u003c/TASK\u003e\n\nBefore commit c79a39dc8d06 (\"pps: Fix a use-after-free\"),\npps_register_cdev() call device_create() to create pps-\u003edev, which will\ninit dev-\u003erelease to device_create_release(). Now the comment is outdated,\njust remove it.\n\nThanks for the reminder from Calvin Owens, \u0027kfree_pps\u0027 should be removed\nin pps_register_source() to avoid a double free in the failure case.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-6.4.0-150600.8.58.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-6.4.0-150600.8.58.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-devel-6.4.0-150600.8.58.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-devel-6.4.0-150600.8.58.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-devel-azure-6.4.0-150600.8.58.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-source-azure-6.4.0-150600.8.58.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-syms-azure-6.4.0-150600.8.58.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-syms-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:gfs2-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-devel-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-devel-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-extra-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-extra-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-optional-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-optional-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-vdso-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-azure-6.4.0-150600.8.58.1.noarch",
"openSUSE Leap 15.6:kernel-source-azure-6.4.0-150600.8.58.1.noarch",
"openSUSE Leap 15.6:kernel-syms-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kselftests-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-azure-6.4.0-150600.8.58.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40070",
"url": "https://www.suse.com/security/cve/CVE-2025-40070"
},
{
"category": "external",
"summary": "SUSE Bug 1252836 for CVE-2025-40070",
"url": "https://bugzilla.suse.com/1252836"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-6.4.0-150600.8.58.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-6.4.0-150600.8.58.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-devel-6.4.0-150600.8.58.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-devel-6.4.0-150600.8.58.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-devel-azure-6.4.0-150600.8.58.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-source-azure-6.4.0-150600.8.58.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-syms-azure-6.4.0-150600.8.58.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-syms-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:gfs2-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-devel-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-devel-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-extra-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-extra-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-optional-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-optional-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-vdso-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-azure-6.4.0-150600.8.58.1.noarch",
"openSUSE Leap 15.6:kernel-source-azure-6.4.0-150600.8.58.1.noarch",
"openSUSE Leap 15.6:kernel-syms-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kselftests-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-azure-6.4.0-150600.8.58.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-6.4.0-150600.8.58.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-6.4.0-150600.8.58.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-devel-6.4.0-150600.8.58.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-devel-6.4.0-150600.8.58.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-devel-azure-6.4.0-150600.8.58.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-source-azure-6.4.0-150600.8.58.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-syms-azure-6.4.0-150600.8.58.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-syms-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:gfs2-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-devel-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-devel-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-extra-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-extra-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-optional-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-optional-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-vdso-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-azure-6.4.0-150600.8.58.1.noarch",
"openSUSE Leap 15.6:kernel-source-azure-6.4.0-150600.8.58.1.noarch",
"openSUSE Leap 15.6:kernel-syms-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kselftests-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-azure-6.4.0-150600.8.58.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-22T16:35:13Z",
"details": "moderate"
}
],
"title": "CVE-2025-40070"
},
{
"cve": "CVE-2025-40074",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40074"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nipv4: start using dst_dev_rcu()\n\nChange icmpv4_xrlim_allow(), ip_defrag() to prevent possible UAF.\n\nChange ipmr_prepare_xmit(), ipmr_queue_fwd_xmit(), ip_mr_output(),\nipv4_neigh_lookup() to use lockdep enabled dst_dev_rcu().",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-6.4.0-150600.8.58.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-6.4.0-150600.8.58.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-devel-6.4.0-150600.8.58.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-devel-6.4.0-150600.8.58.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-devel-azure-6.4.0-150600.8.58.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-source-azure-6.4.0-150600.8.58.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-syms-azure-6.4.0-150600.8.58.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-syms-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:gfs2-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-devel-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-devel-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-extra-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-extra-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-optional-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-optional-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-vdso-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-azure-6.4.0-150600.8.58.1.noarch",
"openSUSE Leap 15.6:kernel-source-azure-6.4.0-150600.8.58.1.noarch",
"openSUSE Leap 15.6:kernel-syms-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kselftests-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-azure-6.4.0-150600.8.58.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40074",
"url": "https://www.suse.com/security/cve/CVE-2025-40074"
},
{
"category": "external",
"summary": "SUSE Bug 1252794 for CVE-2025-40074",
"url": "https://bugzilla.suse.com/1252794"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-6.4.0-150600.8.58.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-6.4.0-150600.8.58.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-devel-6.4.0-150600.8.58.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-devel-6.4.0-150600.8.58.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-devel-azure-6.4.0-150600.8.58.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-source-azure-6.4.0-150600.8.58.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-syms-azure-6.4.0-150600.8.58.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-syms-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:gfs2-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-devel-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-devel-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-extra-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-extra-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-optional-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-optional-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-vdso-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-azure-6.4.0-150600.8.58.1.noarch",
"openSUSE Leap 15.6:kernel-source-azure-6.4.0-150600.8.58.1.noarch",
"openSUSE Leap 15.6:kernel-syms-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kselftests-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-azure-6.4.0-150600.8.58.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-6.4.0-150600.8.58.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-6.4.0-150600.8.58.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-devel-6.4.0-150600.8.58.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-devel-6.4.0-150600.8.58.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-devel-azure-6.4.0-150600.8.58.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-source-azure-6.4.0-150600.8.58.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-syms-azure-6.4.0-150600.8.58.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-syms-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:gfs2-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-devel-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-devel-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-extra-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-extra-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-optional-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-optional-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-vdso-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-azure-6.4.0-150600.8.58.1.noarch",
"openSUSE Leap 15.6:kernel-source-azure-6.4.0-150600.8.58.1.noarch",
"openSUSE Leap 15.6:kernel-syms-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kselftests-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-azure-6.4.0-150600.8.58.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-22T16:35:13Z",
"details": "moderate"
}
],
"title": "CVE-2025-40074"
},
{
"cve": "CVE-2025-40075",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40075"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\ntcp_metrics: use dst_dev_net_rcu()\n\nReplace three dst_dev() with a lockdep enabled helper.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-6.4.0-150600.8.58.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-6.4.0-150600.8.58.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-devel-6.4.0-150600.8.58.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-devel-6.4.0-150600.8.58.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-devel-azure-6.4.0-150600.8.58.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-source-azure-6.4.0-150600.8.58.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-syms-azure-6.4.0-150600.8.58.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-syms-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:gfs2-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-devel-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-devel-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-extra-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-extra-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-optional-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-optional-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-vdso-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-azure-6.4.0-150600.8.58.1.noarch",
"openSUSE Leap 15.6:kernel-source-azure-6.4.0-150600.8.58.1.noarch",
"openSUSE Leap 15.6:kernel-syms-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kselftests-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-azure-6.4.0-150600.8.58.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40075",
"url": "https://www.suse.com/security/cve/CVE-2025-40075"
},
{
"category": "external",
"summary": "SUSE Bug 1252795 for CVE-2025-40075",
"url": "https://bugzilla.suse.com/1252795"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-6.4.0-150600.8.58.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-6.4.0-150600.8.58.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-devel-6.4.0-150600.8.58.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-devel-6.4.0-150600.8.58.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-devel-azure-6.4.0-150600.8.58.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-source-azure-6.4.0-150600.8.58.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-syms-azure-6.4.0-150600.8.58.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-syms-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:gfs2-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-devel-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-devel-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-extra-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-extra-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-optional-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-optional-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-vdso-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-azure-6.4.0-150600.8.58.1.noarch",
"openSUSE Leap 15.6:kernel-source-azure-6.4.0-150600.8.58.1.noarch",
"openSUSE Leap 15.6:kernel-syms-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kselftests-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-azure-6.4.0-150600.8.58.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-6.4.0-150600.8.58.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-6.4.0-150600.8.58.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-devel-6.4.0-150600.8.58.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-devel-6.4.0-150600.8.58.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-devel-azure-6.4.0-150600.8.58.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-source-azure-6.4.0-150600.8.58.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-syms-azure-6.4.0-150600.8.58.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-syms-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:gfs2-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-devel-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-devel-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-extra-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-extra-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-optional-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-optional-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-vdso-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-azure-6.4.0-150600.8.58.1.noarch",
"openSUSE Leap 15.6:kernel-source-azure-6.4.0-150600.8.58.1.noarch",
"openSUSE Leap 15.6:kernel-syms-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kselftests-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-azure-6.4.0-150600.8.58.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-22T16:35:13Z",
"details": "moderate"
}
],
"title": "CVE-2025-40075"
},
{
"cve": "CVE-2025-40083",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40083"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnet/sched: sch_qfq: Fix null-deref in agg_dequeue\n\nTo prevent a potential crash in agg_dequeue (net/sched/sch_qfq.c)\nwhen cl-\u003eqdisc-\u003eops-\u003epeek(cl-\u003eqdisc) returns NULL, we check the return\nvalue before using it, similar to the existing approach in sch_hfsc.c.\n\nTo avoid code duplication, the following changes are made:\n\n1. Changed qdisc_warn_nonwc(include/net/pkt_sched.h) into a static\ninline function.\n\n2. Moved qdisc_peek_len from net/sched/sch_hfsc.c to\ninclude/net/pkt_sched.h so that sch_qfq can reuse it.\n\n3. Applied qdisc_peek_len in agg_dequeue to avoid crashing.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-6.4.0-150600.8.58.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-6.4.0-150600.8.58.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-devel-6.4.0-150600.8.58.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-devel-6.4.0-150600.8.58.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-devel-azure-6.4.0-150600.8.58.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-source-azure-6.4.0-150600.8.58.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-syms-azure-6.4.0-150600.8.58.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-syms-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:gfs2-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-devel-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-devel-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-extra-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-extra-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-optional-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-optional-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-vdso-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-azure-6.4.0-150600.8.58.1.noarch",
"openSUSE Leap 15.6:kernel-source-azure-6.4.0-150600.8.58.1.noarch",
"openSUSE Leap 15.6:kernel-syms-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kselftests-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-azure-6.4.0-150600.8.58.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40083",
"url": "https://www.suse.com/security/cve/CVE-2025-40083"
},
{
"category": "external",
"summary": "SUSE Bug 1252912 for CVE-2025-40083",
"url": "https://bugzilla.suse.com/1252912"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-6.4.0-150600.8.58.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-6.4.0-150600.8.58.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-devel-6.4.0-150600.8.58.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-devel-6.4.0-150600.8.58.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-devel-azure-6.4.0-150600.8.58.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-source-azure-6.4.0-150600.8.58.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-syms-azure-6.4.0-150600.8.58.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-syms-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:gfs2-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-devel-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-devel-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-extra-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-extra-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-optional-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-optional-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-vdso-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-azure-6.4.0-150600.8.58.1.noarch",
"openSUSE Leap 15.6:kernel-source-azure-6.4.0-150600.8.58.1.noarch",
"openSUSE Leap 15.6:kernel-syms-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kselftests-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-azure-6.4.0-150600.8.58.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-6.4.0-150600.8.58.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-6.4.0-150600.8.58.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-devel-6.4.0-150600.8.58.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-devel-6.4.0-150600.8.58.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-devel-azure-6.4.0-150600.8.58.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-source-azure-6.4.0-150600.8.58.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-syms-azure-6.4.0-150600.8.58.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-syms-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:gfs2-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-devel-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-devel-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-extra-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-extra-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-optional-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-optional-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-vdso-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-azure-6.4.0-150600.8.58.1.noarch",
"openSUSE Leap 15.6:kernel-source-azure-6.4.0-150600.8.58.1.noarch",
"openSUSE Leap 15.6:kernel-syms-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kselftests-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-azure-6.4.0-150600.8.58.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-22T16:35:13Z",
"details": "moderate"
}
],
"title": "CVE-2025-40083"
},
{
"cve": "CVE-2025-40098",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40098"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nALSA: hda: cs35l41: Fix NULL pointer dereference in cs35l41_get_acpi_mute_state()\n\nReturn value of a function acpi_evaluate_dsm() is dereferenced without\nchecking for NULL, but it is usually checked for this function.\n\nacpi_evaluate_dsm() may return NULL, when acpi_evaluate_object() returns\nacpi_status other than ACPI_SUCCESS, so add a check to prevent the crach.\n\nFound by Linux Verification Center (linuxtesting.org) with SVACE.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-6.4.0-150600.8.58.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-6.4.0-150600.8.58.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-devel-6.4.0-150600.8.58.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-devel-6.4.0-150600.8.58.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-devel-azure-6.4.0-150600.8.58.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-source-azure-6.4.0-150600.8.58.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-syms-azure-6.4.0-150600.8.58.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-syms-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:gfs2-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-devel-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-devel-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-extra-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-extra-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-optional-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-optional-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-vdso-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-azure-6.4.0-150600.8.58.1.noarch",
"openSUSE Leap 15.6:kernel-source-azure-6.4.0-150600.8.58.1.noarch",
"openSUSE Leap 15.6:kernel-syms-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kselftests-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-azure-6.4.0-150600.8.58.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40098",
"url": "https://www.suse.com/security/cve/CVE-2025-40098"
},
{
"category": "external",
"summary": "SUSE Bug 1252917 for CVE-2025-40098",
"url": "https://bugzilla.suse.com/1252917"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-6.4.0-150600.8.58.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-6.4.0-150600.8.58.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-devel-6.4.0-150600.8.58.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-devel-6.4.0-150600.8.58.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-devel-azure-6.4.0-150600.8.58.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-source-azure-6.4.0-150600.8.58.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-syms-azure-6.4.0-150600.8.58.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-syms-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:gfs2-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-devel-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-devel-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-extra-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-extra-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-optional-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-optional-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-vdso-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-azure-6.4.0-150600.8.58.1.noarch",
"openSUSE Leap 15.6:kernel-source-azure-6.4.0-150600.8.58.1.noarch",
"openSUSE Leap 15.6:kernel-syms-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kselftests-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-azure-6.4.0-150600.8.58.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-6.4.0-150600.8.58.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-6.4.0-150600.8.58.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-devel-6.4.0-150600.8.58.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-devel-6.4.0-150600.8.58.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-devel-azure-6.4.0-150600.8.58.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-source-azure-6.4.0-150600.8.58.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-syms-azure-6.4.0-150600.8.58.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-syms-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:gfs2-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-devel-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-devel-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-extra-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-extra-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-optional-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-optional-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-vdso-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-azure-6.4.0-150600.8.58.1.noarch",
"openSUSE Leap 15.6:kernel-source-azure-6.4.0-150600.8.58.1.noarch",
"openSUSE Leap 15.6:kernel-syms-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kselftests-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-azure-6.4.0-150600.8.58.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-22T16:35:13Z",
"details": "moderate"
}
],
"title": "CVE-2025-40098"
},
{
"cve": "CVE-2025-40105",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40105"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nvfs: Don\u0027t leak disconnected dentries on umount\n\nWhen user calls open_by_handle_at() on some inode that is not cached, we\nwill create disconnected dentry for it. If such dentry is a directory,\nexportfs_decode_fh_raw() will then try to connect this dentry to the\ndentry tree through reconnect_path(). It may happen for various reasons\n(such as corrupted fs or race with rename) that the call to\nlookup_one_unlocked() in reconnect_one() will fail to find the dentry we\nare trying to reconnect and instead create a new dentry under the\nparent. Now this dentry will not be marked as disconnected although the\nparent still may well be disconnected (at least in case this\ninconsistency happened because the fs is corrupted and .. doesn\u0027t point\nto the real parent directory). This creates inconsistency in\ndisconnected flags but AFAICS it was mostly harmless. At least until\ncommit f1ee616214cb (\"VFS: don\u0027t keep disconnected dentries on d_anon\")\nwhich removed adding of most disconnected dentries to sb-\u003es_anon list.\nThus after this commit cleanup of disconnected dentries implicitely\nrelies on the fact that dput() will immediately reclaim such dentries.\nHowever when some leaf dentry isn\u0027t marked as disconnected, as in the\nscenario described above, the reclaim doesn\u0027t happen and the dentries\nare \"leaked\". Memory reclaim can eventually reclaim them but otherwise\nthey stay in memory and if umount comes first, we hit infamous \"Busy\ninodes after unmount\" bug. Make sure all dentries created under a\ndisconnected parent are marked as disconnected as well.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-6.4.0-150600.8.58.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-6.4.0-150600.8.58.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-devel-6.4.0-150600.8.58.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-devel-6.4.0-150600.8.58.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-devel-azure-6.4.0-150600.8.58.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-source-azure-6.4.0-150600.8.58.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-syms-azure-6.4.0-150600.8.58.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-syms-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:gfs2-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-devel-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-devel-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-extra-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-extra-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-optional-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-optional-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-vdso-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-azure-6.4.0-150600.8.58.1.noarch",
"openSUSE Leap 15.6:kernel-source-azure-6.4.0-150600.8.58.1.noarch",
"openSUSE Leap 15.6:kernel-syms-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kselftests-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-azure-6.4.0-150600.8.58.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40105",
"url": "https://www.suse.com/security/cve/CVE-2025-40105"
},
{
"category": "external",
"summary": "SUSE Bug 1252928 for CVE-2025-40105",
"url": "https://bugzilla.suse.com/1252928"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-6.4.0-150600.8.58.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-6.4.0-150600.8.58.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-devel-6.4.0-150600.8.58.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-devel-6.4.0-150600.8.58.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-devel-azure-6.4.0-150600.8.58.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-source-azure-6.4.0-150600.8.58.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-syms-azure-6.4.0-150600.8.58.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-syms-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:gfs2-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-devel-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-devel-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-extra-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-extra-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-optional-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-optional-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-vdso-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-azure-6.4.0-150600.8.58.1.noarch",
"openSUSE Leap 15.6:kernel-source-azure-6.4.0-150600.8.58.1.noarch",
"openSUSE Leap 15.6:kernel-syms-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kselftests-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-azure-6.4.0-150600.8.58.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.3,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-6.4.0-150600.8.58.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-6.4.0-150600.8.58.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-devel-6.4.0-150600.8.58.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-devel-6.4.0-150600.8.58.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-devel-azure-6.4.0-150600.8.58.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-source-azure-6.4.0-150600.8.58.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-syms-azure-6.4.0-150600.8.58.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-syms-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:gfs2-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-devel-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-devel-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-extra-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-extra-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-optional-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-optional-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-vdso-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-azure-6.4.0-150600.8.58.1.noarch",
"openSUSE Leap 15.6:kernel-source-azure-6.4.0-150600.8.58.1.noarch",
"openSUSE Leap 15.6:kernel-syms-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kselftests-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-azure-6.4.0-150600.8.58.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-22T16:35:13Z",
"details": "low"
}
],
"title": "CVE-2025-40105"
},
{
"cve": "CVE-2025-40107",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40107"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\ncan: hi311x: fix null pointer dereference when resuming from sleep before interface was enabled\n\nThis issue is similar to the vulnerability in the `mcp251x` driver,\nwhich was fixed in commit 03c427147b2d (\"can: mcp251x: fix resume from\nsleep before interface was brought up\").\n\nIn the `hi311x` driver, when the device resumes from sleep, the driver\nschedules `priv-\u003erestart_work`. However, if the network interface was\nnot previously enabled, the `priv-\u003ewq` (workqueue) is not allocated and\ninitialized, leading to a null pointer dereference.\n\nTo fix this, we move the allocation and initialization of the workqueue\nfrom the `hi3110_open` function to the `hi3110_can_probe` function.\nThis ensures that the workqueue is properly initialized before it is\nused during device resume. And added logic to destroy the workqueue\nin the error handling paths of `hi3110_can_probe` and in the\n`hi3110_can_remove` function to prevent resource leaks.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-6.4.0-150600.8.58.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-6.4.0-150600.8.58.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-devel-6.4.0-150600.8.58.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-devel-6.4.0-150600.8.58.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-devel-azure-6.4.0-150600.8.58.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-source-azure-6.4.0-150600.8.58.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-syms-azure-6.4.0-150600.8.58.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-syms-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:gfs2-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-devel-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-devel-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-extra-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-extra-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-optional-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-optional-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-vdso-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-azure-6.4.0-150600.8.58.1.noarch",
"openSUSE Leap 15.6:kernel-source-azure-6.4.0-150600.8.58.1.noarch",
"openSUSE Leap 15.6:kernel-syms-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kselftests-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-azure-6.4.0-150600.8.58.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40107",
"url": "https://www.suse.com/security/cve/CVE-2025-40107"
},
{
"category": "external",
"summary": "SUSE Bug 1253018 for CVE-2025-40107",
"url": "https://bugzilla.suse.com/1253018"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-6.4.0-150600.8.58.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-6.4.0-150600.8.58.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-devel-6.4.0-150600.8.58.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-devel-6.4.0-150600.8.58.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-devel-azure-6.4.0-150600.8.58.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-source-azure-6.4.0-150600.8.58.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-syms-azure-6.4.0-150600.8.58.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-syms-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:gfs2-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-devel-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-devel-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-extra-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-extra-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-optional-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-optional-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-vdso-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-azure-6.4.0-150600.8.58.1.noarch",
"openSUSE Leap 15.6:kernel-source-azure-6.4.0-150600.8.58.1.noarch",
"openSUSE Leap 15.6:kernel-syms-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kselftests-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-azure-6.4.0-150600.8.58.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-6.4.0-150600.8.58.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-6.4.0-150600.8.58.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-devel-6.4.0-150600.8.58.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-devel-6.4.0-150600.8.58.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-devel-azure-6.4.0-150600.8.58.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-source-azure-6.4.0-150600.8.58.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-syms-azure-6.4.0-150600.8.58.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-syms-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:gfs2-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-devel-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-devel-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-extra-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-extra-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-optional-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-optional-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-vdso-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-azure-6.4.0-150600.8.58.1.noarch",
"openSUSE Leap 15.6:kernel-source-azure-6.4.0-150600.8.58.1.noarch",
"openSUSE Leap 15.6:kernel-syms-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kselftests-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-azure-6.4.0-150600.8.58.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-22T16:35:13Z",
"details": "moderate"
}
],
"title": "CVE-2025-40107"
},
{
"cve": "CVE-2025-40109",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40109"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\ncrypto: rng - Ensure set_ent is always present\n\nEnsure that set_ent is always set since only drbg provides it.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-6.4.0-150600.8.58.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-6.4.0-150600.8.58.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-devel-6.4.0-150600.8.58.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-devel-6.4.0-150600.8.58.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-devel-azure-6.4.0-150600.8.58.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-source-azure-6.4.0-150600.8.58.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-syms-azure-6.4.0-150600.8.58.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-syms-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:gfs2-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-devel-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-devel-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-extra-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-extra-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-optional-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-optional-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-vdso-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-azure-6.4.0-150600.8.58.1.noarch",
"openSUSE Leap 15.6:kernel-source-azure-6.4.0-150600.8.58.1.noarch",
"openSUSE Leap 15.6:kernel-syms-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kselftests-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-azure-6.4.0-150600.8.58.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40109",
"url": "https://www.suse.com/security/cve/CVE-2025-40109"
},
{
"category": "external",
"summary": "SUSE Bug 1253176 for CVE-2025-40109",
"url": "https://bugzilla.suse.com/1253176"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-6.4.0-150600.8.58.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-6.4.0-150600.8.58.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-devel-6.4.0-150600.8.58.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-devel-6.4.0-150600.8.58.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-devel-azure-6.4.0-150600.8.58.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-source-azure-6.4.0-150600.8.58.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-syms-azure-6.4.0-150600.8.58.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-syms-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:gfs2-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-devel-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-devel-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-extra-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-extra-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-optional-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-optional-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-vdso-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-azure-6.4.0-150600.8.58.1.noarch",
"openSUSE Leap 15.6:kernel-source-azure-6.4.0-150600.8.58.1.noarch",
"openSUSE Leap 15.6:kernel-syms-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kselftests-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-azure-6.4.0-150600.8.58.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-6.4.0-150600.8.58.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-6.4.0-150600.8.58.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-devel-6.4.0-150600.8.58.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-devel-6.4.0-150600.8.58.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-devel-azure-6.4.0-150600.8.58.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-source-azure-6.4.0-150600.8.58.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-syms-azure-6.4.0-150600.8.58.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-syms-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:gfs2-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-devel-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-devel-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-extra-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-extra-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-optional-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-optional-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-vdso-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-azure-6.4.0-150600.8.58.1.noarch",
"openSUSE Leap 15.6:kernel-source-azure-6.4.0-150600.8.58.1.noarch",
"openSUSE Leap 15.6:kernel-syms-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kselftests-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-azure-6.4.0-150600.8.58.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-22T16:35:13Z",
"details": "moderate"
}
],
"title": "CVE-2025-40109"
},
{
"cve": "CVE-2025-40110",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40110"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\ndrm/vmwgfx: Fix a null-ptr access in the cursor snooper\n\nCheck that the resource which is converted to a surface exists before\ntrying to use the cursor snooper on it.\n\nvmw_cmd_res_check allows explicit invalid (SVGA3D_INVALID_ID) identifiers\nbecause some svga commands accept SVGA3D_INVALID_ID to mean \"no surface\",\nunfortunately functions that accept the actual surfaces as objects might\n(and in case of the cursor snooper, do not) be able to handle null\nobjects. Make sure that we validate not only the identifier (via the\nvmw_cmd_res_check) but also check that the actual resource exists before\ntrying to do something with it.\n\nFixes unchecked null-ptr reference in the snooping code.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-6.4.0-150600.8.58.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-6.4.0-150600.8.58.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-devel-6.4.0-150600.8.58.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-devel-6.4.0-150600.8.58.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-devel-azure-6.4.0-150600.8.58.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-source-azure-6.4.0-150600.8.58.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-syms-azure-6.4.0-150600.8.58.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-syms-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:gfs2-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-devel-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-devel-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-extra-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-extra-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-optional-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-optional-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-vdso-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-azure-6.4.0-150600.8.58.1.noarch",
"openSUSE Leap 15.6:kernel-source-azure-6.4.0-150600.8.58.1.noarch",
"openSUSE Leap 15.6:kernel-syms-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kselftests-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-azure-6.4.0-150600.8.58.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40110",
"url": "https://www.suse.com/security/cve/CVE-2025-40110"
},
{
"category": "external",
"summary": "SUSE Bug 1253275 for CVE-2025-40110",
"url": "https://bugzilla.suse.com/1253275"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-6.4.0-150600.8.58.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-6.4.0-150600.8.58.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-devel-6.4.0-150600.8.58.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-devel-6.4.0-150600.8.58.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-devel-azure-6.4.0-150600.8.58.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-source-azure-6.4.0-150600.8.58.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-syms-azure-6.4.0-150600.8.58.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-syms-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:gfs2-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-devel-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-devel-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-extra-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-extra-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-optional-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-optional-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-vdso-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-azure-6.4.0-150600.8.58.1.noarch",
"openSUSE Leap 15.6:kernel-source-azure-6.4.0-150600.8.58.1.noarch",
"openSUSE Leap 15.6:kernel-syms-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kselftests-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-azure-6.4.0-150600.8.58.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.1,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-6.4.0-150600.8.58.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-6.4.0-150600.8.58.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-devel-6.4.0-150600.8.58.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-devel-6.4.0-150600.8.58.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-devel-azure-6.4.0-150600.8.58.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-source-azure-6.4.0-150600.8.58.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-syms-azure-6.4.0-150600.8.58.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-syms-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:gfs2-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-devel-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-devel-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-extra-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-extra-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-optional-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-optional-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-vdso-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-azure-6.4.0-150600.8.58.1.noarch",
"openSUSE Leap 15.6:kernel-source-azure-6.4.0-150600.8.58.1.noarch",
"openSUSE Leap 15.6:kernel-syms-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kselftests-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-azure-6.4.0-150600.8.58.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-22T16:35:13Z",
"details": "moderate"
}
],
"title": "CVE-2025-40110"
},
{
"cve": "CVE-2025-40111",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40111"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\ndrm/vmwgfx: Fix Use-after-free in validation\n\nNodes stored in the validation duplicates hashtable come from an arena\nallocator that is cleared at the end of vmw_execbuf_process. All nodes\nare expected to be cleared in vmw_validation_drop_ht but this node escaped\nbecause its resource was destroyed prematurely.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-6.4.0-150600.8.58.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-6.4.0-150600.8.58.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-devel-6.4.0-150600.8.58.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-devel-6.4.0-150600.8.58.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-devel-azure-6.4.0-150600.8.58.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-source-azure-6.4.0-150600.8.58.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-syms-azure-6.4.0-150600.8.58.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-syms-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:gfs2-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-devel-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-devel-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-extra-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-extra-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-optional-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-optional-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-vdso-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-azure-6.4.0-150600.8.58.1.noarch",
"openSUSE Leap 15.6:kernel-source-azure-6.4.0-150600.8.58.1.noarch",
"openSUSE Leap 15.6:kernel-syms-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kselftests-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-azure-6.4.0-150600.8.58.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40111",
"url": "https://www.suse.com/security/cve/CVE-2025-40111"
},
{
"category": "external",
"summary": "SUSE Bug 1253362 for CVE-2025-40111",
"url": "https://bugzilla.suse.com/1253362"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-6.4.0-150600.8.58.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-6.4.0-150600.8.58.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-devel-6.4.0-150600.8.58.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-devel-6.4.0-150600.8.58.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-devel-azure-6.4.0-150600.8.58.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-source-azure-6.4.0-150600.8.58.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-syms-azure-6.4.0-150600.8.58.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-syms-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:gfs2-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-devel-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-devel-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-extra-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-extra-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-optional-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-optional-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-vdso-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-azure-6.4.0-150600.8.58.1.noarch",
"openSUSE Leap 15.6:kernel-source-azure-6.4.0-150600.8.58.1.noarch",
"openSUSE Leap 15.6:kernel-syms-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kselftests-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-azure-6.4.0-150600.8.58.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.7,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:L/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-6.4.0-150600.8.58.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-6.4.0-150600.8.58.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-devel-6.4.0-150600.8.58.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-devel-6.4.0-150600.8.58.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-devel-azure-6.4.0-150600.8.58.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-source-azure-6.4.0-150600.8.58.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-syms-azure-6.4.0-150600.8.58.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-syms-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:gfs2-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-devel-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-devel-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-extra-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-extra-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-optional-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-optional-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-vdso-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-azure-6.4.0-150600.8.58.1.noarch",
"openSUSE Leap 15.6:kernel-source-azure-6.4.0-150600.8.58.1.noarch",
"openSUSE Leap 15.6:kernel-syms-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kselftests-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-azure-6.4.0-150600.8.58.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-22T16:35:13Z",
"details": "moderate"
}
],
"title": "CVE-2025-40111"
},
{
"cve": "CVE-2025-40115",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40115"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nscsi: mpt3sas: Fix crash in transport port remove by using ioc_info()\n\nDuring mpt3sas_transport_port_remove(), messages were logged with\ndev_printk() against \u0026mpt3sas_port-\u003eport-\u003edev. At this point the SAS\ntransport device may already be partially unregistered or freed, leading\nto a crash when accessing its struct device.\n\nUsing ioc_info(), which logs via the PCI device (ioc-\u003epdev-\u003edev),\nguaranteed to remain valid until driver removal.\n\n[83428.295776] Oops: general protection fault, probably for non-canonical address 0x6f702f323a33312d: 0000 [#1] SMP NOPTI\n[83428.295785] CPU: 145 UID: 0 PID: 113296 Comm: rmmod Kdump: loaded Tainted: G OE 6.16.0-rc1+ #1 PREEMPT(voluntary)\n[83428.295792] Tainted: [O]=OOT_MODULE, [E]=UNSIGNED_MODULE\n[83428.295795] Hardware name: Dell Inc. Precision 7875 Tower/, BIOS 89.1.67 02/23/2024\n[83428.295799] RIP: 0010:__dev_printk+0x1f/0x70\n[83428.295805] Code: 90 90 90 90 90 90 90 90 90 90 90 0f 1f 44 00 00 49 89 d1 48 85 f6 74 52 4c 8b 46 50 4d 85 c0 74 1f 48 8b 46 68 48 85 c0 74 22 \u003c48\u003e 8b 08 0f b6 7f 01 48 c7 c2 db e8 42 ad 83 ef 30 e9 7b f8 ff ff\n[83428.295813] RSP: 0018:ff85aeafc3137bb0 EFLAGS: 00010206\n[83428.295817] RAX: 6f702f323a33312d RBX: ff4290ee81292860 RCX: 5000cca25103be32\n[83428.295820] RDX: ff85aeafc3137bb8 RSI: ff4290eeb1966c00 RDI: ffffffffc1560845\n[83428.295823] RBP: ff85aeafc3137c18 R08: 74726f702f303a33 R09: ff85aeafc3137bb8\n[83428.295826] R10: ff85aeafc3137b18 R11: ff4290f5bd60fe68 R12: ff4290ee81290000\n[83428.295830] R13: ff4290ee6e345de0 R14: ff4290ee81290000 R15: ff4290ee6e345e30\n[83428.295833] FS: 00007fd9472a6740(0000) GS:ff4290f5ce96b000(0000) knlGS:0000000000000000\n[83428.295837] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033\n[83428.295840] CR2: 00007f242b4db238 CR3: 00000002372b8006 CR4: 0000000000771ef0\n[83428.295844] PKRU: 55555554\n[83428.295846] Call Trace:\n[83428.295848] \u003cTASK\u003e\n[83428.295850] _dev_printk+0x5c/0x80\n[83428.295857] ? srso_alias_return_thunk+0x5/0xfbef5\n[83428.295863] mpt3sas_transport_port_remove+0x1c7/0x420 [mpt3sas]\n[83428.295882] _scsih_remove_device+0x21b/0x280 [mpt3sas]\n[83428.295894] ? _scsih_expander_node_remove+0x108/0x140 [mpt3sas]\n[83428.295906] ? srso_alias_return_thunk+0x5/0xfbef5\n[83428.295910] mpt3sas_device_remove_by_sas_address.part.0+0x8f/0x110 [mpt3sas]\n[83428.295921] _scsih_expander_node_remove+0x129/0x140 [mpt3sas]\n[83428.295933] _scsih_expander_node_remove+0x6a/0x140 [mpt3sas]\n[83428.295944] scsih_remove+0x3f0/0x4a0 [mpt3sas]\n[83428.295957] pci_device_remove+0x3b/0xb0\n[83428.295962] device_release_driver_internal+0x193/0x200\n[83428.295968] driver_detach+0x44/0x90\n[83428.295971] bus_remove_driver+0x69/0xf0\n[83428.295975] pci_unregister_driver+0x2a/0xb0\n[83428.295979] _mpt3sas_exit+0x1f/0x300 [mpt3sas]\n[83428.295991] __do_sys_delete_module.constprop.0+0x174/0x310\n[83428.295997] ? srso_alias_return_thunk+0x5/0xfbef5\n[83428.296000] ? __x64_sys_getdents64+0x9a/0x110\n[83428.296005] ? srso_alias_return_thunk+0x5/0xfbef5\n[83428.296009] ? syscall_trace_enter+0xf6/0x1b0\n[83428.296014] do_syscall_64+0x7b/0x2c0\n[83428.296019] ? srso_alias_return_thunk+0x5/0xfbef5\n[83428.296023] entry_SYSCALL_64_after_hwframe+0x76/0x7e",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-6.4.0-150600.8.58.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-6.4.0-150600.8.58.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-devel-6.4.0-150600.8.58.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-devel-6.4.0-150600.8.58.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-devel-azure-6.4.0-150600.8.58.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-source-azure-6.4.0-150600.8.58.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-syms-azure-6.4.0-150600.8.58.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-syms-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:gfs2-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-devel-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-devel-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-extra-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-extra-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-optional-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-optional-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-vdso-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-azure-6.4.0-150600.8.58.1.noarch",
"openSUSE Leap 15.6:kernel-source-azure-6.4.0-150600.8.58.1.noarch",
"openSUSE Leap 15.6:kernel-syms-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kselftests-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-azure-6.4.0-150600.8.58.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40115",
"url": "https://www.suse.com/security/cve/CVE-2025-40115"
},
{
"category": "external",
"summary": "SUSE Bug 1253318 for CVE-2025-40115",
"url": "https://bugzilla.suse.com/1253318"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-6.4.0-150600.8.58.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-6.4.0-150600.8.58.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-devel-6.4.0-150600.8.58.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-devel-6.4.0-150600.8.58.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-devel-azure-6.4.0-150600.8.58.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-source-azure-6.4.0-150600.8.58.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-syms-azure-6.4.0-150600.8.58.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-syms-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:gfs2-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-devel-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-devel-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-extra-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-extra-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-optional-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-optional-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-vdso-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-azure-6.4.0-150600.8.58.1.noarch",
"openSUSE Leap 15.6:kernel-source-azure-6.4.0-150600.8.58.1.noarch",
"openSUSE Leap 15.6:kernel-syms-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kselftests-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-azure-6.4.0-150600.8.58.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-6.4.0-150600.8.58.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-6.4.0-150600.8.58.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-devel-6.4.0-150600.8.58.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-devel-6.4.0-150600.8.58.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-devel-azure-6.4.0-150600.8.58.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-source-azure-6.4.0-150600.8.58.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-syms-azure-6.4.0-150600.8.58.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-syms-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:gfs2-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-devel-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-devel-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-extra-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-extra-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-optional-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-optional-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-vdso-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-azure-6.4.0-150600.8.58.1.noarch",
"openSUSE Leap 15.6:kernel-source-azure-6.4.0-150600.8.58.1.noarch",
"openSUSE Leap 15.6:kernel-syms-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kselftests-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-azure-6.4.0-150600.8.58.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-22T16:35:13Z",
"details": "moderate"
}
],
"title": "CVE-2025-40115"
},
{
"cve": "CVE-2025-40116",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40116"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nusb: host: max3421-hcd: Fix error pointer dereference in probe cleanup\n\nThe kthread_run() function returns error pointers so the\nmax3421_hcd-\u003espi_thread pointer can be either error pointers or NULL.\nCheck for both before dereferencing it.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-6.4.0-150600.8.58.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-6.4.0-150600.8.58.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-devel-6.4.0-150600.8.58.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-devel-6.4.0-150600.8.58.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-devel-azure-6.4.0-150600.8.58.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-source-azure-6.4.0-150600.8.58.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-syms-azure-6.4.0-150600.8.58.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-syms-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:gfs2-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-devel-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-devel-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-extra-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-extra-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-optional-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-optional-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-vdso-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-azure-6.4.0-150600.8.58.1.noarch",
"openSUSE Leap 15.6:kernel-source-azure-6.4.0-150600.8.58.1.noarch",
"openSUSE Leap 15.6:kernel-syms-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kselftests-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-azure-6.4.0-150600.8.58.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40116",
"url": "https://www.suse.com/security/cve/CVE-2025-40116"
},
{
"category": "external",
"summary": "SUSE Bug 1253324 for CVE-2025-40116",
"url": "https://bugzilla.suse.com/1253324"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-6.4.0-150600.8.58.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-6.4.0-150600.8.58.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-devel-6.4.0-150600.8.58.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-devel-6.4.0-150600.8.58.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-devel-azure-6.4.0-150600.8.58.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-source-azure-6.4.0-150600.8.58.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-syms-azure-6.4.0-150600.8.58.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-syms-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:gfs2-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-devel-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-devel-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-extra-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-extra-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-optional-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-optional-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-vdso-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-azure-6.4.0-150600.8.58.1.noarch",
"openSUSE Leap 15.6:kernel-source-azure-6.4.0-150600.8.58.1.noarch",
"openSUSE Leap 15.6:kernel-syms-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kselftests-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-azure-6.4.0-150600.8.58.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-6.4.0-150600.8.58.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-6.4.0-150600.8.58.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-devel-6.4.0-150600.8.58.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-devel-6.4.0-150600.8.58.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-devel-azure-6.4.0-150600.8.58.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-source-azure-6.4.0-150600.8.58.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-syms-azure-6.4.0-150600.8.58.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-syms-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:gfs2-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-devel-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-devel-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-extra-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-extra-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-optional-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-optional-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-vdso-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-azure-6.4.0-150600.8.58.1.noarch",
"openSUSE Leap 15.6:kernel-source-azure-6.4.0-150600.8.58.1.noarch",
"openSUSE Leap 15.6:kernel-syms-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kselftests-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-azure-6.4.0-150600.8.58.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-22T16:35:13Z",
"details": "moderate"
}
],
"title": "CVE-2025-40116"
},
{
"cve": "CVE-2025-40118",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40118"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nscsi: pm80xx: Fix array-index-out-of-of-bounds on rmmod\n\nSince commit f7b705c238d1 (\"scsi: pm80xx: Set phy_attached to zero when\ndevice is gone\") UBSAN reports:\n\n UBSAN: array-index-out-of-bounds in drivers/scsi/pm8001/pm8001_sas.c:786:17\n index 28 is out of range for type \u0027pm8001_phy [16]\u0027\n\non rmmod when using an expander.\n\nFor a direct attached device, attached_phy contains the local phy id.\nFor a device behind an expander, attached_phy contains the remote phy\nid, not the local phy id.\n\nI.e. while pm8001_ha will have pm8001_ha-\u003echip-\u003en_phy local phys, for a\ndevice behind an expander, attached_phy can be much larger than\npm8001_ha-\u003echip-\u003en_phy (depending on the amount of phys of the\nexpander).\n\nE.g. on my system pm8001_ha has 8 phys with phy ids 0-7. One of the\nports has an expander connected. The expander has 31 phys with phy ids\n0-30.\n\nThe pm8001_ha-\u003ephy array only contains the phys of the HBA. It does not\ncontain the phys of the expander. Thus, it is wrong to use attached_phy\nto index the pm8001_ha-\u003ephy array for a device behind an expander.\n\nThus, we can only clear phy_attached for devices that are directly\nattached.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-6.4.0-150600.8.58.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-6.4.0-150600.8.58.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-devel-6.4.0-150600.8.58.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-devel-6.4.0-150600.8.58.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-devel-azure-6.4.0-150600.8.58.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-source-azure-6.4.0-150600.8.58.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-syms-azure-6.4.0-150600.8.58.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-syms-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:gfs2-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-devel-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-devel-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-extra-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-extra-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-optional-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-optional-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-vdso-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-azure-6.4.0-150600.8.58.1.noarch",
"openSUSE Leap 15.6:kernel-source-azure-6.4.0-150600.8.58.1.noarch",
"openSUSE Leap 15.6:kernel-syms-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kselftests-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-azure-6.4.0-150600.8.58.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40118",
"url": "https://www.suse.com/security/cve/CVE-2025-40118"
},
{
"category": "external",
"summary": "SUSE Bug 1253363 for CVE-2025-40118",
"url": "https://bugzilla.suse.com/1253363"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-6.4.0-150600.8.58.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-6.4.0-150600.8.58.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-devel-6.4.0-150600.8.58.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-devel-6.4.0-150600.8.58.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-devel-azure-6.4.0-150600.8.58.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-source-azure-6.4.0-150600.8.58.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-syms-azure-6.4.0-150600.8.58.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-syms-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:gfs2-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-devel-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-devel-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-extra-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-extra-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-optional-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-optional-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-vdso-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-azure-6.4.0-150600.8.58.1.noarch",
"openSUSE Leap 15.6:kernel-source-azure-6.4.0-150600.8.58.1.noarch",
"openSUSE Leap 15.6:kernel-syms-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kselftests-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-azure-6.4.0-150600.8.58.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.1,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-6.4.0-150600.8.58.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-6.4.0-150600.8.58.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-devel-6.4.0-150600.8.58.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-devel-6.4.0-150600.8.58.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-devel-azure-6.4.0-150600.8.58.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-source-azure-6.4.0-150600.8.58.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-syms-azure-6.4.0-150600.8.58.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-syms-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:gfs2-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-devel-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-devel-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-extra-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-extra-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-optional-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-optional-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-vdso-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-azure-6.4.0-150600.8.58.1.noarch",
"openSUSE Leap 15.6:kernel-source-azure-6.4.0-150600.8.58.1.noarch",
"openSUSE Leap 15.6:kernel-syms-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kselftests-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-azure-6.4.0-150600.8.58.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-22T16:35:13Z",
"details": "moderate"
}
],
"title": "CVE-2025-40118"
},
{
"cve": "CVE-2025-40120",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40120"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnet: usb: asix: hold PM usage ref to avoid PM/MDIO + RTNL deadlock\n\nPrevent USB runtime PM (autosuspend) for AX88772* in bind.\n\nusbnet enables runtime PM (autosuspend) by default, so disabling it via\nthe usb_driver flag is ineffective. On AX88772B, autosuspend shows no\nmeasurable power saving with current driver (no link partner, admin\nup/down). The ~0.453 W -\u003e ~0.248 W drop on v6.1 comes from phylib powering\nthe PHY off on admin-down, not from USB autosuspend.\n\nThe real hazard is that with runtime PM enabled, ndo_open() (under RTNL)\nmay synchronously trigger autoresume (usb_autopm_get_interface()) into\nasix_resume() while the USB PM lock is held. Resume paths then invoke\nphylink/phylib and MDIO, which also expect RTNL, leading to possible\ndeadlocks or PM lock vs MDIO wake issues.\n\nTo avoid this, keep the device runtime-PM active by taking a usage\nreference in ax88772_bind() and dropping it in unbind(). A non-zero PM\nusage count blocks runtime suspend regardless of userspace policy\n(.../power/control - pm_runtime_allow/forbid), making this approach\nrobust against sysfs overrides.\n\nHolding a runtime-PM usage ref does not affect system-wide suspend;\nsystem sleep/resume callbacks continue to run as before.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-6.4.0-150600.8.58.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-6.4.0-150600.8.58.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-devel-6.4.0-150600.8.58.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-devel-6.4.0-150600.8.58.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-devel-azure-6.4.0-150600.8.58.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-source-azure-6.4.0-150600.8.58.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-syms-azure-6.4.0-150600.8.58.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-syms-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:gfs2-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-devel-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-devel-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-extra-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-extra-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-optional-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-optional-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-vdso-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-azure-6.4.0-150600.8.58.1.noarch",
"openSUSE Leap 15.6:kernel-source-azure-6.4.0-150600.8.58.1.noarch",
"openSUSE Leap 15.6:kernel-syms-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kselftests-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-azure-6.4.0-150600.8.58.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40120",
"url": "https://www.suse.com/security/cve/CVE-2025-40120"
},
{
"category": "external",
"summary": "SUSE Bug 1253360 for CVE-2025-40120",
"url": "https://bugzilla.suse.com/1253360"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-6.4.0-150600.8.58.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-6.4.0-150600.8.58.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-devel-6.4.0-150600.8.58.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-devel-6.4.0-150600.8.58.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-devel-azure-6.4.0-150600.8.58.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-source-azure-6.4.0-150600.8.58.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-syms-azure-6.4.0-150600.8.58.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-syms-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:gfs2-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-devel-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-devel-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-extra-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-extra-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-optional-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-optional-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-vdso-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-azure-6.4.0-150600.8.58.1.noarch",
"openSUSE Leap 15.6:kernel-source-azure-6.4.0-150600.8.58.1.noarch",
"openSUSE Leap 15.6:kernel-syms-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kselftests-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-azure-6.4.0-150600.8.58.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-6.4.0-150600.8.58.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-6.4.0-150600.8.58.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-devel-6.4.0-150600.8.58.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-devel-6.4.0-150600.8.58.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-devel-azure-6.4.0-150600.8.58.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-source-azure-6.4.0-150600.8.58.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-syms-azure-6.4.0-150600.8.58.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-syms-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:gfs2-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-devel-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-devel-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-extra-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-extra-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-optional-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-optional-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-vdso-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-azure-6.4.0-150600.8.58.1.noarch",
"openSUSE Leap 15.6:kernel-source-azure-6.4.0-150600.8.58.1.noarch",
"openSUSE Leap 15.6:kernel-syms-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kselftests-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-azure-6.4.0-150600.8.58.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-22T16:35:13Z",
"details": "moderate"
}
],
"title": "CVE-2025-40120"
},
{
"cve": "CVE-2025-40121",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40121"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nASoC: Intel: bytcr_rt5651: Fix invalid quirk input mapping\n\nWhen an invalid value is passed via quirk option, currently\nbytcr_rt5640 driver just ignores and leaves as is, which may lead to\nunepxected results like OOB access.\n\nThis patch adds the sanity check and corrects the input mapping to the\ncertain default value if an invalid value is passed.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-6.4.0-150600.8.58.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-6.4.0-150600.8.58.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-devel-6.4.0-150600.8.58.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-devel-6.4.0-150600.8.58.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-devel-azure-6.4.0-150600.8.58.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-source-azure-6.4.0-150600.8.58.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-syms-azure-6.4.0-150600.8.58.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-syms-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:gfs2-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-devel-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-devel-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-extra-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-extra-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-optional-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-optional-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-vdso-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-azure-6.4.0-150600.8.58.1.noarch",
"openSUSE Leap 15.6:kernel-source-azure-6.4.0-150600.8.58.1.noarch",
"openSUSE Leap 15.6:kernel-syms-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kselftests-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-azure-6.4.0-150600.8.58.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40121",
"url": "https://www.suse.com/security/cve/CVE-2025-40121"
},
{
"category": "external",
"summary": "SUSE Bug 1253367 for CVE-2025-40121",
"url": "https://bugzilla.suse.com/1253367"
},
{
"category": "external",
"summary": "SUSE Bug 1253430 for CVE-2025-40121",
"url": "https://bugzilla.suse.com/1253430"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-6.4.0-150600.8.58.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-6.4.0-150600.8.58.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-devel-6.4.0-150600.8.58.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-devel-6.4.0-150600.8.58.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-devel-azure-6.4.0-150600.8.58.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-source-azure-6.4.0-150600.8.58.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-syms-azure-6.4.0-150600.8.58.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-syms-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:gfs2-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-devel-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-devel-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-extra-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-extra-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-optional-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-optional-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-vdso-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-azure-6.4.0-150600.8.58.1.noarch",
"openSUSE Leap 15.6:kernel-source-azure-6.4.0-150600.8.58.1.noarch",
"openSUSE Leap 15.6:kernel-syms-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kselftests-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-azure-6.4.0-150600.8.58.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-6.4.0-150600.8.58.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-6.4.0-150600.8.58.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-devel-6.4.0-150600.8.58.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-devel-6.4.0-150600.8.58.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-devel-azure-6.4.0-150600.8.58.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-source-azure-6.4.0-150600.8.58.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-syms-azure-6.4.0-150600.8.58.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-syms-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:gfs2-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-devel-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-devel-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-extra-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-extra-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-optional-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-optional-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-vdso-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-azure-6.4.0-150600.8.58.1.noarch",
"openSUSE Leap 15.6:kernel-source-azure-6.4.0-150600.8.58.1.noarch",
"openSUSE Leap 15.6:kernel-syms-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kselftests-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-azure-6.4.0-150600.8.58.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-22T16:35:13Z",
"details": "moderate"
}
],
"title": "CVE-2025-40121"
},
{
"cve": "CVE-2025-40127",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40127"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nhwrng: ks-sa - fix division by zero in ks_sa_rng_init\n\nFix division by zero in ks_sa_rng_init caused by missing clock\npointer initialization. The clk_get_rate() call is performed on\nan uninitialized clk pointer, resulting in division by zero when\ncalculating delay values.\n\nAdd clock initialization code before using the clock.\n\n\n drivers/char/hw_random/ks-sa-rng.c | 7 +++++++\n 1 file changed, 7 insertions(+)",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-6.4.0-150600.8.58.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-6.4.0-150600.8.58.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-devel-6.4.0-150600.8.58.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-devel-6.4.0-150600.8.58.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-devel-azure-6.4.0-150600.8.58.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-source-azure-6.4.0-150600.8.58.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-syms-azure-6.4.0-150600.8.58.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-syms-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:gfs2-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-devel-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-devel-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-extra-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-extra-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-optional-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-optional-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-vdso-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-azure-6.4.0-150600.8.58.1.noarch",
"openSUSE Leap 15.6:kernel-source-azure-6.4.0-150600.8.58.1.noarch",
"openSUSE Leap 15.6:kernel-syms-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kselftests-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-azure-6.4.0-150600.8.58.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40127",
"url": "https://www.suse.com/security/cve/CVE-2025-40127"
},
{
"category": "external",
"summary": "SUSE Bug 1253369 for CVE-2025-40127",
"url": "https://bugzilla.suse.com/1253369"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-6.4.0-150600.8.58.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-6.4.0-150600.8.58.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-devel-6.4.0-150600.8.58.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-devel-6.4.0-150600.8.58.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-devel-azure-6.4.0-150600.8.58.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-source-azure-6.4.0-150600.8.58.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-syms-azure-6.4.0-150600.8.58.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-syms-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:gfs2-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-devel-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-devel-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-extra-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-extra-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-optional-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-optional-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-vdso-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-azure-6.4.0-150600.8.58.1.noarch",
"openSUSE Leap 15.6:kernel-source-azure-6.4.0-150600.8.58.1.noarch",
"openSUSE Leap 15.6:kernel-syms-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kselftests-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-azure-6.4.0-150600.8.58.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-6.4.0-150600.8.58.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-6.4.0-150600.8.58.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-devel-6.4.0-150600.8.58.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-devel-6.4.0-150600.8.58.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-devel-azure-6.4.0-150600.8.58.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-source-azure-6.4.0-150600.8.58.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-syms-azure-6.4.0-150600.8.58.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-syms-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:gfs2-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-devel-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-devel-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-extra-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-extra-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-optional-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-optional-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-vdso-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-azure-6.4.0-150600.8.58.1.noarch",
"openSUSE Leap 15.6:kernel-source-azure-6.4.0-150600.8.58.1.noarch",
"openSUSE Leap 15.6:kernel-syms-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kselftests-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-azure-6.4.0-150600.8.58.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-22T16:35:13Z",
"details": "moderate"
}
],
"title": "CVE-2025-40127"
},
{
"cve": "CVE-2025-40129",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40129"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nsunrpc: fix null pointer dereference on zero-length checksum\n\nIn xdr_stream_decode_opaque_auth(), zero-length checksum.len causes\nchecksum.data to be set to NULL. This triggers a NPD when accessing\nchecksum.data in gss_krb5_verify_mic_v2(). This patch ensures that\nthe value of checksum.len is not less than XDR_UNIT.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-6.4.0-150600.8.58.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-6.4.0-150600.8.58.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-devel-6.4.0-150600.8.58.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-devel-6.4.0-150600.8.58.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-devel-azure-6.4.0-150600.8.58.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-source-azure-6.4.0-150600.8.58.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-syms-azure-6.4.0-150600.8.58.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-syms-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:gfs2-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-devel-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-devel-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-extra-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-extra-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-optional-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-optional-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-vdso-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-azure-6.4.0-150600.8.58.1.noarch",
"openSUSE Leap 15.6:kernel-source-azure-6.4.0-150600.8.58.1.noarch",
"openSUSE Leap 15.6:kernel-syms-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kselftests-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-azure-6.4.0-150600.8.58.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40129",
"url": "https://www.suse.com/security/cve/CVE-2025-40129"
},
{
"category": "external",
"summary": "SUSE Bug 1253472 for CVE-2025-40129",
"url": "https://bugzilla.suse.com/1253472"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-6.4.0-150600.8.58.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-6.4.0-150600.8.58.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-devel-6.4.0-150600.8.58.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-devel-6.4.0-150600.8.58.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-devel-azure-6.4.0-150600.8.58.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-source-azure-6.4.0-150600.8.58.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-syms-azure-6.4.0-150600.8.58.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-syms-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:gfs2-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-devel-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-devel-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-extra-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-extra-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-optional-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-optional-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-vdso-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-azure-6.4.0-150600.8.58.1.noarch",
"openSUSE Leap 15.6:kernel-source-azure-6.4.0-150600.8.58.1.noarch",
"openSUSE Leap 15.6:kernel-syms-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kselftests-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-azure-6.4.0-150600.8.58.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-6.4.0-150600.8.58.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-6.4.0-150600.8.58.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-devel-6.4.0-150600.8.58.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-devel-6.4.0-150600.8.58.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-devel-azure-6.4.0-150600.8.58.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-source-azure-6.4.0-150600.8.58.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-syms-azure-6.4.0-150600.8.58.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-syms-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:gfs2-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-devel-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-devel-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-extra-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-extra-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-optional-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-optional-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-vdso-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-azure-6.4.0-150600.8.58.1.noarch",
"openSUSE Leap 15.6:kernel-source-azure-6.4.0-150600.8.58.1.noarch",
"openSUSE Leap 15.6:kernel-syms-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kselftests-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-azure-6.4.0-150600.8.58.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-22T16:35:13Z",
"details": "important"
}
],
"title": "CVE-2025-40129"
},
{
"cve": "CVE-2025-40139",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40139"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nsmc: Use __sk_dst_get() and dst_dev_rcu() in in smc_clc_prfx_set().\n\nsmc_clc_prfx_set() is called during connect() and not under RCU\nnor RTNL.\n\nUsing sk_dst_get(sk)-\u003edev could trigger UAF.\n\nLet\u0027s use __sk_dst_get() and dev_dst_rcu() under rcu_read_lock()\nafter kernel_getsockname().\n\nNote that the returned value of smc_clc_prfx_set() is not used\nin the caller.\n\nWhile at it, we change the 1st arg of smc_clc_prfx_set[46]_rcu()\nnot to touch dst there.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-6.4.0-150600.8.58.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-6.4.0-150600.8.58.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-devel-6.4.0-150600.8.58.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-devel-6.4.0-150600.8.58.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-devel-azure-6.4.0-150600.8.58.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-source-azure-6.4.0-150600.8.58.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-syms-azure-6.4.0-150600.8.58.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-syms-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:gfs2-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-devel-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-devel-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-extra-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-extra-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-optional-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-optional-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-vdso-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-azure-6.4.0-150600.8.58.1.noarch",
"openSUSE Leap 15.6:kernel-source-azure-6.4.0-150600.8.58.1.noarch",
"openSUSE Leap 15.6:kernel-syms-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kselftests-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-azure-6.4.0-150600.8.58.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40139",
"url": "https://www.suse.com/security/cve/CVE-2025-40139"
},
{
"category": "external",
"summary": "SUSE Bug 1253409 for CVE-2025-40139",
"url": "https://bugzilla.suse.com/1253409"
},
{
"category": "external",
"summary": "SUSE Bug 1253411 for CVE-2025-40139",
"url": "https://bugzilla.suse.com/1253411"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-6.4.0-150600.8.58.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-6.4.0-150600.8.58.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-devel-6.4.0-150600.8.58.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-devel-6.4.0-150600.8.58.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-devel-azure-6.4.0-150600.8.58.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-source-azure-6.4.0-150600.8.58.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-syms-azure-6.4.0-150600.8.58.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-syms-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:gfs2-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-devel-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-devel-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-extra-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-extra-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-optional-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-optional-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-vdso-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-azure-6.4.0-150600.8.58.1.noarch",
"openSUSE Leap 15.6:kernel-source-azure-6.4.0-150600.8.58.1.noarch",
"openSUSE Leap 15.6:kernel-syms-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kselftests-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-azure-6.4.0-150600.8.58.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-6.4.0-150600.8.58.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-6.4.0-150600.8.58.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-devel-6.4.0-150600.8.58.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-devel-6.4.0-150600.8.58.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-devel-azure-6.4.0-150600.8.58.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-source-azure-6.4.0-150600.8.58.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-syms-azure-6.4.0-150600.8.58.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-syms-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:gfs2-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-devel-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-devel-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-extra-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-extra-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-optional-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-optional-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-vdso-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-azure-6.4.0-150600.8.58.1.noarch",
"openSUSE Leap 15.6:kernel-source-azure-6.4.0-150600.8.58.1.noarch",
"openSUSE Leap 15.6:kernel-syms-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kselftests-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-azure-6.4.0-150600.8.58.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-22T16:35:13Z",
"details": "important"
}
],
"title": "CVE-2025-40139"
},
{
"cve": "CVE-2025-40140",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40140"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnet: usb: Remove disruptive netif_wake_queue in rtl8150_set_multicast\n\nsyzbot reported WARNING in rtl8150_start_xmit/usb_submit_urb.\nThis is the sequence of events that leads to the warning:\n\nrtl8150_start_xmit() {\n\tnetif_stop_queue();\n\tusb_submit_urb(dev-\u003etx_urb);\n}\n\nrtl8150_set_multicast() {\n\tnetif_stop_queue();\n\tnetif_wake_queue();\t\t\u003c-- wakes up TX queue before URB is done\n}\n\nrtl8150_start_xmit() {\n\tnetif_stop_queue();\n\tusb_submit_urb(dev-\u003etx_urb);\t\u003c-- double submission\n}\n\nrtl8150_set_multicast being the ndo_set_rx_mode callback should not be\ncalling netif_stop_queue and notif_start_queue as these handle\nTX queue synchronization.\n\nThe net core function dev_set_rx_mode handles the synchronization\nfor rtl8150_set_multicast making it safe to remove these locks.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-6.4.0-150600.8.58.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-6.4.0-150600.8.58.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-devel-6.4.0-150600.8.58.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-devel-6.4.0-150600.8.58.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-devel-azure-6.4.0-150600.8.58.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-source-azure-6.4.0-150600.8.58.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-syms-azure-6.4.0-150600.8.58.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-syms-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:gfs2-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-devel-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-devel-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-extra-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-extra-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-optional-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-optional-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-vdso-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-azure-6.4.0-150600.8.58.1.noarch",
"openSUSE Leap 15.6:kernel-source-azure-6.4.0-150600.8.58.1.noarch",
"openSUSE Leap 15.6:kernel-syms-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kselftests-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-azure-6.4.0-150600.8.58.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40140",
"url": "https://www.suse.com/security/cve/CVE-2025-40140"
},
{
"category": "external",
"summary": "SUSE Bug 1253349 for CVE-2025-40140",
"url": "https://bugzilla.suse.com/1253349"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-6.4.0-150600.8.58.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-6.4.0-150600.8.58.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-devel-6.4.0-150600.8.58.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-devel-6.4.0-150600.8.58.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-devel-azure-6.4.0-150600.8.58.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-source-azure-6.4.0-150600.8.58.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-syms-azure-6.4.0-150600.8.58.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-syms-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:gfs2-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-devel-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-devel-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-extra-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-extra-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-optional-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-optional-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-vdso-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-azure-6.4.0-150600.8.58.1.noarch",
"openSUSE Leap 15.6:kernel-source-azure-6.4.0-150600.8.58.1.noarch",
"openSUSE Leap 15.6:kernel-syms-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kselftests-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-azure-6.4.0-150600.8.58.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.3,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-6.4.0-150600.8.58.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-6.4.0-150600.8.58.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-devel-6.4.0-150600.8.58.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-devel-6.4.0-150600.8.58.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-devel-azure-6.4.0-150600.8.58.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-source-azure-6.4.0-150600.8.58.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-syms-azure-6.4.0-150600.8.58.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-syms-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:gfs2-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-devel-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-devel-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-extra-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-extra-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-optional-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-optional-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-vdso-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-azure-6.4.0-150600.8.58.1.noarch",
"openSUSE Leap 15.6:kernel-source-azure-6.4.0-150600.8.58.1.noarch",
"openSUSE Leap 15.6:kernel-syms-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kselftests-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-azure-6.4.0-150600.8.58.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-22T16:35:13Z",
"details": "low"
}
],
"title": "CVE-2025-40140"
},
{
"cve": "CVE-2025-40141",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40141"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nBluetooth: ISO: Fix possible UAF on iso_conn_free\n\nThis attempt to fix similar issue to sco_conn_free where if the\nconn-\u003esk is not set to NULL may lead to UAF on iso_conn_free.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-6.4.0-150600.8.58.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-6.4.0-150600.8.58.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-devel-6.4.0-150600.8.58.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-devel-6.4.0-150600.8.58.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-devel-azure-6.4.0-150600.8.58.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-source-azure-6.4.0-150600.8.58.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-syms-azure-6.4.0-150600.8.58.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-syms-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:gfs2-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-devel-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-devel-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-extra-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-extra-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-optional-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-optional-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-vdso-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-azure-6.4.0-150600.8.58.1.noarch",
"openSUSE Leap 15.6:kernel-source-azure-6.4.0-150600.8.58.1.noarch",
"openSUSE Leap 15.6:kernel-syms-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kselftests-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-azure-6.4.0-150600.8.58.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40141",
"url": "https://www.suse.com/security/cve/CVE-2025-40141"
},
{
"category": "external",
"summary": "SUSE Bug 1253352 for CVE-2025-40141",
"url": "https://bugzilla.suse.com/1253352"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-6.4.0-150600.8.58.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-6.4.0-150600.8.58.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-devel-6.4.0-150600.8.58.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-devel-6.4.0-150600.8.58.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-devel-azure-6.4.0-150600.8.58.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-source-azure-6.4.0-150600.8.58.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-syms-azure-6.4.0-150600.8.58.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-syms-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:gfs2-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-devel-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-devel-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-extra-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-extra-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-optional-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-optional-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-vdso-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-azure-6.4.0-150600.8.58.1.noarch",
"openSUSE Leap 15.6:kernel-source-azure-6.4.0-150600.8.58.1.noarch",
"openSUSE Leap 15.6:kernel-syms-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kselftests-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-azure-6.4.0-150600.8.58.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-6.4.0-150600.8.58.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-6.4.0-150600.8.58.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-devel-6.4.0-150600.8.58.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-devel-6.4.0-150600.8.58.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-devel-azure-6.4.0-150600.8.58.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-source-azure-6.4.0-150600.8.58.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-syms-azure-6.4.0-150600.8.58.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-syms-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:gfs2-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-devel-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-devel-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-extra-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-extra-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-optional-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-optional-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-vdso-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-azure-6.4.0-150600.8.58.1.noarch",
"openSUSE Leap 15.6:kernel-source-azure-6.4.0-150600.8.58.1.noarch",
"openSUSE Leap 15.6:kernel-syms-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kselftests-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-azure-6.4.0-150600.8.58.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-22T16:35:13Z",
"details": "moderate"
}
],
"title": "CVE-2025-40141"
},
{
"cve": "CVE-2025-40149",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40149"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\ntls: Use __sk_dst_get() and dst_dev_rcu() in get_netdev_for_sock().\n\nget_netdev_for_sock() is called during setsockopt(),\nso not under RCU.\n\nUsing sk_dst_get(sk)-\u003edev could trigger UAF.\n\nLet\u0027s use __sk_dst_get() and dst_dev_rcu().\n\nNote that the only -\u003endo_sk_get_lower_dev() user is\nbond_sk_get_lower_dev(), which uses RCU.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-6.4.0-150600.8.58.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-6.4.0-150600.8.58.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-devel-6.4.0-150600.8.58.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-devel-6.4.0-150600.8.58.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-devel-azure-6.4.0-150600.8.58.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-source-azure-6.4.0-150600.8.58.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-syms-azure-6.4.0-150600.8.58.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-syms-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:gfs2-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-devel-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-devel-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-extra-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-extra-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-optional-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-optional-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-vdso-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-azure-6.4.0-150600.8.58.1.noarch",
"openSUSE Leap 15.6:kernel-source-azure-6.4.0-150600.8.58.1.noarch",
"openSUSE Leap 15.6:kernel-syms-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kselftests-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-azure-6.4.0-150600.8.58.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40149",
"url": "https://www.suse.com/security/cve/CVE-2025-40149"
},
{
"category": "external",
"summary": "SUSE Bug 1253355 for CVE-2025-40149",
"url": "https://bugzilla.suse.com/1253355"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-6.4.0-150600.8.58.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-6.4.0-150600.8.58.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-devel-6.4.0-150600.8.58.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-devel-6.4.0-150600.8.58.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-devel-azure-6.4.0-150600.8.58.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-source-azure-6.4.0-150600.8.58.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-syms-azure-6.4.0-150600.8.58.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-syms-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:gfs2-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-devel-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-devel-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-extra-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-extra-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-optional-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-optional-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-vdso-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-azure-6.4.0-150600.8.58.1.noarch",
"openSUSE Leap 15.6:kernel-source-azure-6.4.0-150600.8.58.1.noarch",
"openSUSE Leap 15.6:kernel-syms-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kselftests-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-azure-6.4.0-150600.8.58.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-6.4.0-150600.8.58.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-6.4.0-150600.8.58.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-devel-6.4.0-150600.8.58.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-devel-6.4.0-150600.8.58.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-devel-azure-6.4.0-150600.8.58.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-source-azure-6.4.0-150600.8.58.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-syms-azure-6.4.0-150600.8.58.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-syms-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:gfs2-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-devel-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-devel-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-extra-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-extra-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-optional-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-optional-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-vdso-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-azure-6.4.0-150600.8.58.1.noarch",
"openSUSE Leap 15.6:kernel-source-azure-6.4.0-150600.8.58.1.noarch",
"openSUSE Leap 15.6:kernel-syms-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kselftests-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-azure-6.4.0-150600.8.58.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-22T16:35:13Z",
"details": "moderate"
}
],
"title": "CVE-2025-40149"
},
{
"cve": "CVE-2025-40154",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40154"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nASoC: Intel: bytcr_rt5640: Fix invalid quirk input mapping\n\nWhen an invalid value is passed via quirk option, currently\nbytcr_rt5640 driver only shows an error message but leaves as is.\nThis may lead to unepxected results like OOB access.\n\nThis patch corrects the input mapping to the certain default value if\nan invalid value is passed.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-6.4.0-150600.8.58.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-6.4.0-150600.8.58.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-devel-6.4.0-150600.8.58.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-devel-6.4.0-150600.8.58.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-devel-azure-6.4.0-150600.8.58.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-source-azure-6.4.0-150600.8.58.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-syms-azure-6.4.0-150600.8.58.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-syms-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:gfs2-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-devel-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-devel-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-extra-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-extra-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-optional-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-optional-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-vdso-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-azure-6.4.0-150600.8.58.1.noarch",
"openSUSE Leap 15.6:kernel-source-azure-6.4.0-150600.8.58.1.noarch",
"openSUSE Leap 15.6:kernel-syms-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kselftests-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-azure-6.4.0-150600.8.58.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40154",
"url": "https://www.suse.com/security/cve/CVE-2025-40154"
},
{
"category": "external",
"summary": "SUSE Bug 1253431 for CVE-2025-40154",
"url": "https://bugzilla.suse.com/1253431"
},
{
"category": "external",
"summary": "SUSE Bug 1253432 for CVE-2025-40154",
"url": "https://bugzilla.suse.com/1253432"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-6.4.0-150600.8.58.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-6.4.0-150600.8.58.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-devel-6.4.0-150600.8.58.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-devel-6.4.0-150600.8.58.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-devel-azure-6.4.0-150600.8.58.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-source-azure-6.4.0-150600.8.58.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-syms-azure-6.4.0-150600.8.58.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-syms-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:gfs2-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-devel-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-devel-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-extra-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-extra-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-optional-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-optional-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-vdso-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-azure-6.4.0-150600.8.58.1.noarch",
"openSUSE Leap 15.6:kernel-source-azure-6.4.0-150600.8.58.1.noarch",
"openSUSE Leap 15.6:kernel-syms-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kselftests-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-azure-6.4.0-150600.8.58.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-6.4.0-150600.8.58.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-6.4.0-150600.8.58.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-devel-6.4.0-150600.8.58.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-devel-6.4.0-150600.8.58.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-devel-azure-6.4.0-150600.8.58.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-source-azure-6.4.0-150600.8.58.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-syms-azure-6.4.0-150600.8.58.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-syms-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:gfs2-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-devel-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-devel-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-extra-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-extra-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-optional-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-optional-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-vdso-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-azure-6.4.0-150600.8.58.1.noarch",
"openSUSE Leap 15.6:kernel-source-azure-6.4.0-150600.8.58.1.noarch",
"openSUSE Leap 15.6:kernel-syms-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kselftests-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-azure-6.4.0-150600.8.58.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-22T16:35:13Z",
"details": "moderate"
}
],
"title": "CVE-2025-40154"
},
{
"cve": "CVE-2025-40156",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40156"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nPM / devfreq: mtk-cci: Fix potential error pointer dereference in probe()\n\nThe drv-\u003esram_reg pointer could be set to ERR_PTR(-EPROBE_DEFER) which\nwould lead to a error pointer dereference. Use IS_ERR_OR_NULL() to check\nthat the pointer is valid.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-6.4.0-150600.8.58.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-6.4.0-150600.8.58.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-devel-6.4.0-150600.8.58.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-devel-6.4.0-150600.8.58.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-devel-azure-6.4.0-150600.8.58.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-source-azure-6.4.0-150600.8.58.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-syms-azure-6.4.0-150600.8.58.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-syms-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:gfs2-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-devel-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-devel-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-extra-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-extra-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-optional-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-optional-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-vdso-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-azure-6.4.0-150600.8.58.1.noarch",
"openSUSE Leap 15.6:kernel-source-azure-6.4.0-150600.8.58.1.noarch",
"openSUSE Leap 15.6:kernel-syms-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kselftests-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-azure-6.4.0-150600.8.58.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40156",
"url": "https://www.suse.com/security/cve/CVE-2025-40156"
},
{
"category": "external",
"summary": "SUSE Bug 1253428 for CVE-2025-40156",
"url": "https://bugzilla.suse.com/1253428"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-6.4.0-150600.8.58.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-6.4.0-150600.8.58.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-devel-6.4.0-150600.8.58.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-devel-6.4.0-150600.8.58.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-devel-azure-6.4.0-150600.8.58.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-source-azure-6.4.0-150600.8.58.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-syms-azure-6.4.0-150600.8.58.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-syms-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:gfs2-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-devel-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-devel-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-extra-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-extra-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-optional-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-optional-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-vdso-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-azure-6.4.0-150600.8.58.1.noarch",
"openSUSE Leap 15.6:kernel-source-azure-6.4.0-150600.8.58.1.noarch",
"openSUSE Leap 15.6:kernel-syms-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kselftests-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-azure-6.4.0-150600.8.58.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-6.4.0-150600.8.58.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-6.4.0-150600.8.58.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-devel-6.4.0-150600.8.58.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-devel-6.4.0-150600.8.58.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-devel-azure-6.4.0-150600.8.58.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-source-azure-6.4.0-150600.8.58.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-syms-azure-6.4.0-150600.8.58.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-syms-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:gfs2-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-devel-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-devel-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-extra-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-extra-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-optional-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-optional-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-vdso-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-azure-6.4.0-150600.8.58.1.noarch",
"openSUSE Leap 15.6:kernel-source-azure-6.4.0-150600.8.58.1.noarch",
"openSUSE Leap 15.6:kernel-syms-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kselftests-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-azure-6.4.0-150600.8.58.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-22T16:35:13Z",
"details": "moderate"
}
],
"title": "CVE-2025-40156"
},
{
"cve": "CVE-2025-40157",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40157"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nEDAC/i10nm: Skip DIMM enumeration on a disabled memory controller\n\nWhen loading the i10nm_edac driver on some Intel Granite Rapids servers,\na call trace may appear as follows:\n\n UBSAN: shift-out-of-bounds in drivers/edac/skx_common.c:453:16\n shift exponent -66 is negative\n ...\n __ubsan_handle_shift_out_of_bounds+0x1e3/0x390\n skx_get_dimm_info.cold+0x47/0xd40 [skx_edac_common]\n i10nm_get_dimm_config+0x23e/0x390 [i10nm_edac]\n skx_register_mci+0x159/0x220 [skx_edac_common]\n i10nm_init+0xcb0/0x1ff0 [i10nm_edac]\n ...\n\nThis occurs because some BIOS may disable a memory controller if there\naren\u0027t any memory DIMMs populated on this memory controller. The DIMMMTR\nregister of this disabled memory controller contains the invalid value\n~0, resulting in the call trace above.\n\nFix this call trace by skipping DIMM enumeration on a disabled memory\ncontroller.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-6.4.0-150600.8.58.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-6.4.0-150600.8.58.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-devel-6.4.0-150600.8.58.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-devel-6.4.0-150600.8.58.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-devel-azure-6.4.0-150600.8.58.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-source-azure-6.4.0-150600.8.58.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-syms-azure-6.4.0-150600.8.58.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-syms-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:gfs2-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-devel-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-devel-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-extra-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-extra-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-optional-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-optional-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-vdso-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-azure-6.4.0-150600.8.58.1.noarch",
"openSUSE Leap 15.6:kernel-source-azure-6.4.0-150600.8.58.1.noarch",
"openSUSE Leap 15.6:kernel-syms-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kselftests-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-azure-6.4.0-150600.8.58.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40157",
"url": "https://www.suse.com/security/cve/CVE-2025-40157"
},
{
"category": "external",
"summary": "SUSE Bug 1253423 for CVE-2025-40157",
"url": "https://bugzilla.suse.com/1253423"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-6.4.0-150600.8.58.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-6.4.0-150600.8.58.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-devel-6.4.0-150600.8.58.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-devel-6.4.0-150600.8.58.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-devel-azure-6.4.0-150600.8.58.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-source-azure-6.4.0-150600.8.58.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-syms-azure-6.4.0-150600.8.58.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-syms-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:gfs2-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-devel-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-devel-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-extra-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-extra-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-optional-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-optional-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-vdso-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-azure-6.4.0-150600.8.58.1.noarch",
"openSUSE Leap 15.6:kernel-source-azure-6.4.0-150600.8.58.1.noarch",
"openSUSE Leap 15.6:kernel-syms-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kselftests-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-azure-6.4.0-150600.8.58.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.2,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:L/I:L/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-6.4.0-150600.8.58.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-6.4.0-150600.8.58.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-devel-6.4.0-150600.8.58.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-devel-6.4.0-150600.8.58.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-devel-azure-6.4.0-150600.8.58.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-source-azure-6.4.0-150600.8.58.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-syms-azure-6.4.0-150600.8.58.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-syms-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:gfs2-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-devel-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-devel-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-extra-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-extra-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-optional-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-optional-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-vdso-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-azure-6.4.0-150600.8.58.1.noarch",
"openSUSE Leap 15.6:kernel-source-azure-6.4.0-150600.8.58.1.noarch",
"openSUSE Leap 15.6:kernel-syms-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kselftests-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-azure-6.4.0-150600.8.58.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-22T16:35:13Z",
"details": "moderate"
}
],
"title": "CVE-2025-40157"
},
{
"cve": "CVE-2025-40159",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40159"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nxsk: Harden userspace-supplied xdp_desc validation\n\nTurned out certain clearly invalid values passed in xdp_desc from\nuserspace can pass xp_{,un}aligned_validate_desc() and then lead\nto UBs or just invalid frames to be queued for xmit.\n\ndesc-\u003elen close to ``U32_MAX`` with a non-zero pool-\u003etx_metadata_len\ncan cause positive integer overflow and wraparound, the same way low\nenough desc-\u003eaddr with a non-zero pool-\u003etx_metadata_len can cause\nnegative integer overflow. Both scenarios can then pass the\nvalidation successfully.\nThis doesn\u0027t happen with valid XSk applications, but can be used\nto perform attacks.\n\nAlways promote desc-\u003elen to ``u64`` first to exclude positive\noverflows of it. Use explicit check_{add,sub}_overflow() when\nvalidating desc-\u003eaddr (which is ``u64`` already).\n\nbloat-o-meter reports a little growth of the code size:\n\nadd/remove: 0/0 grow/shrink: 2/1 up/down: 60/-16 (44)\nFunction old new delta\nxskq_cons_peek_desc 299 330 +31\nxsk_tx_peek_release_desc_batch 973 1002 +29\nxsk_generic_xmit 3148 3132 -16\n\nbut hopefully this doesn\u0027t hurt the performance much.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-6.4.0-150600.8.58.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-6.4.0-150600.8.58.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-devel-6.4.0-150600.8.58.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-devel-6.4.0-150600.8.58.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-devel-azure-6.4.0-150600.8.58.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-source-azure-6.4.0-150600.8.58.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-syms-azure-6.4.0-150600.8.58.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-syms-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:gfs2-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-devel-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-devel-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-extra-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-extra-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-optional-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-optional-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-vdso-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-azure-6.4.0-150600.8.58.1.noarch",
"openSUSE Leap 15.6:kernel-source-azure-6.4.0-150600.8.58.1.noarch",
"openSUSE Leap 15.6:kernel-syms-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kselftests-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-azure-6.4.0-150600.8.58.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40159",
"url": "https://www.suse.com/security/cve/CVE-2025-40159"
},
{
"category": "external",
"summary": "SUSE Bug 1253403 for CVE-2025-40159",
"url": "https://bugzilla.suse.com/1253403"
},
{
"category": "external",
"summary": "SUSE Bug 1253404 for CVE-2025-40159",
"url": "https://bugzilla.suse.com/1253404"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-6.4.0-150600.8.58.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-6.4.0-150600.8.58.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-devel-6.4.0-150600.8.58.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-devel-6.4.0-150600.8.58.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-devel-azure-6.4.0-150600.8.58.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-source-azure-6.4.0-150600.8.58.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-syms-azure-6.4.0-150600.8.58.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-syms-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:gfs2-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-devel-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-devel-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-extra-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-extra-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-optional-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-optional-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-vdso-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-azure-6.4.0-150600.8.58.1.noarch",
"openSUSE Leap 15.6:kernel-source-azure-6.4.0-150600.8.58.1.noarch",
"openSUSE Leap 15.6:kernel-syms-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kselftests-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-azure-6.4.0-150600.8.58.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-6.4.0-150600.8.58.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-6.4.0-150600.8.58.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-devel-6.4.0-150600.8.58.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-devel-6.4.0-150600.8.58.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-devel-azure-6.4.0-150600.8.58.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-source-azure-6.4.0-150600.8.58.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-syms-azure-6.4.0-150600.8.58.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-syms-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:gfs2-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-devel-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-devel-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-extra-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-extra-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-optional-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-optional-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-vdso-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-azure-6.4.0-150600.8.58.1.noarch",
"openSUSE Leap 15.6:kernel-source-azure-6.4.0-150600.8.58.1.noarch",
"openSUSE Leap 15.6:kernel-syms-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kselftests-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-azure-6.4.0-150600.8.58.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-22T16:35:13Z",
"details": "important"
}
],
"title": "CVE-2025-40159"
},
{
"cve": "CVE-2025-40164",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40164"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nusbnet: Fix using smp_processor_id() in preemptible code warnings\n\nSyzbot reported the following warning:\n\nBUG: using smp_processor_id() in preemptible [00000000] code: dhcpcd/2879\ncaller is usbnet_skb_return+0x74/0x490 drivers/net/usb/usbnet.c:331\nCPU: 1 UID: 0 PID: 2879 Comm: dhcpcd Not tainted 6.15.0-rc4-syzkaller-00098-g615dca38c2ea #0 PREEMPT(voluntary)\nCall Trace:\n \u003cTASK\u003e\n __dump_stack lib/dump_stack.c:94 [inline]\n dump_stack_lvl+0x16c/0x1f0 lib/dump_stack.c:120\n check_preemption_disabled+0xd0/0xe0 lib/smp_processor_id.c:49\n usbnet_skb_return+0x74/0x490 drivers/net/usb/usbnet.c:331\n usbnet_resume_rx+0x4b/0x170 drivers/net/usb/usbnet.c:708\n usbnet_change_mtu+0x1be/0x220 drivers/net/usb/usbnet.c:417\n __dev_set_mtu net/core/dev.c:9443 [inline]\n netif_set_mtu_ext+0x369/0x5c0 net/core/dev.c:9496\n netif_set_mtu+0xb0/0x160 net/core/dev.c:9520\n dev_set_mtu+0xae/0x170 net/core/dev_api.c:247\n dev_ifsioc+0xa31/0x18d0 net/core/dev_ioctl.c:572\n dev_ioctl+0x223/0x10e0 net/core/dev_ioctl.c:821\n sock_do_ioctl+0x19d/0x280 net/socket.c:1204\n sock_ioctl+0x42f/0x6a0 net/socket.c:1311\n vfs_ioctl fs/ioctl.c:51 [inline]\n __do_sys_ioctl fs/ioctl.c:906 [inline]\n __se_sys_ioctl fs/ioctl.c:892 [inline]\n __x64_sys_ioctl+0x190/0x200 fs/ioctl.c:892\n do_syscall_x64 arch/x86/entry/syscall_64.c:63 [inline]\n do_syscall_64+0xcd/0x260 arch/x86/entry/syscall_64.c:94\n entry_SYSCALL_64_after_hwframe+0x77/0x7f\n\nFor historical and portability reasons, the netif_rx() is usually\nrun in the softirq or interrupt context, this commit therefore add\nlocal_bh_disable/enable() protection in the usbnet_resume_rx().",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-6.4.0-150600.8.58.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-6.4.0-150600.8.58.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-devel-6.4.0-150600.8.58.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-devel-6.4.0-150600.8.58.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-devel-azure-6.4.0-150600.8.58.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-source-azure-6.4.0-150600.8.58.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-syms-azure-6.4.0-150600.8.58.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-syms-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:gfs2-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-devel-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-devel-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-extra-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-extra-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-optional-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-optional-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-vdso-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-azure-6.4.0-150600.8.58.1.noarch",
"openSUSE Leap 15.6:kernel-source-azure-6.4.0-150600.8.58.1.noarch",
"openSUSE Leap 15.6:kernel-syms-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kselftests-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-azure-6.4.0-150600.8.58.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40164",
"url": "https://www.suse.com/security/cve/CVE-2025-40164"
},
{
"category": "external",
"summary": "SUSE Bug 1253407 for CVE-2025-40164",
"url": "https://bugzilla.suse.com/1253407"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-6.4.0-150600.8.58.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-6.4.0-150600.8.58.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-devel-6.4.0-150600.8.58.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-devel-6.4.0-150600.8.58.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-devel-azure-6.4.0-150600.8.58.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-source-azure-6.4.0-150600.8.58.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-syms-azure-6.4.0-150600.8.58.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-syms-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:gfs2-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-devel-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-devel-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-extra-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-extra-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-optional-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-optional-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-vdso-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-azure-6.4.0-150600.8.58.1.noarch",
"openSUSE Leap 15.6:kernel-source-azure-6.4.0-150600.8.58.1.noarch",
"openSUSE Leap 15.6:kernel-syms-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kselftests-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-azure-6.4.0-150600.8.58.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.7,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-6.4.0-150600.8.58.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-6.4.0-150600.8.58.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-devel-6.4.0-150600.8.58.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-devel-6.4.0-150600.8.58.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-devel-azure-6.4.0-150600.8.58.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-source-azure-6.4.0-150600.8.58.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-syms-azure-6.4.0-150600.8.58.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-syms-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:gfs2-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-devel-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-devel-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-extra-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-extra-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-optional-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-optional-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-vdso-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-azure-6.4.0-150600.8.58.1.noarch",
"openSUSE Leap 15.6:kernel-source-azure-6.4.0-150600.8.58.1.noarch",
"openSUSE Leap 15.6:kernel-syms-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kselftests-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-azure-6.4.0-150600.8.58.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-22T16:35:13Z",
"details": "moderate"
}
],
"title": "CVE-2025-40164"
},
{
"cve": "CVE-2025-40168",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40168"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nsmc: Use __sk_dst_get() and dst_dev_rcu() in smc_clc_prfx_match().\n\nsmc_clc_prfx_match() is called from smc_listen_work() and\nnot under RCU nor RTNL.\n\nUsing sk_dst_get(sk)-\u003edev could trigger UAF.\n\nLet\u0027s use __sk_dst_get() and dst_dev_rcu().\n\nNote that the returned value of smc_clc_prfx_match() is not\nused in the caller.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-6.4.0-150600.8.58.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-6.4.0-150600.8.58.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-devel-6.4.0-150600.8.58.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-devel-6.4.0-150600.8.58.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-devel-azure-6.4.0-150600.8.58.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-source-azure-6.4.0-150600.8.58.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-syms-azure-6.4.0-150600.8.58.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-syms-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:gfs2-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-devel-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-devel-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-extra-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-extra-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-optional-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-optional-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-vdso-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-azure-6.4.0-150600.8.58.1.noarch",
"openSUSE Leap 15.6:kernel-source-azure-6.4.0-150600.8.58.1.noarch",
"openSUSE Leap 15.6:kernel-syms-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kselftests-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-azure-6.4.0-150600.8.58.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40168",
"url": "https://www.suse.com/security/cve/CVE-2025-40168"
},
{
"category": "external",
"summary": "SUSE Bug 1253427 for CVE-2025-40168",
"url": "https://bugzilla.suse.com/1253427"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-6.4.0-150600.8.58.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-6.4.0-150600.8.58.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-devel-6.4.0-150600.8.58.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-devel-6.4.0-150600.8.58.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-devel-azure-6.4.0-150600.8.58.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-source-azure-6.4.0-150600.8.58.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-syms-azure-6.4.0-150600.8.58.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-syms-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:gfs2-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-devel-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-devel-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-extra-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-extra-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-optional-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-optional-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-vdso-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-azure-6.4.0-150600.8.58.1.noarch",
"openSUSE Leap 15.6:kernel-source-azure-6.4.0-150600.8.58.1.noarch",
"openSUSE Leap 15.6:kernel-syms-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kselftests-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-azure-6.4.0-150600.8.58.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-6.4.0-150600.8.58.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-6.4.0-150600.8.58.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-devel-6.4.0-150600.8.58.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-devel-6.4.0-150600.8.58.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-devel-azure-6.4.0-150600.8.58.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-source-azure-6.4.0-150600.8.58.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-syms-azure-6.4.0-150600.8.58.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-syms-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:gfs2-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-devel-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-devel-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-extra-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-extra-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-optional-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-optional-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-vdso-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-azure-6.4.0-150600.8.58.1.noarch",
"openSUSE Leap 15.6:kernel-source-azure-6.4.0-150600.8.58.1.noarch",
"openSUSE Leap 15.6:kernel-syms-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kselftests-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-azure-6.4.0-150600.8.58.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-22T16:35:13Z",
"details": "moderate"
}
],
"title": "CVE-2025-40168"
},
{
"cve": "CVE-2025-40169",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40169"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nbpf: Reject negative offsets for ALU ops\n\nWhen verifying BPF programs, the check_alu_op() function validates\ninstructions with ALU operations. The \u0027offset\u0027 field in these\ninstructions is a signed 16-bit integer.\n\nThe existing check \u0027insn-\u003eoff \u003e 1\u0027 was intended to ensure the offset is\neither 0, or 1 for BPF_MOD/BPF_DIV. However, because \u0027insn-\u003eoff\u0027 is\nsigned, this check incorrectly accepts all negative values (e.g., -1).\n\nThis commit tightens the validation by changing the condition to\n\u0027(insn-\u003eoff != 0 \u0026\u0026 insn-\u003eoff != 1)\u0027. This ensures that any value\nother than the explicitly permitted 0 and 1 is rejected, hardening the\nverifier against malformed BPF programs.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-6.4.0-150600.8.58.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-6.4.0-150600.8.58.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-devel-6.4.0-150600.8.58.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-devel-6.4.0-150600.8.58.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-devel-azure-6.4.0-150600.8.58.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-source-azure-6.4.0-150600.8.58.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-syms-azure-6.4.0-150600.8.58.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-syms-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:gfs2-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-devel-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-devel-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-extra-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-extra-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-optional-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-optional-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-vdso-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-azure-6.4.0-150600.8.58.1.noarch",
"openSUSE Leap 15.6:kernel-source-azure-6.4.0-150600.8.58.1.noarch",
"openSUSE Leap 15.6:kernel-syms-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kselftests-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-azure-6.4.0-150600.8.58.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40169",
"url": "https://www.suse.com/security/cve/CVE-2025-40169"
},
{
"category": "external",
"summary": "SUSE Bug 1253416 for CVE-2025-40169",
"url": "https://bugzilla.suse.com/1253416"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-6.4.0-150600.8.58.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-6.4.0-150600.8.58.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-devel-6.4.0-150600.8.58.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-devel-6.4.0-150600.8.58.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-devel-azure-6.4.0-150600.8.58.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-source-azure-6.4.0-150600.8.58.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-syms-azure-6.4.0-150600.8.58.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-syms-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:gfs2-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-devel-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-devel-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-extra-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-extra-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-optional-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-optional-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-vdso-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-azure-6.4.0-150600.8.58.1.noarch",
"openSUSE Leap 15.6:kernel-source-azure-6.4.0-150600.8.58.1.noarch",
"openSUSE Leap 15.6:kernel-syms-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kselftests-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-azure-6.4.0-150600.8.58.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.8,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-6.4.0-150600.8.58.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-6.4.0-150600.8.58.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-devel-6.4.0-150600.8.58.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-devel-6.4.0-150600.8.58.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-devel-azure-6.4.0-150600.8.58.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-source-azure-6.4.0-150600.8.58.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-syms-azure-6.4.0-150600.8.58.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-syms-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:gfs2-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-devel-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-devel-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-extra-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-extra-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-optional-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-optional-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-vdso-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-azure-6.4.0-150600.8.58.1.noarch",
"openSUSE Leap 15.6:kernel-source-azure-6.4.0-150600.8.58.1.noarch",
"openSUSE Leap 15.6:kernel-syms-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kselftests-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-azure-6.4.0-150600.8.58.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-22T16:35:13Z",
"details": "moderate"
}
],
"title": "CVE-2025-40169"
},
{
"cve": "CVE-2025-40171",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40171"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnvmet-fc: move lsop put work to nvmet_fc_ls_req_op\n\nIt\u0027s possible for more than one async command to be in flight from\n__nvmet_fc_send_ls_req. For each command, a tgtport reference is taken.\n\nIn the current code, only one put work item is queued at a time, which\nresults in a leaked reference.\n\nTo fix this, move the work item to the nvmet_fc_ls_req_op struct, which\nalready tracks all resources related to the command.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-6.4.0-150600.8.58.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-6.4.0-150600.8.58.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-devel-6.4.0-150600.8.58.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-devel-6.4.0-150600.8.58.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-devel-azure-6.4.0-150600.8.58.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-source-azure-6.4.0-150600.8.58.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-syms-azure-6.4.0-150600.8.58.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-syms-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:gfs2-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-devel-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-devel-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-extra-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-extra-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-optional-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-optional-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-vdso-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-azure-6.4.0-150600.8.58.1.noarch",
"openSUSE Leap 15.6:kernel-source-azure-6.4.0-150600.8.58.1.noarch",
"openSUSE Leap 15.6:kernel-syms-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kselftests-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-azure-6.4.0-150600.8.58.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40171",
"url": "https://www.suse.com/security/cve/CVE-2025-40171"
},
{
"category": "external",
"summary": "SUSE Bug 1253412 for CVE-2025-40171",
"url": "https://bugzilla.suse.com/1253412"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-6.4.0-150600.8.58.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-6.4.0-150600.8.58.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-devel-6.4.0-150600.8.58.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-devel-6.4.0-150600.8.58.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-devel-azure-6.4.0-150600.8.58.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-source-azure-6.4.0-150600.8.58.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-syms-azure-6.4.0-150600.8.58.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-syms-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:gfs2-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-devel-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-devel-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-extra-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-extra-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-optional-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-optional-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-vdso-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-azure-6.4.0-150600.8.58.1.noarch",
"openSUSE Leap 15.6:kernel-source-azure-6.4.0-150600.8.58.1.noarch",
"openSUSE Leap 15.6:kernel-syms-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kselftests-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-azure-6.4.0-150600.8.58.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-6.4.0-150600.8.58.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-6.4.0-150600.8.58.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-devel-6.4.0-150600.8.58.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-devel-6.4.0-150600.8.58.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-devel-azure-6.4.0-150600.8.58.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-source-azure-6.4.0-150600.8.58.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-syms-azure-6.4.0-150600.8.58.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-syms-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:gfs2-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-devel-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-devel-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-extra-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-extra-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-optional-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-optional-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-vdso-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-azure-6.4.0-150600.8.58.1.noarch",
"openSUSE Leap 15.6:kernel-source-azure-6.4.0-150600.8.58.1.noarch",
"openSUSE Leap 15.6:kernel-syms-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kselftests-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-azure-6.4.0-150600.8.58.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-22T16:35:13Z",
"details": "moderate"
}
],
"title": "CVE-2025-40171"
},
{
"cve": "CVE-2025-40172",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40172"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\naccel/qaic: Treat remaining == 0 as error in find_and_map_user_pages()\n\nCurrently, if find_and_map_user_pages() takes a DMA xfer request from the\nuser with a length field set to 0, or in a rare case, the host receives\nQAIC_TRANS_DMA_XFER_CONT from the device where resources-\u003exferred_dma_size\nis equal to the requested transaction size, the function will return 0\nbefore allocating an sgt or setting the fields of the dma_xfer struct.\nIn that case, encode_addr_size_pairs() will try to access the sgt which\nwill lead to a general protection fault.\n\nReturn an EINVAL in case the user provides a zero-sized ALP, or the device\nrequests continuation after all of the bytes have been transferred.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-6.4.0-150600.8.58.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-6.4.0-150600.8.58.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-devel-6.4.0-150600.8.58.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-devel-6.4.0-150600.8.58.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-devel-azure-6.4.0-150600.8.58.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-source-azure-6.4.0-150600.8.58.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-syms-azure-6.4.0-150600.8.58.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-syms-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:gfs2-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-devel-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-devel-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-extra-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-extra-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-optional-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-optional-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-vdso-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-azure-6.4.0-150600.8.58.1.noarch",
"openSUSE Leap 15.6:kernel-source-azure-6.4.0-150600.8.58.1.noarch",
"openSUSE Leap 15.6:kernel-syms-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kselftests-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-azure-6.4.0-150600.8.58.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40172",
"url": "https://www.suse.com/security/cve/CVE-2025-40172"
},
{
"category": "external",
"summary": "SUSE Bug 1253424 for CVE-2025-40172",
"url": "https://bugzilla.suse.com/1253424"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-6.4.0-150600.8.58.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-6.4.0-150600.8.58.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-devel-6.4.0-150600.8.58.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-devel-6.4.0-150600.8.58.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-devel-azure-6.4.0-150600.8.58.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-source-azure-6.4.0-150600.8.58.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-syms-azure-6.4.0-150600.8.58.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-syms-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:gfs2-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-devel-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-devel-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-extra-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-extra-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-optional-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-optional-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-vdso-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-azure-6.4.0-150600.8.58.1.noarch",
"openSUSE Leap 15.6:kernel-source-azure-6.4.0-150600.8.58.1.noarch",
"openSUSE Leap 15.6:kernel-syms-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kselftests-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-azure-6.4.0-150600.8.58.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-6.4.0-150600.8.58.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-6.4.0-150600.8.58.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-devel-6.4.0-150600.8.58.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-devel-6.4.0-150600.8.58.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-devel-azure-6.4.0-150600.8.58.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-source-azure-6.4.0-150600.8.58.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-syms-azure-6.4.0-150600.8.58.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-syms-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:gfs2-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-devel-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-devel-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-extra-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-extra-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-optional-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-optional-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-vdso-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-azure-6.4.0-150600.8.58.1.noarch",
"openSUSE Leap 15.6:kernel-source-azure-6.4.0-150600.8.58.1.noarch",
"openSUSE Leap 15.6:kernel-syms-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kselftests-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-azure-6.4.0-150600.8.58.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-22T16:35:13Z",
"details": "moderate"
}
],
"title": "CVE-2025-40172"
},
{
"cve": "CVE-2025-40173",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40173"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnet/ip6_tunnel: Prevent perpetual tunnel growth\n\nSimilarly to ipv4 tunnel, ipv6 version updates dev-\u003eneeded_headroom, too.\nWhile ipv4 tunnel headroom adjustment growth was limited in\ncommit 5ae1e9922bbd (\"net: ip_tunnel: prevent perpetual headroom growth\"),\nipv6 tunnel yet increases the headroom without any ceiling.\n\nReflect ipv4 tunnel headroom adjustment limit on ipv6 version.\n\nCredits to Francesco Ruggeri, who was originally debugging this issue\nand wrote local Arista-specific patch and a reproducer.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-6.4.0-150600.8.58.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-6.4.0-150600.8.58.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-devel-6.4.0-150600.8.58.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-devel-6.4.0-150600.8.58.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-devel-azure-6.4.0-150600.8.58.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-source-azure-6.4.0-150600.8.58.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-syms-azure-6.4.0-150600.8.58.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-syms-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:gfs2-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-devel-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-devel-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-extra-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-extra-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-optional-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-optional-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-vdso-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-azure-6.4.0-150600.8.58.1.noarch",
"openSUSE Leap 15.6:kernel-source-azure-6.4.0-150600.8.58.1.noarch",
"openSUSE Leap 15.6:kernel-syms-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kselftests-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-azure-6.4.0-150600.8.58.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40173",
"url": "https://www.suse.com/security/cve/CVE-2025-40173"
},
{
"category": "external",
"summary": "SUSE Bug 1253421 for CVE-2025-40173",
"url": "https://bugzilla.suse.com/1253421"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-6.4.0-150600.8.58.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-6.4.0-150600.8.58.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-devel-6.4.0-150600.8.58.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-devel-6.4.0-150600.8.58.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-devel-azure-6.4.0-150600.8.58.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-source-azure-6.4.0-150600.8.58.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-syms-azure-6.4.0-150600.8.58.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-syms-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:gfs2-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-devel-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-devel-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-extra-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-extra-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-optional-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-optional-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-vdso-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-azure-6.4.0-150600.8.58.1.noarch",
"openSUSE Leap 15.6:kernel-source-azure-6.4.0-150600.8.58.1.noarch",
"openSUSE Leap 15.6:kernel-syms-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kselftests-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-azure-6.4.0-150600.8.58.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.7,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-6.4.0-150600.8.58.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-6.4.0-150600.8.58.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-devel-6.4.0-150600.8.58.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-devel-6.4.0-150600.8.58.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-devel-azure-6.4.0-150600.8.58.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-source-azure-6.4.0-150600.8.58.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-syms-azure-6.4.0-150600.8.58.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-syms-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:gfs2-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-devel-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-devel-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-extra-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-extra-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-optional-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-optional-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-vdso-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-azure-6.4.0-150600.8.58.1.noarch",
"openSUSE Leap 15.6:kernel-source-azure-6.4.0-150600.8.58.1.noarch",
"openSUSE Leap 15.6:kernel-syms-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kselftests-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-azure-6.4.0-150600.8.58.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-22T16:35:13Z",
"details": "moderate"
}
],
"title": "CVE-2025-40173"
},
{
"cve": "CVE-2025-40176",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40176"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\ntls: wait for pending async decryptions if tls_strp_msg_hold fails\n\nAsync decryption calls tls_strp_msg_hold to create a clone of the\ninput skb to hold references to the memory it uses. If we fail to\nallocate that clone, proceeding with async decryption can lead to\nvarious issues (UAF on the skb, writing into userspace memory after\nthe recv() call has returned).\n\nIn this case, wait for all pending decryption requests.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-6.4.0-150600.8.58.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-6.4.0-150600.8.58.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-devel-6.4.0-150600.8.58.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-devel-6.4.0-150600.8.58.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-devel-azure-6.4.0-150600.8.58.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-source-azure-6.4.0-150600.8.58.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-syms-azure-6.4.0-150600.8.58.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-syms-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:gfs2-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-devel-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-devel-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-extra-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-extra-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-optional-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-optional-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-vdso-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-azure-6.4.0-150600.8.58.1.noarch",
"openSUSE Leap 15.6:kernel-source-azure-6.4.0-150600.8.58.1.noarch",
"openSUSE Leap 15.6:kernel-syms-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kselftests-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-azure-6.4.0-150600.8.58.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40176",
"url": "https://www.suse.com/security/cve/CVE-2025-40176"
},
{
"category": "external",
"summary": "SUSE Bug 1253425 for CVE-2025-40176",
"url": "https://bugzilla.suse.com/1253425"
},
{
"category": "external",
"summary": "SUSE Bug 1254100 for CVE-2025-40176",
"url": "https://bugzilla.suse.com/1254100"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-6.4.0-150600.8.58.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-6.4.0-150600.8.58.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-devel-6.4.0-150600.8.58.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-devel-6.4.0-150600.8.58.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-devel-azure-6.4.0-150600.8.58.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-source-azure-6.4.0-150600.8.58.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-syms-azure-6.4.0-150600.8.58.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-syms-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:gfs2-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-devel-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-devel-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-extra-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-extra-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-optional-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-optional-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-vdso-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-azure-6.4.0-150600.8.58.1.noarch",
"openSUSE Leap 15.6:kernel-source-azure-6.4.0-150600.8.58.1.noarch",
"openSUSE Leap 15.6:kernel-syms-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kselftests-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-azure-6.4.0-150600.8.58.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-6.4.0-150600.8.58.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-6.4.0-150600.8.58.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-devel-6.4.0-150600.8.58.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-devel-6.4.0-150600.8.58.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-devel-azure-6.4.0-150600.8.58.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-source-azure-6.4.0-150600.8.58.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-syms-azure-6.4.0-150600.8.58.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-syms-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:gfs2-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-devel-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-devel-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-extra-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-extra-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-optional-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-optional-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-vdso-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-azure-6.4.0-150600.8.58.1.noarch",
"openSUSE Leap 15.6:kernel-source-azure-6.4.0-150600.8.58.1.noarch",
"openSUSE Leap 15.6:kernel-syms-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kselftests-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-azure-6.4.0-150600.8.58.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-22T16:35:13Z",
"details": "important"
}
],
"title": "CVE-2025-40176"
},
{
"cve": "CVE-2025-40180",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40180"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nmailbox: zynqmp-ipi: Fix out-of-bounds access in mailbox cleanup loop\n\nThe cleanup loop was starting at the wrong array index, causing\nout-of-bounds access.\nStart the loop at the correct index for zero-indexed arrays to prevent\naccessing memory beyond the allocated array bounds.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-6.4.0-150600.8.58.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-6.4.0-150600.8.58.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-devel-6.4.0-150600.8.58.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-devel-6.4.0-150600.8.58.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-devel-azure-6.4.0-150600.8.58.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-source-azure-6.4.0-150600.8.58.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-syms-azure-6.4.0-150600.8.58.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-syms-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:gfs2-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-devel-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-devel-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-extra-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-extra-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-optional-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-optional-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-vdso-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-azure-6.4.0-150600.8.58.1.noarch",
"openSUSE Leap 15.6:kernel-source-azure-6.4.0-150600.8.58.1.noarch",
"openSUSE Leap 15.6:kernel-syms-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kselftests-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-azure-6.4.0-150600.8.58.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40180",
"url": "https://www.suse.com/security/cve/CVE-2025-40180"
},
{
"category": "external",
"summary": "SUSE Bug 1253440 for CVE-2025-40180",
"url": "https://bugzilla.suse.com/1253440"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-6.4.0-150600.8.58.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-6.4.0-150600.8.58.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-devel-6.4.0-150600.8.58.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-devel-6.4.0-150600.8.58.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-devel-azure-6.4.0-150600.8.58.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-source-azure-6.4.0-150600.8.58.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-syms-azure-6.4.0-150600.8.58.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-syms-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:gfs2-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-devel-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-devel-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-extra-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-extra-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-optional-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-optional-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-vdso-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-azure-6.4.0-150600.8.58.1.noarch",
"openSUSE Leap 15.6:kernel-source-azure-6.4.0-150600.8.58.1.noarch",
"openSUSE Leap 15.6:kernel-syms-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kselftests-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-azure-6.4.0-150600.8.58.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-6.4.0-150600.8.58.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-6.4.0-150600.8.58.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-devel-6.4.0-150600.8.58.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-devel-6.4.0-150600.8.58.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-devel-azure-6.4.0-150600.8.58.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-source-azure-6.4.0-150600.8.58.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-syms-azure-6.4.0-150600.8.58.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-syms-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:gfs2-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-devel-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-devel-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-extra-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-extra-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-optional-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-optional-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-vdso-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-azure-6.4.0-150600.8.58.1.noarch",
"openSUSE Leap 15.6:kernel-source-azure-6.4.0-150600.8.58.1.noarch",
"openSUSE Leap 15.6:kernel-syms-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kselftests-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-azure-6.4.0-150600.8.58.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-22T16:35:13Z",
"details": "moderate"
}
],
"title": "CVE-2025-40180"
},
{
"cve": "CVE-2025-40183",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40183"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nbpf: Fix metadata_dst leak __bpf_redirect_neigh_v{4,6}\n\nCilium has a BPF egress gateway feature which forces outgoing K8s Pod\ntraffic to pass through dedicated egress gateways which then SNAT the\ntraffic in order to interact with stable IPs outside the cluster.\n\nThe traffic is directed to the gateway via vxlan tunnel in collect md\nmode. A recent BPF change utilized the bpf_redirect_neigh() helper to\nforward packets after the arrival and decap on vxlan, which turned out\nover time that the kmalloc-256 slab usage in kernel was ever-increasing.\n\nThe issue was that vxlan allocates the metadata_dst object and attaches\nit through a fake dst entry to the skb. The latter was never released\nthough given bpf_redirect_neigh() was merely setting the new dst entry\nvia skb_dst_set() without dropping an existing one first.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-6.4.0-150600.8.58.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-6.4.0-150600.8.58.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-devel-6.4.0-150600.8.58.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-devel-6.4.0-150600.8.58.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-devel-azure-6.4.0-150600.8.58.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-source-azure-6.4.0-150600.8.58.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-syms-azure-6.4.0-150600.8.58.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-syms-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:gfs2-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-devel-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-devel-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-extra-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-extra-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-optional-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-optional-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-vdso-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-azure-6.4.0-150600.8.58.1.noarch",
"openSUSE Leap 15.6:kernel-source-azure-6.4.0-150600.8.58.1.noarch",
"openSUSE Leap 15.6:kernel-syms-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kselftests-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-azure-6.4.0-150600.8.58.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40183",
"url": "https://www.suse.com/security/cve/CVE-2025-40183"
},
{
"category": "external",
"summary": "SUSE Bug 1253441 for CVE-2025-40183",
"url": "https://bugzilla.suse.com/1253441"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-6.4.0-150600.8.58.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-6.4.0-150600.8.58.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-devel-6.4.0-150600.8.58.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-devel-6.4.0-150600.8.58.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-devel-azure-6.4.0-150600.8.58.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-source-azure-6.4.0-150600.8.58.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-syms-azure-6.4.0-150600.8.58.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-syms-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:gfs2-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-devel-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-devel-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-extra-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-extra-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-optional-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-optional-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-vdso-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-azure-6.4.0-150600.8.58.1.noarch",
"openSUSE Leap 15.6:kernel-source-azure-6.4.0-150600.8.58.1.noarch",
"openSUSE Leap 15.6:kernel-syms-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kselftests-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-azure-6.4.0-150600.8.58.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-6.4.0-150600.8.58.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-6.4.0-150600.8.58.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-devel-6.4.0-150600.8.58.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-devel-6.4.0-150600.8.58.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-devel-azure-6.4.0-150600.8.58.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-source-azure-6.4.0-150600.8.58.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-syms-azure-6.4.0-150600.8.58.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-syms-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:gfs2-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-devel-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-devel-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-extra-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-extra-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-optional-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-optional-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-vdso-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-azure-6.4.0-150600.8.58.1.noarch",
"openSUSE Leap 15.6:kernel-source-azure-6.4.0-150600.8.58.1.noarch",
"openSUSE Leap 15.6:kernel-syms-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kselftests-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-azure-6.4.0-150600.8.58.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-22T16:35:13Z",
"details": "moderate"
}
],
"title": "CVE-2025-40183"
},
{
"cve": "CVE-2025-40186",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40186"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\ntcp: Don\u0027t call reqsk_fastopen_remove() in tcp_conn_request().\n\nsyzbot reported the splat below in tcp_conn_request(). [0]\n\nIf a listener is close()d while a TFO socket is being processed in\ntcp_conn_request(), inet_csk_reqsk_queue_add() does not set reqsk-\u003esk\nand calls inet_child_forget(), which calls tcp_disconnect() for the\nTFO socket.\n\nAfter the cited commit, tcp_disconnect() calls reqsk_fastopen_remove(),\nwhere reqsk_put() is called due to !reqsk-\u003esk.\n\nThen, reqsk_fastopen_remove() in tcp_conn_request() decrements the\nlast req-\u003ersk_refcnt and frees reqsk, and __reqsk_free() at the\ndrop_and_free label causes the refcount underflow for the listener\nand double-free of the reqsk.\n\nLet\u0027s remove reqsk_fastopen_remove() in tcp_conn_request().\n\nNote that other callers make sure tp-\u003efastopen_rsk is not NULL.\n\n[0]:\nrefcount_t: underflow; use-after-free.\nWARNING: CPU: 12 PID: 5563 at lib/refcount.c:28 refcount_warn_saturate (lib/refcount.c:28)\nModules linked in:\nCPU: 12 UID: 0 PID: 5563 Comm: syz-executor Not tainted syzkaller #0 PREEMPT(full)\nHardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025\nRIP: 0010:refcount_warn_saturate (lib/refcount.c:28)\nCode: ab e8 8e b4 98 ff 0f 0b c3 cc cc cc cc cc 80 3d a4 e4 d6 01 00 75 9c c6 05 9b e4 d6 01 01 48 c7 c7 e8 df fb ab e8 6a b4 98 ff \u003c0f\u003e 0b e9 03 5b 76 00 cc 80 3d 7d e4 d6 01 00 0f 85 74 ff ff ff c6\nRSP: 0018:ffffa79fc0304a98 EFLAGS: 00010246\nRAX: d83af4db1c6b3900 RBX: ffff9f65c7a69020 RCX: d83af4db1c6b3900\nRDX: 0000000000000000 RSI: 00000000ffff7fff RDI: ffffffffac78a280\nRBP: 000000009d781b60 R08: 0000000000007fff R09: ffffffffac6ca280\nR10: 0000000000017ffd R11: 0000000000000004 R12: ffff9f65c7b4f100\nR13: ffff9f65c7d23c00 R14: ffff9f65c7d26000 R15: ffff9f65c7a64ef8\nFS: 00007f9f962176c0(0000) GS:ffff9f65fcf00000(0000) knlGS:0000000000000000\nCS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033\nCR2: 0000200000000180 CR3: 000000000dbbe006 CR4: 0000000000372ef0\nCall Trace:\n \u003cIRQ\u003e\n tcp_conn_request (./include/linux/refcount.h:400 ./include/linux/refcount.h:432 ./include/linux/refcount.h:450 ./include/net/sock.h:1965 ./include/net/request_sock.h:131 net/ipv4/tcp_input.c:7301)\n tcp_rcv_state_process (net/ipv4/tcp_input.c:6708)\n tcp_v6_do_rcv (net/ipv6/tcp_ipv6.c:1670)\n tcp_v6_rcv (net/ipv6/tcp_ipv6.c:1906)\n ip6_protocol_deliver_rcu (net/ipv6/ip6_input.c:438)\n ip6_input (net/ipv6/ip6_input.c:500)\n ipv6_rcv (net/ipv6/ip6_input.c:311)\n __netif_receive_skb (net/core/dev.c:6104)\n process_backlog (net/core/dev.c:6456)\n __napi_poll (net/core/dev.c:7506)\n net_rx_action (net/core/dev.c:7569 net/core/dev.c:7696)\n handle_softirqs (kernel/softirq.c:579)\n do_softirq (kernel/softirq.c:480)\n \u003c/IRQ\u003e",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-6.4.0-150600.8.58.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-6.4.0-150600.8.58.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-devel-6.4.0-150600.8.58.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-devel-6.4.0-150600.8.58.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-devel-azure-6.4.0-150600.8.58.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-source-azure-6.4.0-150600.8.58.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-syms-azure-6.4.0-150600.8.58.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-syms-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:gfs2-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-devel-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-devel-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-extra-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-extra-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-optional-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-optional-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-vdso-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-azure-6.4.0-150600.8.58.1.noarch",
"openSUSE Leap 15.6:kernel-source-azure-6.4.0-150600.8.58.1.noarch",
"openSUSE Leap 15.6:kernel-syms-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kselftests-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-azure-6.4.0-150600.8.58.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40186",
"url": "https://www.suse.com/security/cve/CVE-2025-40186"
},
{
"category": "external",
"summary": "SUSE Bug 1253438 for CVE-2025-40186",
"url": "https://bugzilla.suse.com/1253438"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-6.4.0-150600.8.58.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-6.4.0-150600.8.58.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-devel-6.4.0-150600.8.58.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-devel-6.4.0-150600.8.58.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-devel-azure-6.4.0-150600.8.58.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-source-azure-6.4.0-150600.8.58.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-syms-azure-6.4.0-150600.8.58.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-syms-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:gfs2-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-devel-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-devel-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-extra-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-extra-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-optional-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-optional-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-vdso-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-azure-6.4.0-150600.8.58.1.noarch",
"openSUSE Leap 15.6:kernel-source-azure-6.4.0-150600.8.58.1.noarch",
"openSUSE Leap 15.6:kernel-syms-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kselftests-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-azure-6.4.0-150600.8.58.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-6.4.0-150600.8.58.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-6.4.0-150600.8.58.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-devel-6.4.0-150600.8.58.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-devel-6.4.0-150600.8.58.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-devel-azure-6.4.0-150600.8.58.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-source-azure-6.4.0-150600.8.58.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-syms-azure-6.4.0-150600.8.58.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-syms-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:gfs2-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-devel-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-devel-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-extra-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-extra-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-optional-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-optional-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-vdso-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-azure-6.4.0-150600.8.58.1.noarch",
"openSUSE Leap 15.6:kernel-source-azure-6.4.0-150600.8.58.1.noarch",
"openSUSE Leap 15.6:kernel-syms-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kselftests-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-azure-6.4.0-150600.8.58.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-22T16:35:13Z",
"details": "important"
}
],
"title": "CVE-2025-40186"
},
{
"cve": "CVE-2025-40188",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40188"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\npwm: berlin: Fix wrong register in suspend/resume\n\nThe \u0027enable\u0027 register should be BERLIN_PWM_EN rather than\nBERLIN_PWM_ENABLE, otherwise, the driver accesses wrong address, there\nwill be cpu exception then kernel panic during suspend/resume.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-6.4.0-150600.8.58.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-6.4.0-150600.8.58.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-devel-6.4.0-150600.8.58.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-devel-6.4.0-150600.8.58.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-devel-azure-6.4.0-150600.8.58.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-source-azure-6.4.0-150600.8.58.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-syms-azure-6.4.0-150600.8.58.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-syms-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:gfs2-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-devel-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-devel-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-extra-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-extra-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-optional-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-optional-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-vdso-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-azure-6.4.0-150600.8.58.1.noarch",
"openSUSE Leap 15.6:kernel-source-azure-6.4.0-150600.8.58.1.noarch",
"openSUSE Leap 15.6:kernel-syms-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kselftests-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-azure-6.4.0-150600.8.58.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40188",
"url": "https://www.suse.com/security/cve/CVE-2025-40188"
},
{
"category": "external",
"summary": "SUSE Bug 1253449 for CVE-2025-40188",
"url": "https://bugzilla.suse.com/1253449"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-6.4.0-150600.8.58.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-6.4.0-150600.8.58.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-devel-6.4.0-150600.8.58.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-devel-6.4.0-150600.8.58.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-devel-azure-6.4.0-150600.8.58.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-source-azure-6.4.0-150600.8.58.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-syms-azure-6.4.0-150600.8.58.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-syms-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:gfs2-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-devel-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-devel-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-extra-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-extra-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-optional-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-optional-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-vdso-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-azure-6.4.0-150600.8.58.1.noarch",
"openSUSE Leap 15.6:kernel-source-azure-6.4.0-150600.8.58.1.noarch",
"openSUSE Leap 15.6:kernel-syms-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kselftests-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-azure-6.4.0-150600.8.58.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-6.4.0-150600.8.58.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-6.4.0-150600.8.58.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-devel-6.4.0-150600.8.58.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-devel-6.4.0-150600.8.58.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-devel-azure-6.4.0-150600.8.58.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-source-azure-6.4.0-150600.8.58.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-syms-azure-6.4.0-150600.8.58.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-syms-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:gfs2-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-devel-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-devel-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-extra-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-extra-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-optional-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-optional-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-vdso-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-azure-6.4.0-150600.8.58.1.noarch",
"openSUSE Leap 15.6:kernel-source-azure-6.4.0-150600.8.58.1.noarch",
"openSUSE Leap 15.6:kernel-syms-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kselftests-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-azure-6.4.0-150600.8.58.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-22T16:35:13Z",
"details": "moderate"
}
],
"title": "CVE-2025-40188"
},
{
"cve": "CVE-2025-40194",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40194"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\ncpufreq: intel_pstate: Fix object lifecycle issue in update_qos_request()\n\nThe cpufreq_cpu_put() call in update_qos_request() takes place too early\nbecause the latter subsequently calls freq_qos_update_request() that\nindirectly accesses the policy object in question through the QoS request\nobject passed to it.\n\nFortunately, update_qos_request() is called under intel_pstate_driver_lock,\nso this issue does not matter for changing the intel_pstate operation\nmode, but it theoretically can cause a crash to occur on CPU device hot\nremoval (which currently can only happen in virt, but it is formally\nsupported nevertheless).\n\nAddress this issue by modifying update_qos_request() to drop the\nreference to the policy later.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-6.4.0-150600.8.58.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-6.4.0-150600.8.58.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-devel-6.4.0-150600.8.58.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-devel-6.4.0-150600.8.58.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-devel-azure-6.4.0-150600.8.58.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-source-azure-6.4.0-150600.8.58.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-syms-azure-6.4.0-150600.8.58.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-syms-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:gfs2-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-devel-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-devel-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-extra-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-extra-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-optional-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-optional-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-vdso-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-azure-6.4.0-150600.8.58.1.noarch",
"openSUSE Leap 15.6:kernel-source-azure-6.4.0-150600.8.58.1.noarch",
"openSUSE Leap 15.6:kernel-syms-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kselftests-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-azure-6.4.0-150600.8.58.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40194",
"url": "https://www.suse.com/security/cve/CVE-2025-40194"
},
{
"category": "external",
"summary": "SUSE Bug 1253445 for CVE-2025-40194",
"url": "https://bugzilla.suse.com/1253445"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-6.4.0-150600.8.58.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-6.4.0-150600.8.58.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-devel-6.4.0-150600.8.58.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-devel-6.4.0-150600.8.58.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-devel-azure-6.4.0-150600.8.58.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-source-azure-6.4.0-150600.8.58.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-syms-azure-6.4.0-150600.8.58.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-syms-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:gfs2-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-devel-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-devel-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-extra-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-extra-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-optional-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-optional-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-vdso-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-azure-6.4.0-150600.8.58.1.noarch",
"openSUSE Leap 15.6:kernel-source-azure-6.4.0-150600.8.58.1.noarch",
"openSUSE Leap 15.6:kernel-syms-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kselftests-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-azure-6.4.0-150600.8.58.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.7,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-6.4.0-150600.8.58.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-6.4.0-150600.8.58.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-devel-6.4.0-150600.8.58.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-devel-6.4.0-150600.8.58.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-devel-azure-6.4.0-150600.8.58.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-source-azure-6.4.0-150600.8.58.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-syms-azure-6.4.0-150600.8.58.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-syms-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:gfs2-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-devel-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-devel-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-extra-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-extra-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-optional-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-optional-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-vdso-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-azure-6.4.0-150600.8.58.1.noarch",
"openSUSE Leap 15.6:kernel-source-azure-6.4.0-150600.8.58.1.noarch",
"openSUSE Leap 15.6:kernel-syms-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kselftests-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-azure-6.4.0-150600.8.58.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-22T16:35:13Z",
"details": "moderate"
}
],
"title": "CVE-2025-40194"
},
{
"cve": "CVE-2025-40198",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40198"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\next4: avoid potential buffer over-read in parse_apply_sb_mount_options()\n\nUnlike other strings in the ext4 superblock, we rely on tune2fs to\nmake sure s_mount_opts is NUL terminated. Harden\nparse_apply_sb_mount_options() by treating s_mount_opts as a potential\n__nonstring.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-6.4.0-150600.8.58.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-6.4.0-150600.8.58.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-devel-6.4.0-150600.8.58.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-devel-6.4.0-150600.8.58.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-devel-azure-6.4.0-150600.8.58.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-source-azure-6.4.0-150600.8.58.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-syms-azure-6.4.0-150600.8.58.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-syms-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:gfs2-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-devel-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-devel-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-extra-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-extra-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-optional-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-optional-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-vdso-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-azure-6.4.0-150600.8.58.1.noarch",
"openSUSE Leap 15.6:kernel-source-azure-6.4.0-150600.8.58.1.noarch",
"openSUSE Leap 15.6:kernel-syms-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kselftests-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-azure-6.4.0-150600.8.58.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40198",
"url": "https://www.suse.com/security/cve/CVE-2025-40198"
},
{
"category": "external",
"summary": "SUSE Bug 1253453 for CVE-2025-40198",
"url": "https://bugzilla.suse.com/1253453"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-6.4.0-150600.8.58.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-6.4.0-150600.8.58.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-devel-6.4.0-150600.8.58.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-devel-6.4.0-150600.8.58.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-devel-azure-6.4.0-150600.8.58.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-source-azure-6.4.0-150600.8.58.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-syms-azure-6.4.0-150600.8.58.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-syms-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:gfs2-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-devel-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-devel-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-extra-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-extra-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-optional-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-optional-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-vdso-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-azure-6.4.0-150600.8.58.1.noarch",
"openSUSE Leap 15.6:kernel-source-azure-6.4.0-150600.8.58.1.noarch",
"openSUSE Leap 15.6:kernel-syms-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kselftests-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-azure-6.4.0-150600.8.58.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-6.4.0-150600.8.58.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-6.4.0-150600.8.58.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-devel-6.4.0-150600.8.58.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-devel-6.4.0-150600.8.58.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-devel-azure-6.4.0-150600.8.58.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-source-azure-6.4.0-150600.8.58.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-syms-azure-6.4.0-150600.8.58.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-syms-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:gfs2-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-devel-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-devel-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-extra-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-extra-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-optional-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-optional-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-vdso-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-azure-6.4.0-150600.8.58.1.noarch",
"openSUSE Leap 15.6:kernel-source-azure-6.4.0-150600.8.58.1.noarch",
"openSUSE Leap 15.6:kernel-syms-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kselftests-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-azure-6.4.0-150600.8.58.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-22T16:35:13Z",
"details": "moderate"
}
],
"title": "CVE-2025-40198"
},
{
"cve": "CVE-2025-40200",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40200"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nSquashfs: reject negative file sizes in squashfs_read_inode()\n\nSyskaller reports a \"WARNING in ovl_copy_up_file\" in overlayfs.\n\nThis warning is ultimately caused because the underlying Squashfs file\nsystem returns a file with a negative file size.\n\nThis commit checks for a negative file size and returns EINVAL.\n\n[phillip@squashfs.org.uk: only need to check 64 bit quantity]",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-6.4.0-150600.8.58.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-6.4.0-150600.8.58.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-devel-6.4.0-150600.8.58.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-devel-6.4.0-150600.8.58.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-devel-azure-6.4.0-150600.8.58.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-source-azure-6.4.0-150600.8.58.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-syms-azure-6.4.0-150600.8.58.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-syms-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:gfs2-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-devel-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-devel-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-extra-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-extra-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-optional-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-optional-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-vdso-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-azure-6.4.0-150600.8.58.1.noarch",
"openSUSE Leap 15.6:kernel-source-azure-6.4.0-150600.8.58.1.noarch",
"openSUSE Leap 15.6:kernel-syms-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kselftests-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-azure-6.4.0-150600.8.58.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40200",
"url": "https://www.suse.com/security/cve/CVE-2025-40200"
},
{
"category": "external",
"summary": "SUSE Bug 1253448 for CVE-2025-40200",
"url": "https://bugzilla.suse.com/1253448"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-6.4.0-150600.8.58.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-6.4.0-150600.8.58.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-devel-6.4.0-150600.8.58.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-devel-6.4.0-150600.8.58.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-devel-azure-6.4.0-150600.8.58.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-source-azure-6.4.0-150600.8.58.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-syms-azure-6.4.0-150600.8.58.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-syms-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:gfs2-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-devel-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-devel-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-extra-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-extra-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-optional-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-optional-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-vdso-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-azure-6.4.0-150600.8.58.1.noarch",
"openSUSE Leap 15.6:kernel-source-azure-6.4.0-150600.8.58.1.noarch",
"openSUSE Leap 15.6:kernel-syms-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kselftests-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-azure-6.4.0-150600.8.58.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-6.4.0-150600.8.58.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-6.4.0-150600.8.58.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-devel-6.4.0-150600.8.58.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-devel-6.4.0-150600.8.58.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-devel-azure-6.4.0-150600.8.58.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-source-azure-6.4.0-150600.8.58.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-syms-azure-6.4.0-150600.8.58.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-syms-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:gfs2-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-devel-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-devel-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-extra-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-extra-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-optional-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-optional-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-vdso-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-azure-6.4.0-150600.8.58.1.noarch",
"openSUSE Leap 15.6:kernel-source-azure-6.4.0-150600.8.58.1.noarch",
"openSUSE Leap 15.6:kernel-syms-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kselftests-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-azure-6.4.0-150600.8.58.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-22T16:35:13Z",
"details": "moderate"
}
],
"title": "CVE-2025-40200"
},
{
"cve": "CVE-2025-40204",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40204"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nsctp: Fix MAC comparison to be constant-time\n\nTo prevent timing attacks, MACs need to be compared in constant time.\nUse the appropriate helper function for this.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-6.4.0-150600.8.58.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-6.4.0-150600.8.58.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-devel-6.4.0-150600.8.58.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-devel-6.4.0-150600.8.58.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-devel-azure-6.4.0-150600.8.58.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-source-azure-6.4.0-150600.8.58.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-syms-azure-6.4.0-150600.8.58.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-syms-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:gfs2-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-devel-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-devel-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-extra-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-extra-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-optional-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-optional-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-vdso-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-azure-6.4.0-150600.8.58.1.noarch",
"openSUSE Leap 15.6:kernel-source-azure-6.4.0-150600.8.58.1.noarch",
"openSUSE Leap 15.6:kernel-syms-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kselftests-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-azure-6.4.0-150600.8.58.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40204",
"url": "https://www.suse.com/security/cve/CVE-2025-40204"
},
{
"category": "external",
"summary": "SUSE Bug 1253436 for CVE-2025-40204",
"url": "https://bugzilla.suse.com/1253436"
},
{
"category": "external",
"summary": "SUSE Bug 1253437 for CVE-2025-40204",
"url": "https://bugzilla.suse.com/1253437"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-6.4.0-150600.8.58.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-6.4.0-150600.8.58.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-devel-6.4.0-150600.8.58.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-devel-6.4.0-150600.8.58.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-devel-azure-6.4.0-150600.8.58.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-source-azure-6.4.0-150600.8.58.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-syms-azure-6.4.0-150600.8.58.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-syms-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:gfs2-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-devel-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-devel-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-extra-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-extra-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-optional-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-optional-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-vdso-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-azure-6.4.0-150600.8.58.1.noarch",
"openSUSE Leap 15.6:kernel-source-azure-6.4.0-150600.8.58.1.noarch",
"openSUSE Leap 15.6:kernel-syms-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kselftests-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-azure-6.4.0-150600.8.58.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-6.4.0-150600.8.58.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-6.4.0-150600.8.58.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-devel-6.4.0-150600.8.58.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-devel-6.4.0-150600.8.58.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-devel-azure-6.4.0-150600.8.58.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-source-azure-6.4.0-150600.8.58.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-syms-azure-6.4.0-150600.8.58.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-syms-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:gfs2-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-devel-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-devel-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-extra-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-extra-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-optional-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-optional-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-vdso-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-azure-6.4.0-150600.8.58.1.noarch",
"openSUSE Leap 15.6:kernel-source-azure-6.4.0-150600.8.58.1.noarch",
"openSUSE Leap 15.6:kernel-syms-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kselftests-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-azure-6.4.0-150600.8.58.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-22T16:35:13Z",
"details": "important"
}
],
"title": "CVE-2025-40204"
},
{
"cve": "CVE-2025-40205",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40205"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nbtrfs: avoid potential out-of-bounds in btrfs_encode_fh()\n\nThe function btrfs_encode_fh() does not properly account for the three\ncases it handles.\n\nBefore writing to the file handle (fh), the function only returns to the\nuser BTRFS_FID_SIZE_NON_CONNECTABLE (5 dwords, 20 bytes) or\nBTRFS_FID_SIZE_CONNECTABLE (8 dwords, 32 bytes).\n\nHowever, when a parent exists and the root ID of the parent and the\ninode are different, the function writes BTRFS_FID_SIZE_CONNECTABLE_ROOT\n(10 dwords, 40 bytes).\n\nIf *max_len is not large enough, this write goes out of bounds because\nBTRFS_FID_SIZE_CONNECTABLE_ROOT is greater than\nBTRFS_FID_SIZE_CONNECTABLE originally returned.\n\nThis results in an 8-byte out-of-bounds write at\nfid-\u003eparent_root_objectid = parent_root_id.\n\nA previous attempt to fix this issue was made but was lost.\n\nhttps://lore.kernel.org/all/4CADAEEC020000780001B32C@vpn.id2.novell.com/\n\nAlthough this issue does not seem to be easily triggerable, it is a\npotential memory corruption bug that should be fixed. This patch\nresolves the issue by ensuring the function returns the appropriate size\nfor all three cases and validates that *max_len is large enough before\nwriting any data.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-6.4.0-150600.8.58.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-6.4.0-150600.8.58.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-devel-6.4.0-150600.8.58.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-devel-6.4.0-150600.8.58.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-devel-azure-6.4.0-150600.8.58.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-source-azure-6.4.0-150600.8.58.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-syms-azure-6.4.0-150600.8.58.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-syms-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:gfs2-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-devel-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-devel-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-extra-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-extra-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-optional-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-optional-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-vdso-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-azure-6.4.0-150600.8.58.1.noarch",
"openSUSE Leap 15.6:kernel-source-azure-6.4.0-150600.8.58.1.noarch",
"openSUSE Leap 15.6:kernel-syms-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kselftests-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-azure-6.4.0-150600.8.58.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40205",
"url": "https://www.suse.com/security/cve/CVE-2025-40205"
},
{
"category": "external",
"summary": "SUSE Bug 1253456 for CVE-2025-40205",
"url": "https://bugzilla.suse.com/1253456"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-6.4.0-150600.8.58.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-6.4.0-150600.8.58.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-devel-6.4.0-150600.8.58.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-devel-6.4.0-150600.8.58.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-devel-azure-6.4.0-150600.8.58.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-source-azure-6.4.0-150600.8.58.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-syms-azure-6.4.0-150600.8.58.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-syms-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:gfs2-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-devel-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-devel-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-extra-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-extra-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-optional-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-optional-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-vdso-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-azure-6.4.0-150600.8.58.1.noarch",
"openSUSE Leap 15.6:kernel-source-azure-6.4.0-150600.8.58.1.noarch",
"openSUSE Leap 15.6:kernel-syms-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kselftests-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-azure-6.4.0-150600.8.58.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-6.4.0-150600.8.58.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-6.4.0-150600.8.58.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-devel-6.4.0-150600.8.58.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-devel-6.4.0-150600.8.58.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-devel-azure-6.4.0-150600.8.58.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-source-azure-6.4.0-150600.8.58.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-syms-azure-6.4.0-150600.8.58.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-syms-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:gfs2-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-devel-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-devel-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-extra-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-extra-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-optional-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-optional-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-vdso-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-azure-6.4.0-150600.8.58.1.noarch",
"openSUSE Leap 15.6:kernel-source-azure-6.4.0-150600.8.58.1.noarch",
"openSUSE Leap 15.6:kernel-syms-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kselftests-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-azure-6.4.0-150600.8.58.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-22T16:35:13Z",
"details": "moderate"
}
],
"title": "CVE-2025-40205"
},
{
"cve": "CVE-2025-40206",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40206"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnetfilter: nft_objref: validate objref and objrefmap expressions\n\nReferencing a synproxy stateful object from OUTPUT hook causes kernel\ncrash due to infinite recursive calls:\n\nBUG: TASK stack guard page was hit at 000000008bda5b8c (stack is 000000003ab1c4a5..00000000494d8b12)\n[...]\nCall Trace:\n __find_rr_leaf+0x99/0x230\n fib6_table_lookup+0x13b/0x2d0\n ip6_pol_route+0xa4/0x400\n fib6_rule_lookup+0x156/0x240\n ip6_route_output_flags+0xc6/0x150\n __nf_ip6_route+0x23/0x50\n synproxy_send_tcp_ipv6+0x106/0x200\n synproxy_send_client_synack_ipv6+0x1aa/0x1f0\n nft_synproxy_do_eval+0x263/0x310\n nft_do_chain+0x5a8/0x5f0 [nf_tables\n nft_do_chain_inet+0x98/0x110\n nf_hook_slow+0x43/0xc0\n __ip6_local_out+0xf0/0x170\n ip6_local_out+0x17/0x70\n synproxy_send_tcp_ipv6+0x1a2/0x200\n synproxy_send_client_synack_ipv6+0x1aa/0x1f0\n[...]\n\nImplement objref and objrefmap expression validate functions.\n\nCurrently, only NFT_OBJECT_SYNPROXY object type requires validation.\nThis will also handle a jump to a chain using a synproxy object from the\nOUTPUT hook.\n\nNow when trying to reference a synproxy object in the OUTPUT hook, nft\nwill produce the following error:\n\nsynproxy_crash.nft: Error: Could not process rule: Operation not supported\n synproxy name mysynproxy\n ^^^^^^^^^^^^^^^^^^^^^^^^",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-6.4.0-150600.8.58.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-6.4.0-150600.8.58.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-devel-6.4.0-150600.8.58.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-devel-6.4.0-150600.8.58.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-devel-azure-6.4.0-150600.8.58.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-source-azure-6.4.0-150600.8.58.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-syms-azure-6.4.0-150600.8.58.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-syms-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:gfs2-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-devel-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-devel-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-extra-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-extra-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-optional-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-optional-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-vdso-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-azure-6.4.0-150600.8.58.1.noarch",
"openSUSE Leap 15.6:kernel-source-azure-6.4.0-150600.8.58.1.noarch",
"openSUSE Leap 15.6:kernel-syms-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kselftests-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-azure-6.4.0-150600.8.58.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40206",
"url": "https://www.suse.com/security/cve/CVE-2025-40206"
},
{
"category": "external",
"summary": "SUSE Bug 1253393 for CVE-2025-40206",
"url": "https://bugzilla.suse.com/1253393"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-6.4.0-150600.8.58.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-6.4.0-150600.8.58.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-devel-6.4.0-150600.8.58.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-devel-6.4.0-150600.8.58.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-devel-azure-6.4.0-150600.8.58.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-source-azure-6.4.0-150600.8.58.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-syms-azure-6.4.0-150600.8.58.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-syms-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:gfs2-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-devel-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-devel-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-extra-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-extra-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-optional-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-optional-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-vdso-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-azure-6.4.0-150600.8.58.1.noarch",
"openSUSE Leap 15.6:kernel-source-azure-6.4.0-150600.8.58.1.noarch",
"openSUSE Leap 15.6:kernel-syms-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kselftests-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-azure-6.4.0-150600.8.58.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.1,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-6.4.0-150600.8.58.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-6.4.0-150600.8.58.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-devel-6.4.0-150600.8.58.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-devel-6.4.0-150600.8.58.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-devel-azure-6.4.0-150600.8.58.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-source-azure-6.4.0-150600.8.58.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-syms-azure-6.4.0-150600.8.58.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-syms-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:gfs2-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-devel-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-devel-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-extra-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-extra-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-optional-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-optional-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-vdso-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-azure-6.4.0-150600.8.58.1.noarch",
"openSUSE Leap 15.6:kernel-source-azure-6.4.0-150600.8.58.1.noarch",
"openSUSE Leap 15.6:kernel-syms-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kselftests-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-azure-6.4.0-150600.8.58.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-22T16:35:13Z",
"details": "moderate"
}
],
"title": "CVE-2025-40206"
},
{
"cve": "CVE-2025-40207",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40207"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nmedia: v4l2-subdev: Fix alloc failure check in v4l2_subdev_call_state_try()\n\nv4l2_subdev_call_state_try() macro allocates a subdev state with\n__v4l2_subdev_state_alloc(), but does not check the returned value. If\n__v4l2_subdev_state_alloc fails, it returns an ERR_PTR, and that would\ncause v4l2_subdev_call_state_try() to crash.\n\nAdd proper error handling to v4l2_subdev_call_state_try().",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-6.4.0-150600.8.58.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-6.4.0-150600.8.58.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-devel-6.4.0-150600.8.58.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-devel-6.4.0-150600.8.58.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-devel-azure-6.4.0-150600.8.58.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-source-azure-6.4.0-150600.8.58.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-syms-azure-6.4.0-150600.8.58.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-syms-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:gfs2-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-devel-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-devel-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-extra-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-extra-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-optional-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-optional-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-vdso-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-azure-6.4.0-150600.8.58.1.noarch",
"openSUSE Leap 15.6:kernel-source-azure-6.4.0-150600.8.58.1.noarch",
"openSUSE Leap 15.6:kernel-syms-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kselftests-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-azure-6.4.0-150600.8.58.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40207",
"url": "https://www.suse.com/security/cve/CVE-2025-40207"
},
{
"category": "external",
"summary": "SUSE Bug 1253395 for CVE-2025-40207",
"url": "https://bugzilla.suse.com/1253395"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-6.4.0-150600.8.58.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-6.4.0-150600.8.58.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-devel-6.4.0-150600.8.58.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-devel-6.4.0-150600.8.58.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-devel-azure-6.4.0-150600.8.58.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-source-azure-6.4.0-150600.8.58.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-syms-azure-6.4.0-150600.8.58.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-syms-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:gfs2-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-devel-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-devel-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-extra-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-extra-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-optional-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-optional-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-vdso-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-azure-6.4.0-150600.8.58.1.noarch",
"openSUSE Leap 15.6:kernel-source-azure-6.4.0-150600.8.58.1.noarch",
"openSUSE Leap 15.6:kernel-syms-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kselftests-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-azure-6.4.0-150600.8.58.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-6.4.0-150600.8.58.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-6.4.0-150600.8.58.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-devel-6.4.0-150600.8.58.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-devel-6.4.0-150600.8.58.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-devel-azure-6.4.0-150600.8.58.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-source-azure-6.4.0-150600.8.58.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-syms-azure-6.4.0-150600.8.58.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-syms-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:gfs2-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-devel-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-devel-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-extra-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-extra-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-optional-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-optional-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-vdso-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-azure-6.4.0-150600.8.58.1.noarch",
"openSUSE Leap 15.6:kernel-source-azure-6.4.0-150600.8.58.1.noarch",
"openSUSE Leap 15.6:kernel-syms-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kselftests-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-azure-6.4.0-150600.8.58.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-22T16:35:13Z",
"details": "moderate"
}
],
"title": "CVE-2025-40207"
}
]
}
SUSE-SU-2026:20015-1
Vulnerability from csaf_suse - Published: 2025-12-19 16:46 - Updated: 2025-12-19 16:46Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Security update for the Linux Kernel",
"title": "Title of the patch"
},
{
"category": "description",
"text": "\nThe SUSE Linux Enterprise 16.0 kernel was updated to fix various security issues\n\nThe following security issues were fixed:\n\n- CVE-2022-50253: bpf: make sure skb-\u003elen != 0 when redirecting to a tunneling device (bsc#1249912).\n- CVE-2025-37916: pds_core: remove write-after-free of client_id (bsc#1243474).\n- CVE-2025-38084: mm/hugetlb: unshare page tables during VMA split, not before (bsc#1245431 bsc#1245498).\n- CVE-2025-38085: mm/hugetlb: fix huge_pmd_unshare() vs GUP-fast race (bsc#1245431 bsc#1245499).\n- CVE-2025-38321: smb: Log an error when close_all_cached_dirs fails (bsc#1246328).\n- CVE-2025-38728: smb3: fix for slab out of bounds on mount to ksmbd (bsc#1249256).\n- CVE-2025-39805: net: macb: fix unregister_netdev call order in macb_remove() (bsc#1249982).\n- CVE-2025-39819: fs/smb: Fix inconsistent refcnt update (bsc#1250176).\n- CVE-2025-39822: io_uring/kbuf: fix signedness in this_len calculation (bsc#1250034).\n- CVE-2025-39831: fbnic: Move phylink resume out of service_task and into open/close (bsc#1249977).\n- CVE-2025-39859: ptp: ocp: fix use-after-free bugs causing by ptp_ocp_watchdog (bsc#1250252).\n- CVE-2025-39897: net: xilinx: axienet: Add error handling for RX metadata pointer retrieval (bsc#1250746).\n- CVE-2025-39917: bpf: Fix out-of-bounds dynptr write in bpf_crypto_crypt (bsc#1250723).\n- CVE-2025-39944: octeontx2-pf: Fix use-after-free bugs in otx2_sync_tstamp() (bsc#1251120).\n- CVE-2025-39961: iommu/amd/pgtbl: Fix possible race while increase page table level (bsc#1251817).\n- CVE-2025-39980: nexthop: Forbid FDB status change while nexthop is in a group (bsc#1252063).\n- CVE-2025-39990: bpf: Check the helper function is valid in get_helper_proto (bsc#1252054).\n- CVE-2025-40001: scsi: mvsas: Fix use-after-free bugs in mvs_work_queue (bsc#1252303).\n- CVE-2025-40003: net: mscc: ocelot: Fix use-after-free caused by cyclic delayed work (bsc#1252301).\n- CVE-2025-40006: mm/hugetlb: fix folio is still mapped when deleted (bsc#1252342).\n- CVE-2025-40021: tracing: dynevent: Add a missing lockdown check on dynevent (bsc#1252681).\n- CVE-2025-40024: vhost: Take a reference on the task in struct vhost_task (bsc#1252686).\n- CVE-2025-40027: net/9p: fix double req put in p9_fd_cancelled (bsc#1252763).\n- CVE-2025-40031: tee: fix register_shm_helper() (bsc#1252779).\n- CVE-2025-40033: remoteproc: pru: Fix potential NULL pointer dereference in pru_rproc_set_ctable() (bsc#1252824).\n- CVE-2025-40038: KVM: SVM: Skip fastpath emulation on VM-Exit if next RIP isn\u0027t valid (bsc#1252817).\n- CVE-2025-40047: io_uring/waitid: always prune wait queue entry in io_waitid_wait() (bsc#1252790).\n- CVE-2025-40053: net: dlink: handle copy_thresh allocation failure (bsc#1252808).\n- CVE-2025-40055: ocfs2: fix double free in user_cluster_connect() (bsc#1252821).\n- CVE-2025-40059: coresight: Fix incorrect handling for return value of devm_kzalloc (bsc#1252809).\n- CVE-2025-40064: smc: Fix use-after-free in __pnet_find_base_ndev() (bsc#1252845).\n- CVE-2025-40070: pps: fix warning in pps_register_cdev when register device fail (bsc#1252836).\n- CVE-2025-40074: tcp: convert to dev_net_rcu() (bsc#1252794).\n- CVE-2025-40075: tcp_metrics: use dst_dev_net_rcu() (bsc#1252795).\n- CVE-2025-40081: perf: arm_spe: Prevent overflow in PERF_IDX2OFF() (bsc#1252776).\n- CVE-2025-40083: net/sched: sch_qfq: Fix null-deref in agg_dequeue (bsc#1252912).\n- CVE-2025-40086: drm/xe: Don\u0027t allow evicting of BOs in same VM in array of VM binds (bsc#1252923).\n- CVE-2025-40098: ALSA: hda: cs35l41: Fix NULL pointer dereference in cs35l41_get_acpi_mute_state() (bsc#1252917).\n- CVE-2025-40101: btrfs: fix memory leaks when rejecting a non SINGLE data profile without an RST (bsc#1252901).\n- CVE-2025-40102: KVM: arm64: Prevent access to vCPU events before init (bsc#1252919).\n- CVE-2025-40105: vfs: Don\u0027t leak disconnected dentries on umount (bsc#1252928).\n- CVE-2025-40133: mptcp: Call dst_release() in mptcp_active_enable() (bsc#1253328).\n- CVE-2025-40134: dm: fix NULL pointer dereference in __dm_suspend() (bsc#1253386).\n- CVE-2025-40135: ipv6: use RCU in ip6_xmit() (bsc#1253342).\n- CVE-2025-40139: smc: Use __sk_dst_get() and dst_dev_rcu() in in smc_clc_prfx_set() (bsc#1253409).\n- CVE-2025-40149: tls: Use __sk_dst_get() and dst_dev_rcu() in get_netdev_for_sock() (bsc#1253355).\n- CVE-2025-40153: mm: hugetlb: avoid soft lockup when mprotect to large memory area (bsc#1253408).\n- CVE-2025-40157: EDAC/i10nm: Skip DIMM enumeration on a disabled memory controller (bsc#1253423).\n- CVE-2025-40158: ipv6: use RCU in ip6_output() (bsc#1253402).\n- CVE-2025-40159: xsk: Harden userspace-supplied xdp_desc validation (bsc#1253403).\n- CVE-2025-40168: smc: Use __sk_dst_get() and dst_dev_rcu() in smc_clc_prfx_match() (bsc#1253427).\n- CVE-2025-40169: bpf: Reject negative offsets for ALU ops (bsc#1253416).\n- CVE-2025-40173: net/ip6_tunnel: Prevent perpetual tunnel growth (bsc#1253421).\n- CVE-2025-40175: idpf: cleanup remaining SKBs in PTP flows (bsc#1253426).\n- CVE-2025-40176: tls: wait for pending async decryptions if tls_strp_msg_hold fails (bsc#1253425).\n- CVE-2025-40178: pid: Add a judgment for ns null in pid_nr_ns (bsc#1253463).\n- CVE-2025-40185: ice: ice_adapter: release xa entry on adapter allocation failure (bsc#1253394).\n- CVE-2025-40201: kernel/sys.c: fix the racy usage of task_lock(tsk-\u003egroup_leader) in sys_prlimit64() paths (bsc#1253455).\n- CVE-2025-40203: listmount: don\u0027t call path_put() under namespace semaphore (bsc#1253457).\n\nThe following non security issues were fixed:\n\n- ACPI: scan: Update honor list for RPMI System MSI (stable-fixes).\n- ACPICA: Update dsmethod.c to get rid of unused variable warning (stable-fixes).\n- Disable CONFIG_CPU5_WDT The cpu5wdt driver doesn\u0027t implement a\n proper watchdog interface and has many code issues. It only handles\n obscure and obsolete hardware. Stop building and supporting this driver\n (jsc#PED-14062).\n- Fix \"drm/xe: Don\u0027t allow evicting of BOs in same VM in array of VM binds\" (bsc#1252923)\n- KVM: SVM: Delete IRTE link from previous vCPU before setting new IRTE (git-fixes).\n- KVM: SVM: Delete IRTE link from previous vCPU irrespective of new routing (git-fixes).\n- KVM: SVM: Mark VMCB_LBR dirty when MSR_IA32_DEBUGCTLMSR is updated (git-fixes).\n- KVM: s390: improve interrupt cpu for wakeup (bsc#1235463).\n- KVM: s390: kABI backport for \u0027last_sleep_cpu\u0027 (bsc#1252352).\n- KVM: x86/mmu: Return -EAGAIN if userspace deletes/moves memslot during prefault (git-fixes).\n- PCI/ERR: Update device error_state already after reset (stable-fixes).\n- PM: EM: Slightly reduce em_check_capacity_update() overhead (stable-fixes).\n- Revert \"net/mlx5e: Update and set Xon/Xoff upon MTU set\" (git-fixes).\n- Revert \"net/mlx5e: Update and set Xon/Xoff upon port speed set\" (git-fixes).\n- Update config files: enable zstd module decompression (jsc#PED-14115).\n- bpf/selftests: Fix test_tcpnotify_user (bsc#1253635).\n- btrfs: do not clear read-only when adding sprout device (bsc#1253238).\n- btrfs: do not update last_log_commit when logging inode due to a new name (git-fixes).\n- dm: fix queue start/stop imbalance under suspend/load/resume races (bsc#1253386)\n- drm/amd/display: Add AVI infoframe copy in copy_stream_update_to_stream (stable-fixes).\n- drm/amd/display: update color on atomic commit time (stable-fixes).\n- drm/amd/display: update dpp/disp clock from smu clock table (stable-fixes).\n- drm/radeon: delete radeon_fence_process in is_signaled, no deadlock (stable-fixes).\n- hwmon: (lenovo-ec-sensors) Update P8 supprt (stable-fixes).\n- media: amphion: Delete v4l2_fh synchronously in .release() (stable-fixes).\n- mount: handle NULL values in mnt_ns_release() (bsc#1254308)\n- net/smc: Remove validation of reserved bits in CLC Decline (bsc#1252357).\n- net: phy: move realtek PHY driver to its own subdirectory (jsc#PED-14353).\n- net: phy: realtek: add defines for shadowed c45 standard registers (jsc#PED-14353).\n- net: phy: realtek: add helper RTL822X_VND2_C22_REG (jsc#PED-14353).\n- net: phy: realtek: change order of calls in C22 read_status() (jsc#PED-14353).\n- net: phy: realtek: clear 1000Base-T link partner advertisement (jsc#PED-14353).\n- net: phy: realtek: improve mmd register access for internal PHY\u0027s (jsc#PED-14353).\n- net: phy: realtek: read duplex and gbit master from PHYSR register (jsc#PED-14353).\n- net: phy: realtek: switch from paged to MMD ops in rtl822x functions (jsc#PED-14353).\n- net: phy: realtek: use string choices helpers (jsc#PED-14353).\n- net: xilinx: axienet: Fix IRQ coalescing packet count overflow (bsc#1250746)\n- net: xilinx: axienet: Fix RX skb ring management in DMAengine mode (bsc#1250746)\n- net: xilinx: axienet: Fix Tx skb circular buffer occupancy check in dmaengine xmit (bsc#1250746)\n- nvmet-auth: update sc_c in host response (git-fixes bsc#1249397).\n- nvmet-auth: update sc_c in target host hash calculation (git-fixes).\n- perf list: Add IBM z17 event descriptions (jsc#PED-13611).\n- platform/x86:intel/pmc: Update Arrow Lake telemetry GUID (git-fixes).\n- powercap: intel_rapl: Add support for Panther Lake platform (jsc#PED-13949).\n- pwm: pca9685: Use bulk write to atomicially update registers (stable-fixes).\n- r8169: add PHY c45 ops for MDIO_MMD_VENDOR2 registers (jsc#PED-14353).\n- r8169: add support for Intel Killer E5000 (jsc#PED-14353).\n- r8169: add support for RTL8125BP rev.b (jsc#PED-14353).\n- r8169: add support for RTL8125D rev.b (jsc#PED-14353).\n- r8169: adjust version numbering for RTL8126 (jsc#PED-14353).\n- r8169: align RTL8125 EEE config with vendor driver (jsc#PED-14353).\n- r8169: align RTL8125/RTL8126 PHY config with vendor driver (jsc#PED-14353).\n- r8169: align RTL8126 EEE config with vendor driver (jsc#PED-14353).\n- r8169: align WAKE_PHY handling with r8125/r8126 vendor drivers (jsc#PED-14353).\n- r8169: avoid duplicated messages if loading firmware fails and switch to warn level (jsc#PED-14353).\n- r8169: don\u0027t take RTNL lock in rtl_task() (jsc#PED-14353).\n- r8169: enable EEE at 2.5G per default on RTL8125B (jsc#PED-14353).\n- r8169: enable RTL8168H/RTL8168EP/RTL8168FP ASPM support (jsc#PED-14353).\n- r8169: fix inconsistent indenting in rtl8169_get_eth_mac_stats (jsc#PED-14353).\n- r8169: implement additional ethtool stats ops (jsc#PED-14353).\n- r8169: improve __rtl8169_set_wol (jsc#PED-14353).\n- r8169: improve initialization of RSS registers on RTL8125/RTL8126 (jsc#PED-14353).\n- r8169: improve rtl_set_d3_pll_down (jsc#PED-14353).\n- r8169: increase max jumbo packet size on RTL8125/RTL8126 (jsc#PED-14353).\n- r8169: remove leftover locks after reverted change (jsc#PED-14353).\n- r8169: remove original workaround for RTL8125 broken rx issue (jsc#PED-14353).\n- r8169: remove rtl_dash_loop_wait_high/low (jsc#PED-14353).\n- r8169: remove support for chip version 11 (jsc#PED-14353).\n- r8169: remove unused flag RTL_FLAG_TASK_RESET_NO_QUEUE_WAKE (jsc#PED-14353).\n- r8169: replace custom flag with disable_work() et al (jsc#PED-14353).\n- r8169: switch away from deprecated pcim_iomap_table (jsc#PED-14353).\n- r8169: use helper r8169_mod_reg8_cond to simplify rtl_jumbo_config (jsc#PED-14353).\n- ring-buffer: Update pages_touched to reflect persistent buffer content (git-fixes).\n- s390/mm: Fix __ptep_rdp() inline assembly (bsc#1253643).\n- sched/fair: Get rid of sched_domains_curr_level hack for tl-\u003ecpumask() (bsc#1246843).\n- sched/fair: Have SD_SERIALIZE affect newidle balancing (bsc#1248792).\n- sched/fair: Proportional newidle balance (bsc#1248792).\n- sched/fair: Proportional newidle balance -KABI (bsc#1248792).\n- sched/fair: Revert max_newidle_lb_cost bump (bsc#1248792).\n- sched/fair: Skip sched_balance_running cmpxchg when balance is not due (bsc#1248792).\n- sched/fair: Small cleanup to sched_balance_newidle() (bsc#1248792).\n- sched/fair: Small cleanup to update_newidle_cost() (bsc#1248792).\n- scsi: lpfc: Add capability to register Platform Name ID to fabric (bsc#1254119).\n- scsi: lpfc: Allow support for BB credit recovery in point-to-point topology (bsc#1254119).\n- scsi: lpfc: Ensure unregistration of rpis for received PLOGIs (bsc#1254119).\n- scsi: lpfc: Fix leaked ndlp krefs when in point-to-point topology (bsc#1254119).\n- scsi: lpfc: Fix reusing an ndlp that is marked NLP_DROPPED during FLOGI (bsc#1254119).\n- scsi: lpfc: Modify kref handling for Fabric Controller ndlps (bsc#1254119).\n- scsi: lpfc: Remove redundant NULL ptr assignment in lpfc_els_free_iocb() (bsc#1254119).\n- scsi: lpfc: Revise discovery related function headers and comments (bsc#1254119).\n- scsi: lpfc: Update lpfc version to 14.4.0.12 (bsc#1254119).\n- scsi: lpfc: Update various NPIV diagnostic log messaging (bsc#1254119).\n- selftests/run_kselftest.sh: Add `--skip` argument option (bsc#1254221).\n- smpboot: introduce SDTL_INIT() helper to tidy sched topology setup (bsc#1246843).\n- soc/tegra: fuse: speedo-tegra210: Update speedo IDs (git-fixes).\n- spi: tegra210-quad: Check hardware status on timeout (bsc#1253155)\n- spi: tegra210-quad: Fix timeout handling (bsc#1253155)\n- spi: tegra210-quad: Refactor error handling into helper functions (bsc#1253155)\n- spi: tegra210-quad: Update dummy sequence configuration (git-fixes)\n- tcp_bpf: Call sk_msg_free() when tcp_bpf_send_verdict() fails to allocate psock-\u003ecork (bsc#1250705).\n- wifi: ath11k: Add quirk entries for Thinkpad T14s Gen3 AMD (bsc#1254181).\n- wifi: mt76: do not add wcid entries to sta poll list during MCU reset (bsc#1254315).\n- wifi: mt76: introduce mt792x_config_mac_addr_list routine (bsc#1254315).\n- wifi: mt76: mt7925: Fix logical vs bitwise typo (bsc#1254315).\n- wifi: mt76: mt7925: Remove unnecessary if-check (bsc#1254315).\n- wifi: mt76: mt7925: Simplify HIF suspend handling to avoid suspend fail (bsc#1254315).\n- wifi: mt76: mt7925: add EHT control support based on the CLC data (bsc#1254315).\n- wifi: mt76: mt7925: add handler to hif suspend/resume event (bsc#1254315).\n- wifi: mt76: mt7925: add pci restore for hibernate (bsc#1254315).\n- wifi: mt76: mt7925: config the dwell time by firmware (bsc#1254315).\n- wifi: mt76: mt7925: extend MCU support for testmode (bsc#1254315).\n- wifi: mt76: mt7925: fix CLC command timeout when suspend/resume (bsc#1254315).\n- wifi: mt76: mt7925: fix missing hdr_trans_tlv command for broadcast wtbl (bsc#1254315).\n- wifi: mt76: mt7925: fix the unfinished command of regd_notifier before suspend (bsc#1254315).\n- wifi: mt76: mt7925: refine the txpower initialization flow (bsc#1254315).\n- wifi: mt76: mt7925: replace zero-length array with flexible-array member (bsc#1254315).\n- wifi: mt76: mt7925: update the channel usage when the regd domain changed (bsc#1254315).\n- wifi: mt76: mt7925e: fix too long of wifi resume time (bsc#1254315).\n- x86/smpboot: avoid SMT domain attach/destroy if SMT is not enabled (bsc#1246843).\n- x86/smpboot: moves x86_topology to static initialize and truncate (bsc#1246843).\n- x86/smpboot: remove redundant CONFIG_SCHED_SMT (bsc#1246843).\n",
"title": "Description of the patch"
},
{
"category": "details",
"text": "SUSE-SLES-16.0-113",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2026_20015-1.json"
},
{
"category": "self",
"summary": "URL for SUSE-SU-2026:20015-1",
"url": "https://www.suse.com/support/update/announcement/2026/suse-su-202620015-1/"
},
{
"category": "self",
"summary": "E-Mail link for SUSE-SU-2026:20015-1",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-January/023727.html"
},
{
"category": "self",
"summary": "SUSE Bug 1235463",
"url": "https://bugzilla.suse.com/1235463"
},
{
"category": "self",
"summary": "SUSE Bug 1243474",
"url": "https://bugzilla.suse.com/1243474"
},
{
"category": "self",
"summary": "SUSE Bug 1245193",
"url": "https://bugzilla.suse.com/1245193"
},
{
"category": "self",
"summary": "SUSE Bug 1245431",
"url": "https://bugzilla.suse.com/1245431"
},
{
"category": "self",
"summary": "SUSE Bug 1245498",
"url": "https://bugzilla.suse.com/1245498"
},
{
"category": "self",
"summary": "SUSE Bug 1245499",
"url": "https://bugzilla.suse.com/1245499"
},
{
"category": "self",
"summary": "SUSE Bug 1246328",
"url": "https://bugzilla.suse.com/1246328"
},
{
"category": "self",
"summary": "SUSE Bug 1246843",
"url": "https://bugzilla.suse.com/1246843"
},
{
"category": "self",
"summary": "SUSE Bug 1247500",
"url": "https://bugzilla.suse.com/1247500"
},
{
"category": "self",
"summary": "SUSE Bug 1248792",
"url": "https://bugzilla.suse.com/1248792"
},
{
"category": "self",
"summary": "SUSE Bug 1249256",
"url": "https://bugzilla.suse.com/1249256"
},
{
"category": "self",
"summary": "SUSE Bug 1249397",
"url": "https://bugzilla.suse.com/1249397"
},
{
"category": "self",
"summary": "SUSE Bug 1249912",
"url": "https://bugzilla.suse.com/1249912"
},
{
"category": "self",
"summary": "SUSE Bug 1249977",
"url": "https://bugzilla.suse.com/1249977"
},
{
"category": "self",
"summary": "SUSE Bug 1249982",
"url": "https://bugzilla.suse.com/1249982"
},
{
"category": "self",
"summary": "SUSE Bug 1250034",
"url": "https://bugzilla.suse.com/1250034"
},
{
"category": "self",
"summary": "SUSE Bug 1250176",
"url": "https://bugzilla.suse.com/1250176"
},
{
"category": "self",
"summary": "SUSE Bug 1250237",
"url": "https://bugzilla.suse.com/1250237"
},
{
"category": "self",
"summary": "SUSE Bug 1250252",
"url": "https://bugzilla.suse.com/1250252"
},
{
"category": "self",
"summary": "SUSE Bug 1250705",
"url": "https://bugzilla.suse.com/1250705"
},
{
"category": "self",
"summary": "SUSE Bug 1250723",
"url": "https://bugzilla.suse.com/1250723"
},
{
"category": "self",
"summary": "SUSE Bug 1250746",
"url": "https://bugzilla.suse.com/1250746"
},
{
"category": "self",
"summary": "SUSE Bug 1251120",
"url": "https://bugzilla.suse.com/1251120"
},
{
"category": "self",
"summary": "SUSE Bug 1251817",
"url": "https://bugzilla.suse.com/1251817"
},
{
"category": "self",
"summary": "SUSE Bug 1252054",
"url": "https://bugzilla.suse.com/1252054"
},
{
"category": "self",
"summary": "SUSE Bug 1252063",
"url": "https://bugzilla.suse.com/1252063"
},
{
"category": "self",
"summary": "SUSE Bug 1252301",
"url": "https://bugzilla.suse.com/1252301"
},
{
"category": "self",
"summary": "SUSE Bug 1252303",
"url": "https://bugzilla.suse.com/1252303"
},
{
"category": "self",
"summary": "SUSE Bug 1252342",
"url": "https://bugzilla.suse.com/1252342"
},
{
"category": "self",
"summary": "SUSE Bug 1252352",
"url": "https://bugzilla.suse.com/1252352"
},
{
"category": "self",
"summary": "SUSE Bug 1252357",
"url": "https://bugzilla.suse.com/1252357"
},
{
"category": "self",
"summary": "SUSE Bug 1252681",
"url": "https://bugzilla.suse.com/1252681"
},
{
"category": "self",
"summary": "SUSE Bug 1252686",
"url": "https://bugzilla.suse.com/1252686"
},
{
"category": "self",
"summary": "SUSE Bug 1252763",
"url": "https://bugzilla.suse.com/1252763"
},
{
"category": "self",
"summary": "SUSE Bug 1252776",
"url": "https://bugzilla.suse.com/1252776"
},
{
"category": "self",
"summary": "SUSE Bug 1252779",
"url": "https://bugzilla.suse.com/1252779"
},
{
"category": "self",
"summary": "SUSE Bug 1252790",
"url": "https://bugzilla.suse.com/1252790"
},
{
"category": "self",
"summary": "SUSE Bug 1252794",
"url": "https://bugzilla.suse.com/1252794"
},
{
"category": "self",
"summary": "SUSE Bug 1252795",
"url": "https://bugzilla.suse.com/1252795"
},
{
"category": "self",
"summary": "SUSE Bug 1252808",
"url": "https://bugzilla.suse.com/1252808"
},
{
"category": "self",
"summary": "SUSE Bug 1252809",
"url": "https://bugzilla.suse.com/1252809"
},
{
"category": "self",
"summary": "SUSE Bug 1252817",
"url": "https://bugzilla.suse.com/1252817"
},
{
"category": "self",
"summary": "SUSE Bug 1252821",
"url": "https://bugzilla.suse.com/1252821"
},
{
"category": "self",
"summary": "SUSE Bug 1252824",
"url": "https://bugzilla.suse.com/1252824"
},
{
"category": "self",
"summary": "SUSE Bug 1252836",
"url": "https://bugzilla.suse.com/1252836"
},
{
"category": "self",
"summary": "SUSE Bug 1252845",
"url": "https://bugzilla.suse.com/1252845"
},
{
"category": "self",
"summary": "SUSE Bug 1252901",
"url": "https://bugzilla.suse.com/1252901"
},
{
"category": "self",
"summary": "SUSE Bug 1252912",
"url": "https://bugzilla.suse.com/1252912"
},
{
"category": "self",
"summary": "SUSE Bug 1252917",
"url": "https://bugzilla.suse.com/1252917"
},
{
"category": "self",
"summary": "SUSE Bug 1252919",
"url": "https://bugzilla.suse.com/1252919"
},
{
"category": "self",
"summary": "SUSE Bug 1252923",
"url": "https://bugzilla.suse.com/1252923"
},
{
"category": "self",
"summary": "SUSE Bug 1252928",
"url": "https://bugzilla.suse.com/1252928"
},
{
"category": "self",
"summary": "SUSE Bug 1253018",
"url": "https://bugzilla.suse.com/1253018"
},
{
"category": "self",
"summary": "SUSE Bug 1253155",
"url": "https://bugzilla.suse.com/1253155"
},
{
"category": "self",
"summary": "SUSE Bug 1253176",
"url": "https://bugzilla.suse.com/1253176"
},
{
"category": "self",
"summary": "SUSE Bug 1253238",
"url": "https://bugzilla.suse.com/1253238"
},
{
"category": "self",
"summary": "SUSE Bug 1253275",
"url": "https://bugzilla.suse.com/1253275"
},
{
"category": "self",
"summary": "SUSE Bug 1253318",
"url": "https://bugzilla.suse.com/1253318"
},
{
"category": "self",
"summary": "SUSE Bug 1253324",
"url": "https://bugzilla.suse.com/1253324"
},
{
"category": "self",
"summary": "SUSE Bug 1253328",
"url": "https://bugzilla.suse.com/1253328"
},
{
"category": "self",
"summary": "SUSE Bug 1253330",
"url": "https://bugzilla.suse.com/1253330"
},
{
"category": "self",
"summary": "SUSE Bug 1253342",
"url": "https://bugzilla.suse.com/1253342"
},
{
"category": "self",
"summary": "SUSE Bug 1253348",
"url": "https://bugzilla.suse.com/1253348"
},
{
"category": "self",
"summary": "SUSE Bug 1253349",
"url": "https://bugzilla.suse.com/1253349"
},
{
"category": "self",
"summary": "SUSE Bug 1253352",
"url": "https://bugzilla.suse.com/1253352"
},
{
"category": "self",
"summary": "SUSE Bug 1253355",
"url": "https://bugzilla.suse.com/1253355"
},
{
"category": "self",
"summary": "SUSE Bug 1253360",
"url": "https://bugzilla.suse.com/1253360"
},
{
"category": "self",
"summary": "SUSE Bug 1253362",
"url": "https://bugzilla.suse.com/1253362"
},
{
"category": "self",
"summary": "SUSE Bug 1253363",
"url": "https://bugzilla.suse.com/1253363"
},
{
"category": "self",
"summary": "SUSE Bug 1253367",
"url": "https://bugzilla.suse.com/1253367"
},
{
"category": "self",
"summary": "SUSE Bug 1253369",
"url": "https://bugzilla.suse.com/1253369"
},
{
"category": "self",
"summary": "SUSE Bug 1253386",
"url": "https://bugzilla.suse.com/1253386"
},
{
"category": "self",
"summary": "SUSE Bug 1253394",
"url": "https://bugzilla.suse.com/1253394"
},
{
"category": "self",
"summary": "SUSE Bug 1253395",
"url": "https://bugzilla.suse.com/1253395"
},
{
"category": "self",
"summary": "SUSE Bug 1253402",
"url": "https://bugzilla.suse.com/1253402"
},
{
"category": "self",
"summary": "SUSE Bug 1253403",
"url": "https://bugzilla.suse.com/1253403"
},
{
"category": "self",
"summary": "SUSE Bug 1253405",
"url": "https://bugzilla.suse.com/1253405"
},
{
"category": "self",
"summary": "SUSE Bug 1253407",
"url": "https://bugzilla.suse.com/1253407"
},
{
"category": "self",
"summary": "SUSE Bug 1253408",
"url": "https://bugzilla.suse.com/1253408"
},
{
"category": "self",
"summary": "SUSE Bug 1253409",
"url": "https://bugzilla.suse.com/1253409"
},
{
"category": "self",
"summary": "SUSE Bug 1253410",
"url": "https://bugzilla.suse.com/1253410"
},
{
"category": "self",
"summary": "SUSE Bug 1253412",
"url": "https://bugzilla.suse.com/1253412"
},
{
"category": "self",
"summary": "SUSE Bug 1253416",
"url": "https://bugzilla.suse.com/1253416"
},
{
"category": "self",
"summary": "SUSE Bug 1253421",
"url": "https://bugzilla.suse.com/1253421"
},
{
"category": "self",
"summary": "SUSE Bug 1253422",
"url": "https://bugzilla.suse.com/1253422"
},
{
"category": "self",
"summary": "SUSE Bug 1253423",
"url": "https://bugzilla.suse.com/1253423"
},
{
"category": "self",
"summary": "SUSE Bug 1253424",
"url": "https://bugzilla.suse.com/1253424"
},
{
"category": "self",
"summary": "SUSE Bug 1253425",
"url": "https://bugzilla.suse.com/1253425"
},
{
"category": "self",
"summary": "SUSE Bug 1253426",
"url": "https://bugzilla.suse.com/1253426"
},
{
"category": "self",
"summary": "SUSE Bug 1253427",
"url": "https://bugzilla.suse.com/1253427"
},
{
"category": "self",
"summary": "SUSE Bug 1253428",
"url": "https://bugzilla.suse.com/1253428"
},
{
"category": "self",
"summary": "SUSE Bug 1253431",
"url": "https://bugzilla.suse.com/1253431"
},
{
"category": "self",
"summary": "SUSE Bug 1253433",
"url": "https://bugzilla.suse.com/1253433"
},
{
"category": "self",
"summary": "SUSE Bug 1253436",
"url": "https://bugzilla.suse.com/1253436"
},
{
"category": "self",
"summary": "SUSE Bug 1253438",
"url": "https://bugzilla.suse.com/1253438"
},
{
"category": "self",
"summary": "SUSE Bug 1253440",
"url": "https://bugzilla.suse.com/1253440"
},
{
"category": "self",
"summary": "SUSE Bug 1253441",
"url": "https://bugzilla.suse.com/1253441"
},
{
"category": "self",
"summary": "SUSE Bug 1253443",
"url": "https://bugzilla.suse.com/1253443"
},
{
"category": "self",
"summary": "SUSE Bug 1253445",
"url": "https://bugzilla.suse.com/1253445"
},
{
"category": "self",
"summary": "SUSE Bug 1253448",
"url": "https://bugzilla.suse.com/1253448"
},
{
"category": "self",
"summary": "SUSE Bug 1253449",
"url": "https://bugzilla.suse.com/1253449"
},
{
"category": "self",
"summary": "SUSE Bug 1253450",
"url": "https://bugzilla.suse.com/1253450"
},
{
"category": "self",
"summary": "SUSE Bug 1253451",
"url": "https://bugzilla.suse.com/1253451"
},
{
"category": "self",
"summary": "SUSE Bug 1253453",
"url": "https://bugzilla.suse.com/1253453"
},
{
"category": "self",
"summary": "SUSE Bug 1253455",
"url": "https://bugzilla.suse.com/1253455"
},
{
"category": "self",
"summary": "SUSE Bug 1253456",
"url": "https://bugzilla.suse.com/1253456"
},
{
"category": "self",
"summary": "SUSE Bug 1253457",
"url": "https://bugzilla.suse.com/1253457"
},
{
"category": "self",
"summary": "SUSE Bug 1253463",
"url": "https://bugzilla.suse.com/1253463"
},
{
"category": "self",
"summary": "SUSE Bug 1253472",
"url": "https://bugzilla.suse.com/1253472"
},
{
"category": "self",
"summary": "SUSE Bug 1253622",
"url": "https://bugzilla.suse.com/1253622"
},
{
"category": "self",
"summary": "SUSE Bug 1253624",
"url": "https://bugzilla.suse.com/1253624"
},
{
"category": "self",
"summary": "SUSE Bug 1253635",
"url": "https://bugzilla.suse.com/1253635"
},
{
"category": "self",
"summary": "SUSE Bug 1253643",
"url": "https://bugzilla.suse.com/1253643"
},
{
"category": "self",
"summary": "SUSE Bug 1253647",
"url": "https://bugzilla.suse.com/1253647"
},
{
"category": "self",
"summary": "SUSE Bug 1254119",
"url": "https://bugzilla.suse.com/1254119"
},
{
"category": "self",
"summary": "SUSE Bug 1254181",
"url": "https://bugzilla.suse.com/1254181"
},
{
"category": "self",
"summary": "SUSE Bug 1254221",
"url": "https://bugzilla.suse.com/1254221"
},
{
"category": "self",
"summary": "SUSE Bug 1254308",
"url": "https://bugzilla.suse.com/1254308"
},
{
"category": "self",
"summary": "SUSE Bug 1254315",
"url": "https://bugzilla.suse.com/1254315"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-50253 page",
"url": "https://www.suse.com/security/cve/CVE-2022-50253/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-37916 page",
"url": "https://www.suse.com/security/cve/CVE-2025-37916/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-38084 page",
"url": "https://www.suse.com/security/cve/CVE-2025-38084/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-38085 page",
"url": "https://www.suse.com/security/cve/CVE-2025-38085/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-38321 page",
"url": "https://www.suse.com/security/cve/CVE-2025-38321/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-38728 page",
"url": "https://www.suse.com/security/cve/CVE-2025-38728/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-39805 page",
"url": "https://www.suse.com/security/cve/CVE-2025-39805/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-39819 page",
"url": "https://www.suse.com/security/cve/CVE-2025-39819/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-39822 page",
"url": "https://www.suse.com/security/cve/CVE-2025-39822/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-39831 page",
"url": "https://www.suse.com/security/cve/CVE-2025-39831/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-39859 page",
"url": "https://www.suse.com/security/cve/CVE-2025-39859/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-39897 page",
"url": "https://www.suse.com/security/cve/CVE-2025-39897/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-39917 page",
"url": "https://www.suse.com/security/cve/CVE-2025-39917/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-39944 page",
"url": "https://www.suse.com/security/cve/CVE-2025-39944/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-39961 page",
"url": "https://www.suse.com/security/cve/CVE-2025-39961/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-39980 page",
"url": "https://www.suse.com/security/cve/CVE-2025-39980/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-39990 page",
"url": "https://www.suse.com/security/cve/CVE-2025-39990/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40001 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40001/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40003 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40003/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40006 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40006/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40021 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40021/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40024 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40024/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40027 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40027/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40031 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40031/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40033 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40033/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40038 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40038/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40047 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40047/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40053 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40053/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40055 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40055/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40059 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40059/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40064 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40064/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40070 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40070/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40074 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40074/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40075 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40075/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40081 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40081/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40083 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40083/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40086 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40086/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40098 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40098/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40101 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40101/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40102 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40102/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40105 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40105/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40107 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40107/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40109 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40109/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40110 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40110/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40111 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40111/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40115 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40115/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40116 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40116/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40118 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40118/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40120 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40120/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40121 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40121/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40127 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40127/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40129 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40129/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40132 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40132/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40133 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40133/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40134 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40134/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40135 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40135/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40139 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40139/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40140 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40140/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40141 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40141/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40142 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40142/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40149 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40149/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40153 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40153/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40154 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40154/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40156 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40156/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40157 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40157/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40158 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40158/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40159 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40159/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40161 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40161/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40162 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40162/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40164 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40164/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40165 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40165/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40166 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40166/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40168 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40168/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40169 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40169/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40171 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40171/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40172 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40172/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40173 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40173/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40175 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40175/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40176 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40176/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40177 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40177/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40178 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40178/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40180 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40180/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40183 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40183/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40185 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40185/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40186 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40186/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40187 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40187/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40188 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40188/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40192 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40192/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40194 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40194/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40196 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40196/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40197 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40197/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40198 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40198/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40200 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40200/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40201 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40201/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40202 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40202/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40203 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40203/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40204 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40204/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40205 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40205/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40206 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40206/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40207 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40207/"
}
],
"title": "Security update for the Linux Kernel",
"tracking": {
"current_release_date": "2025-12-19T16:46:47Z",
"generator": {
"date": "2025-12-19T16:46:47Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "SUSE-SU-2026:20015-1",
"initial_release_date": "2025-12-19T16:46:47Z",
"revision_history": [
{
"date": "2025-12-19T16:46:47Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "kernel-64kb-6.12.0-160000.8.1.aarch64",
"product": {
"name": "kernel-64kb-6.12.0-160000.8.1.aarch64",
"product_id": "kernel-64kb-6.12.0-160000.8.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"product": {
"name": "kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"product_id": "kernel-64kb-devel-6.12.0-160000.8.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"product": {
"name": "kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"product_id": "kernel-64kb-extra-6.12.0-160000.8.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-default-6.12.0-160000.8.1.aarch64",
"product": {
"name": "kernel-default-6.12.0-160000.8.1.aarch64",
"product_id": "kernel-default-6.12.0-160000.8.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"product": {
"name": "kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"product_id": "kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-default-devel-6.12.0-160000.8.1.aarch64",
"product": {
"name": "kernel-default-devel-6.12.0-160000.8.1.aarch64",
"product_id": "kernel-default-devel-6.12.0-160000.8.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-default-extra-6.12.0-160000.8.1.aarch64",
"product": {
"name": "kernel-default-extra-6.12.0-160000.8.1.aarch64",
"product_id": "kernel-default-extra-6.12.0-160000.8.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"product": {
"name": "kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"product_id": "kernel-kvmsmall-6.12.0-160000.8.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"product": {
"name": "kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"product_id": "kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"product": {
"name": "kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"product_id": "kernel-obs-qa-6.12.0-160000.8.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-syms-6.12.0-160000.8.1.aarch64",
"product": {
"name": "kernel-syms-6.12.0-160000.8.1.aarch64",
"product_id": "kernel-syms-6.12.0-160000.8.1.aarch64"
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-devel-6.12.0-160000.8.1.noarch",
"product": {
"name": "kernel-devel-6.12.0-160000.8.1.noarch",
"product_id": "kernel-devel-6.12.0-160000.8.1.noarch"
}
},
{
"category": "product_version",
"name": "kernel-docs-6.12.0-160000.8.1.noarch",
"product": {
"name": "kernel-docs-6.12.0-160000.8.1.noarch",
"product_id": "kernel-docs-6.12.0-160000.8.1.noarch"
}
},
{
"category": "product_version",
"name": "kernel-docs-html-6.12.0-160000.8.1.noarch",
"product": {
"name": "kernel-docs-html-6.12.0-160000.8.1.noarch",
"product_id": "kernel-docs-html-6.12.0-160000.8.1.noarch"
}
},
{
"category": "product_version",
"name": "kernel-macros-6.12.0-160000.8.1.noarch",
"product": {
"name": "kernel-macros-6.12.0-160000.8.1.noarch",
"product_id": "kernel-macros-6.12.0-160000.8.1.noarch"
}
},
{
"category": "product_version",
"name": "kernel-source-6.12.0-160000.8.1.noarch",
"product": {
"name": "kernel-source-6.12.0-160000.8.1.noarch",
"product_id": "kernel-source-6.12.0-160000.8.1.noarch"
}
},
{
"category": "product_version",
"name": "kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"product": {
"name": "kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"product_id": "kernel-source-vanilla-6.12.0-160000.8.1.noarch"
}
}
],
"category": "architecture",
"name": "noarch"
},
{
"branches": [
{
"category": "product_version",
"name": "cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"product": {
"name": "cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"product_id": "cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le"
}
},
{
"category": "product_version",
"name": "dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"product": {
"name": "dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"product_id": "dlm-kmp-default-6.12.0-160000.8.1.ppc64le"
}
},
{
"category": "product_version",
"name": "gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"product": {
"name": "gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"product_id": "gfs2-kmp-default-6.12.0-160000.8.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-default-6.12.0-160000.8.1.ppc64le",
"product": {
"name": "kernel-default-6.12.0-160000.8.1.ppc64le",
"product_id": "kernel-default-6.12.0-160000.8.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"product": {
"name": "kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"product_id": "kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"product": {
"name": "kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"product_id": "kernel-default-devel-6.12.0-160000.8.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"product": {
"name": "kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"product_id": "kernel-default-extra-6.12.0-160000.8.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"product": {
"name": "kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"product_id": "kernel-default-livepatch-6.12.0-160000.8.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"product": {
"name": "kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"product_id": "kernel-kvmsmall-6.12.0-160000.8.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"product": {
"name": "kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"product_id": "kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"product": {
"name": "kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"product_id": "kernel-obs-qa-6.12.0-160000.8.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-syms-6.12.0-160000.8.1.ppc64le",
"product": {
"name": "kernel-syms-6.12.0-160000.8.1.ppc64le",
"product_id": "kernel-syms-6.12.0-160000.8.1.ppc64le"
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-default-6.12.0-160000.8.1.s390x",
"product": {
"name": "kernel-default-6.12.0-160000.8.1.s390x",
"product_id": "kernel-default-6.12.0-160000.8.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-default-devel-6.12.0-160000.8.1.s390x",
"product": {
"name": "kernel-default-devel-6.12.0-160000.8.1.s390x",
"product_id": "kernel-default-devel-6.12.0-160000.8.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-default-extra-6.12.0-160000.8.1.s390x",
"product": {
"name": "kernel-default-extra-6.12.0-160000.8.1.s390x",
"product_id": "kernel-default-extra-6.12.0-160000.8.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"product": {
"name": "kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"product_id": "kernel-default-livepatch-6.12.0-160000.8.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-obs-qa-6.12.0-160000.8.1.s390x",
"product": {
"name": "kernel-obs-qa-6.12.0-160000.8.1.s390x",
"product_id": "kernel-obs-qa-6.12.0-160000.8.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-syms-6.12.0-160000.8.1.s390x",
"product": {
"name": "kernel-syms-6.12.0-160000.8.1.s390x",
"product_id": "kernel-syms-6.12.0-160000.8.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"product": {
"name": "kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"product_id": "kernel-zfcpdump-6.12.0-160000.8.1.s390x"
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"product": {
"name": "cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"product_id": "cluster-md-kmp-default-6.12.0-160000.8.1.x86_64"
}
},
{
"category": "product_version",
"name": "dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"product": {
"name": "dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"product_id": "dlm-kmp-default-6.12.0-160000.8.1.x86_64"
}
},
{
"category": "product_version",
"name": "gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"product": {
"name": "gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"product_id": "gfs2-kmp-default-6.12.0-160000.8.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-default-6.12.0-160000.8.1.x86_64",
"product": {
"name": "kernel-default-6.12.0-160000.8.1.x86_64",
"product_id": "kernel-default-6.12.0-160000.8.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"product": {
"name": "kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"product_id": "kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-default-devel-6.12.0-160000.8.1.x86_64",
"product": {
"name": "kernel-default-devel-6.12.0-160000.8.1.x86_64",
"product_id": "kernel-default-devel-6.12.0-160000.8.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-default-extra-6.12.0-160000.8.1.x86_64",
"product": {
"name": "kernel-default-extra-6.12.0-160000.8.1.x86_64",
"product_id": "kernel-default-extra-6.12.0-160000.8.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"product": {
"name": "kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"product_id": "kernel-default-livepatch-6.12.0-160000.8.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"product": {
"name": "kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"product_id": "kernel-default-vdso-6.12.0-160000.8.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"product": {
"name": "kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"product_id": "kernel-kvmsmall-6.12.0-160000.8.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"product": {
"name": "kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"product_id": "kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"product": {
"name": "kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"product_id": "kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"product": {
"name": "kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"product_id": "kernel-obs-qa-6.12.0-160000.8.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-syms-6.12.0-160000.8.1.x86_64",
"product": {
"name": "kernel-syms-6.12.0-160000.8.1.x86_64",
"product_id": "kernel-syms-6.12.0-160000.8.1.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "SUSE Linux Enterprise Server 16.0",
"product": {
"name": "SUSE Linux Enterprise Server 16.0",
"product_id": "SUSE Linux Enterprise Server 16.0",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sles:16.0"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Server for SAP applications 16.0",
"product": {
"name": "SUSE Linux Enterprise Server for SAP applications 16.0",
"product_id": "SUSE Linux Enterprise Server for SAP applications 16.0",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sles:16:16.0:server-sap"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le as component of SUSE Linux Enterprise Server 16.0",
"product_id": "SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le"
},
"product_reference": "cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cluster-md-kmp-default-6.12.0-160000.8.1.x86_64 as component of SUSE Linux Enterprise Server 16.0",
"product_id": "SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64"
},
"product_reference": "cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dlm-kmp-default-6.12.0-160000.8.1.ppc64le as component of SUSE Linux Enterprise Server 16.0",
"product_id": "SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le"
},
"product_reference": "dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dlm-kmp-default-6.12.0-160000.8.1.x86_64 as component of SUSE Linux Enterprise Server 16.0",
"product_id": "SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64"
},
"product_reference": "dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gfs2-kmp-default-6.12.0-160000.8.1.ppc64le as component of SUSE Linux Enterprise Server 16.0",
"product_id": "SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le"
},
"product_reference": "gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gfs2-kmp-default-6.12.0-160000.8.1.x86_64 as component of SUSE Linux Enterprise Server 16.0",
"product_id": "SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64"
},
"product_reference": "gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-64kb-6.12.0-160000.8.1.aarch64 as component of SUSE Linux Enterprise Server 16.0",
"product_id": "SUSE Linux Enterprise Server 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64"
},
"product_reference": "kernel-64kb-6.12.0-160000.8.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-64kb-devel-6.12.0-160000.8.1.aarch64 as component of SUSE Linux Enterprise Server 16.0",
"product_id": "SUSE Linux Enterprise Server 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64"
},
"product_reference": "kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-64kb-extra-6.12.0-160000.8.1.aarch64 as component of SUSE Linux Enterprise Server 16.0",
"product_id": "SUSE Linux Enterprise Server 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64"
},
"product_reference": "kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-6.12.0-160000.8.1.aarch64 as component of SUSE Linux Enterprise Server 16.0",
"product_id": "SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.aarch64"
},
"product_reference": "kernel-default-6.12.0-160000.8.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-6.12.0-160000.8.1.ppc64le as component of SUSE Linux Enterprise Server 16.0",
"product_id": "SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.ppc64le"
},
"product_reference": "kernel-default-6.12.0-160000.8.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-6.12.0-160000.8.1.s390x as component of SUSE Linux Enterprise Server 16.0",
"product_id": "SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.s390x"
},
"product_reference": "kernel-default-6.12.0-160000.8.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-6.12.0-160000.8.1.x86_64 as component of SUSE Linux Enterprise Server 16.0",
"product_id": "SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.x86_64"
},
"product_reference": "kernel-default-6.12.0-160000.8.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64 as component of SUSE Linux Enterprise Server 16.0",
"product_id": "SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64"
},
"product_reference": "kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le as component of SUSE Linux Enterprise Server 16.0",
"product_id": "SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le"
},
"product_reference": "kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64 as component of SUSE Linux Enterprise Server 16.0",
"product_id": "SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64"
},
"product_reference": "kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-devel-6.12.0-160000.8.1.aarch64 as component of SUSE Linux Enterprise Server 16.0",
"product_id": "SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64"
},
"product_reference": "kernel-default-devel-6.12.0-160000.8.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-devel-6.12.0-160000.8.1.ppc64le as component of SUSE Linux Enterprise Server 16.0",
"product_id": "SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le"
},
"product_reference": "kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-devel-6.12.0-160000.8.1.s390x as component of SUSE Linux Enterprise Server 16.0",
"product_id": "SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x"
},
"product_reference": "kernel-default-devel-6.12.0-160000.8.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-devel-6.12.0-160000.8.1.x86_64 as component of SUSE Linux Enterprise Server 16.0",
"product_id": "SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64"
},
"product_reference": "kernel-default-devel-6.12.0-160000.8.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-extra-6.12.0-160000.8.1.aarch64 as component of SUSE Linux Enterprise Server 16.0",
"product_id": "SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64"
},
"product_reference": "kernel-default-extra-6.12.0-160000.8.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-extra-6.12.0-160000.8.1.ppc64le as component of SUSE Linux Enterprise Server 16.0",
"product_id": "SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le"
},
"product_reference": "kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-extra-6.12.0-160000.8.1.s390x as component of SUSE Linux Enterprise Server 16.0",
"product_id": "SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x"
},
"product_reference": "kernel-default-extra-6.12.0-160000.8.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-extra-6.12.0-160000.8.1.x86_64 as component of SUSE Linux Enterprise Server 16.0",
"product_id": "SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64"
},
"product_reference": "kernel-default-extra-6.12.0-160000.8.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-livepatch-6.12.0-160000.8.1.ppc64le as component of SUSE Linux Enterprise Server 16.0",
"product_id": "SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le"
},
"product_reference": "kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-livepatch-6.12.0-160000.8.1.s390x as component of SUSE Linux Enterprise Server 16.0",
"product_id": "SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x"
},
"product_reference": "kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-livepatch-6.12.0-160000.8.1.x86_64 as component of SUSE Linux Enterprise Server 16.0",
"product_id": "SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64"
},
"product_reference": "kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-vdso-6.12.0-160000.8.1.x86_64 as component of SUSE Linux Enterprise Server 16.0",
"product_id": "SUSE Linux Enterprise Server 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64"
},
"product_reference": "kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-6.12.0-160000.8.1.noarch as component of SUSE Linux Enterprise Server 16.0",
"product_id": "SUSE Linux Enterprise Server 16.0:kernel-devel-6.12.0-160000.8.1.noarch"
},
"product_reference": "kernel-devel-6.12.0-160000.8.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Server 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-docs-6.12.0-160000.8.1.noarch as component of SUSE Linux Enterprise Server 16.0",
"product_id": "SUSE Linux Enterprise Server 16.0:kernel-docs-6.12.0-160000.8.1.noarch"
},
"product_reference": "kernel-docs-6.12.0-160000.8.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Server 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-docs-html-6.12.0-160000.8.1.noarch as component of SUSE Linux Enterprise Server 16.0",
"product_id": "SUSE Linux Enterprise Server 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch"
},
"product_reference": "kernel-docs-html-6.12.0-160000.8.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Server 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kvmsmall-6.12.0-160000.8.1.aarch64 as component of SUSE Linux Enterprise Server 16.0",
"product_id": "SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64"
},
"product_reference": "kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kvmsmall-6.12.0-160000.8.1.ppc64le as component of SUSE Linux Enterprise Server 16.0",
"product_id": "SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le"
},
"product_reference": "kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kvmsmall-6.12.0-160000.8.1.x86_64 as component of SUSE Linux Enterprise Server 16.0",
"product_id": "SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64"
},
"product_reference": "kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64 as component of SUSE Linux Enterprise Server 16.0",
"product_id": "SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64"
},
"product_reference": "kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le as component of SUSE Linux Enterprise Server 16.0",
"product_id": "SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le"
},
"product_reference": "kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64 as component of SUSE Linux Enterprise Server 16.0",
"product_id": "SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64"
},
"product_reference": "kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64 as component of SUSE Linux Enterprise Server 16.0",
"product_id": "SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64"
},
"product_reference": "kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-macros-6.12.0-160000.8.1.noarch as component of SUSE Linux Enterprise Server 16.0",
"product_id": "SUSE Linux Enterprise Server 16.0:kernel-macros-6.12.0-160000.8.1.noarch"
},
"product_reference": "kernel-macros-6.12.0-160000.8.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Server 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-obs-qa-6.12.0-160000.8.1.aarch64 as component of SUSE Linux Enterprise Server 16.0",
"product_id": "SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64"
},
"product_reference": "kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-obs-qa-6.12.0-160000.8.1.ppc64le as component of SUSE Linux Enterprise Server 16.0",
"product_id": "SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le"
},
"product_reference": "kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-obs-qa-6.12.0-160000.8.1.s390x as component of SUSE Linux Enterprise Server 16.0",
"product_id": "SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x"
},
"product_reference": "kernel-obs-qa-6.12.0-160000.8.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-obs-qa-6.12.0-160000.8.1.x86_64 as component of SUSE Linux Enterprise Server 16.0",
"product_id": "SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64"
},
"product_reference": "kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-source-6.12.0-160000.8.1.noarch as component of SUSE Linux Enterprise Server 16.0",
"product_id": "SUSE Linux Enterprise Server 16.0:kernel-source-6.12.0-160000.8.1.noarch"
},
"product_reference": "kernel-source-6.12.0-160000.8.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Server 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-source-vanilla-6.12.0-160000.8.1.noarch as component of SUSE Linux Enterprise Server 16.0",
"product_id": "SUSE Linux Enterprise Server 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch"
},
"product_reference": "kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Server 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-6.12.0-160000.8.1.aarch64 as component of SUSE Linux Enterprise Server 16.0",
"product_id": "SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.aarch64"
},
"product_reference": "kernel-syms-6.12.0-160000.8.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-6.12.0-160000.8.1.ppc64le as component of SUSE Linux Enterprise Server 16.0",
"product_id": "SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le"
},
"product_reference": "kernel-syms-6.12.0-160000.8.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-6.12.0-160000.8.1.s390x as component of SUSE Linux Enterprise Server 16.0",
"product_id": "SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.s390x"
},
"product_reference": "kernel-syms-6.12.0-160000.8.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-6.12.0-160000.8.1.x86_64 as component of SUSE Linux Enterprise Server 16.0",
"product_id": "SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.x86_64"
},
"product_reference": "kernel-syms-6.12.0-160000.8.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-6.12.0-160000.8.1.s390x as component of SUSE Linux Enterprise Server 16.0",
"product_id": "SUSE Linux Enterprise Server 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x"
},
"product_reference": "kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le as component of SUSE Linux Enterprise Server for SAP applications 16.0",
"product_id": "SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le"
},
"product_reference": "cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP applications 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cluster-md-kmp-default-6.12.0-160000.8.1.x86_64 as component of SUSE Linux Enterprise Server for SAP applications 16.0",
"product_id": "SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64"
},
"product_reference": "cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP applications 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dlm-kmp-default-6.12.0-160000.8.1.ppc64le as component of SUSE Linux Enterprise Server for SAP applications 16.0",
"product_id": "SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le"
},
"product_reference": "dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP applications 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dlm-kmp-default-6.12.0-160000.8.1.x86_64 as component of SUSE Linux Enterprise Server for SAP applications 16.0",
"product_id": "SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64"
},
"product_reference": "dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP applications 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gfs2-kmp-default-6.12.0-160000.8.1.ppc64le as component of SUSE Linux Enterprise Server for SAP applications 16.0",
"product_id": "SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le"
},
"product_reference": "gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP applications 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gfs2-kmp-default-6.12.0-160000.8.1.x86_64 as component of SUSE Linux Enterprise Server for SAP applications 16.0",
"product_id": "SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64"
},
"product_reference": "gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP applications 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-64kb-6.12.0-160000.8.1.aarch64 as component of SUSE Linux Enterprise Server for SAP applications 16.0",
"product_id": "SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64"
},
"product_reference": "kernel-64kb-6.12.0-160000.8.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP applications 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-64kb-devel-6.12.0-160000.8.1.aarch64 as component of SUSE Linux Enterprise Server for SAP applications 16.0",
"product_id": "SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64"
},
"product_reference": "kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP applications 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-64kb-extra-6.12.0-160000.8.1.aarch64 as component of SUSE Linux Enterprise Server for SAP applications 16.0",
"product_id": "SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64"
},
"product_reference": "kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP applications 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-6.12.0-160000.8.1.aarch64 as component of SUSE Linux Enterprise Server for SAP applications 16.0",
"product_id": "SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.aarch64"
},
"product_reference": "kernel-default-6.12.0-160000.8.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP applications 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-6.12.0-160000.8.1.ppc64le as component of SUSE Linux Enterprise Server for SAP applications 16.0",
"product_id": "SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.ppc64le"
},
"product_reference": "kernel-default-6.12.0-160000.8.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP applications 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-6.12.0-160000.8.1.s390x as component of SUSE Linux Enterprise Server for SAP applications 16.0",
"product_id": "SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.s390x"
},
"product_reference": "kernel-default-6.12.0-160000.8.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP applications 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-6.12.0-160000.8.1.x86_64 as component of SUSE Linux Enterprise Server for SAP applications 16.0",
"product_id": "SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.x86_64"
},
"product_reference": "kernel-default-6.12.0-160000.8.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP applications 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64 as component of SUSE Linux Enterprise Server for SAP applications 16.0",
"product_id": "SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64"
},
"product_reference": "kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP applications 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le as component of SUSE Linux Enterprise Server for SAP applications 16.0",
"product_id": "SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le"
},
"product_reference": "kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP applications 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64 as component of SUSE Linux Enterprise Server for SAP applications 16.0",
"product_id": "SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64"
},
"product_reference": "kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP applications 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-devel-6.12.0-160000.8.1.aarch64 as component of SUSE Linux Enterprise Server for SAP applications 16.0",
"product_id": "SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64"
},
"product_reference": "kernel-default-devel-6.12.0-160000.8.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP applications 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-devel-6.12.0-160000.8.1.ppc64le as component of SUSE Linux Enterprise Server for SAP applications 16.0",
"product_id": "SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le"
},
"product_reference": "kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP applications 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-devel-6.12.0-160000.8.1.s390x as component of SUSE Linux Enterprise Server for SAP applications 16.0",
"product_id": "SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x"
},
"product_reference": "kernel-default-devel-6.12.0-160000.8.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP applications 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-devel-6.12.0-160000.8.1.x86_64 as component of SUSE Linux Enterprise Server for SAP applications 16.0",
"product_id": "SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64"
},
"product_reference": "kernel-default-devel-6.12.0-160000.8.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP applications 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-extra-6.12.0-160000.8.1.aarch64 as component of SUSE Linux Enterprise Server for SAP applications 16.0",
"product_id": "SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64"
},
"product_reference": "kernel-default-extra-6.12.0-160000.8.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP applications 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-extra-6.12.0-160000.8.1.ppc64le as component of SUSE Linux Enterprise Server for SAP applications 16.0",
"product_id": "SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le"
},
"product_reference": "kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP applications 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-extra-6.12.0-160000.8.1.s390x as component of SUSE Linux Enterprise Server for SAP applications 16.0",
"product_id": "SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x"
},
"product_reference": "kernel-default-extra-6.12.0-160000.8.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP applications 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-extra-6.12.0-160000.8.1.x86_64 as component of SUSE Linux Enterprise Server for SAP applications 16.0",
"product_id": "SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64"
},
"product_reference": "kernel-default-extra-6.12.0-160000.8.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP applications 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-livepatch-6.12.0-160000.8.1.ppc64le as component of SUSE Linux Enterprise Server for SAP applications 16.0",
"product_id": "SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le"
},
"product_reference": "kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP applications 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-livepatch-6.12.0-160000.8.1.s390x as component of SUSE Linux Enterprise Server for SAP applications 16.0",
"product_id": "SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x"
},
"product_reference": "kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP applications 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-livepatch-6.12.0-160000.8.1.x86_64 as component of SUSE Linux Enterprise Server for SAP applications 16.0",
"product_id": "SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64"
},
"product_reference": "kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP applications 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-vdso-6.12.0-160000.8.1.x86_64 as component of SUSE Linux Enterprise Server for SAP applications 16.0",
"product_id": "SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64"
},
"product_reference": "kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP applications 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-6.12.0-160000.8.1.noarch as component of SUSE Linux Enterprise Server for SAP applications 16.0",
"product_id": "SUSE Linux Enterprise Server for SAP applications 16.0:kernel-devel-6.12.0-160000.8.1.noarch"
},
"product_reference": "kernel-devel-6.12.0-160000.8.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP applications 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-docs-6.12.0-160000.8.1.noarch as component of SUSE Linux Enterprise Server for SAP applications 16.0",
"product_id": "SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-6.12.0-160000.8.1.noarch"
},
"product_reference": "kernel-docs-6.12.0-160000.8.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP applications 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-docs-html-6.12.0-160000.8.1.noarch as component of SUSE Linux Enterprise Server for SAP applications 16.0",
"product_id": "SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch"
},
"product_reference": "kernel-docs-html-6.12.0-160000.8.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP applications 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kvmsmall-6.12.0-160000.8.1.aarch64 as component of SUSE Linux Enterprise Server for SAP applications 16.0",
"product_id": "SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64"
},
"product_reference": "kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP applications 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kvmsmall-6.12.0-160000.8.1.ppc64le as component of SUSE Linux Enterprise Server for SAP applications 16.0",
"product_id": "SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le"
},
"product_reference": "kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP applications 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kvmsmall-6.12.0-160000.8.1.x86_64 as component of SUSE Linux Enterprise Server for SAP applications 16.0",
"product_id": "SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64"
},
"product_reference": "kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP applications 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64 as component of SUSE Linux Enterprise Server for SAP applications 16.0",
"product_id": "SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64"
},
"product_reference": "kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP applications 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le as component of SUSE Linux Enterprise Server for SAP applications 16.0",
"product_id": "SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le"
},
"product_reference": "kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP applications 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64 as component of SUSE Linux Enterprise Server for SAP applications 16.0",
"product_id": "SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64"
},
"product_reference": "kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP applications 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64 as component of SUSE Linux Enterprise Server for SAP applications 16.0",
"product_id": "SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64"
},
"product_reference": "kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP applications 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-macros-6.12.0-160000.8.1.noarch as component of SUSE Linux Enterprise Server for SAP applications 16.0",
"product_id": "SUSE Linux Enterprise Server for SAP applications 16.0:kernel-macros-6.12.0-160000.8.1.noarch"
},
"product_reference": "kernel-macros-6.12.0-160000.8.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP applications 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-obs-qa-6.12.0-160000.8.1.aarch64 as component of SUSE Linux Enterprise Server for SAP applications 16.0",
"product_id": "SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64"
},
"product_reference": "kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP applications 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-obs-qa-6.12.0-160000.8.1.ppc64le as component of SUSE Linux Enterprise Server for SAP applications 16.0",
"product_id": "SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le"
},
"product_reference": "kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP applications 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-obs-qa-6.12.0-160000.8.1.s390x as component of SUSE Linux Enterprise Server for SAP applications 16.0",
"product_id": "SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x"
},
"product_reference": "kernel-obs-qa-6.12.0-160000.8.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP applications 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-obs-qa-6.12.0-160000.8.1.x86_64 as component of SUSE Linux Enterprise Server for SAP applications 16.0",
"product_id": "SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64"
},
"product_reference": "kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP applications 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-source-6.12.0-160000.8.1.noarch as component of SUSE Linux Enterprise Server for SAP applications 16.0",
"product_id": "SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-6.12.0-160000.8.1.noarch"
},
"product_reference": "kernel-source-6.12.0-160000.8.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP applications 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-source-vanilla-6.12.0-160000.8.1.noarch as component of SUSE Linux Enterprise Server for SAP applications 16.0",
"product_id": "SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch"
},
"product_reference": "kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP applications 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-6.12.0-160000.8.1.aarch64 as component of SUSE Linux Enterprise Server for SAP applications 16.0",
"product_id": "SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.aarch64"
},
"product_reference": "kernel-syms-6.12.0-160000.8.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP applications 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-6.12.0-160000.8.1.ppc64le as component of SUSE Linux Enterprise Server for SAP applications 16.0",
"product_id": "SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le"
},
"product_reference": "kernel-syms-6.12.0-160000.8.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP applications 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-6.12.0-160000.8.1.s390x as component of SUSE Linux Enterprise Server for SAP applications 16.0",
"product_id": "SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.s390x"
},
"product_reference": "kernel-syms-6.12.0-160000.8.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP applications 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-6.12.0-160000.8.1.x86_64 as component of SUSE Linux Enterprise Server for SAP applications 16.0",
"product_id": "SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.x86_64"
},
"product_reference": "kernel-syms-6.12.0-160000.8.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP applications 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-6.12.0-160000.8.1.s390x as component of SUSE Linux Enterprise Server for SAP applications 16.0",
"product_id": "SUSE Linux Enterprise Server for SAP applications 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x"
},
"product_reference": "kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP applications 16.0"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2022-50253",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-50253"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nbpf: make sure skb-\u003elen != 0 when redirecting to a tunneling device\n\nsyzkaller managed to trigger another case where skb-\u003elen == 0\nwhen we enter __dev_queue_xmit:\n\nWARNING: CPU: 0 PID: 2470 at include/linux/skbuff.h:2576 skb_assert_len include/linux/skbuff.h:2576 [inline]\nWARNING: CPU: 0 PID: 2470 at include/linux/skbuff.h:2576 __dev_queue_xmit+0x2069/0x35e0 net/core/dev.c:4295\n\nCall Trace:\n dev_queue_xmit+0x17/0x20 net/core/dev.c:4406\n __bpf_tx_skb net/core/filter.c:2115 [inline]\n __bpf_redirect_no_mac net/core/filter.c:2140 [inline]\n __bpf_redirect+0x5fb/0xda0 net/core/filter.c:2163\n ____bpf_clone_redirect net/core/filter.c:2447 [inline]\n bpf_clone_redirect+0x247/0x390 net/core/filter.c:2419\n bpf_prog_48159a89cb4a9a16+0x59/0x5e\n bpf_dispatcher_nop_func include/linux/bpf.h:897 [inline]\n __bpf_prog_run include/linux/filter.h:596 [inline]\n bpf_prog_run include/linux/filter.h:603 [inline]\n bpf_test_run+0x46c/0x890 net/bpf/test_run.c:402\n bpf_prog_test_run_skb+0xbdc/0x14c0 net/bpf/test_run.c:1170\n bpf_prog_test_run+0x345/0x3c0 kernel/bpf/syscall.c:3648\n __sys_bpf+0x43a/0x6c0 kernel/bpf/syscall.c:5005\n __do_sys_bpf kernel/bpf/syscall.c:5091 [inline]\n __se_sys_bpf kernel/bpf/syscall.c:5089 [inline]\n __x64_sys_bpf+0x7c/0x90 kernel/bpf/syscall.c:5089\n do_syscall_64+0x54/0x70 arch/x86/entry/common.c:48\n entry_SYSCALL_64_after_hwframe+0x61/0xc6\n\nThe reproducer doesn\u0027t really reproduce outside of syzkaller\nenvironment, so I\u0027m taking a guess here. It looks like we\ndo generate correct ETH_HLEN-sized packet, but we redirect\nthe packet to the tunneling device. Before we do so, we\n__skb_pull l2 header and arrive again at skb-\u003elen == 0.\nDoesn\u0027t seem like we can do anything better than having\nan explicit check after __skb_pull?",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-50253",
"url": "https://www.suse.com/security/cve/CVE-2022-50253"
},
{
"category": "external",
"summary": "SUSE Bug 1249912 for CVE-2022-50253",
"url": "https://bugzilla.suse.com/1249912"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-19T16:46:47Z",
"details": "moderate"
}
],
"title": "CVE-2022-50253"
},
{
"cve": "CVE-2025-37916",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-37916"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\npds_core: remove write-after-free of client_id\n\nA use-after-free error popped up in stress testing:\n\n[Mon Apr 21 21:21:33 2025] BUG: KFENCE: use-after-free write in pdsc_auxbus_dev_del+0xef/0x160 [pds_core]\n[Mon Apr 21 21:21:33 2025] Use-after-free write at 0x000000007013ecd1 (in kfence-#47):\n[Mon Apr 21 21:21:33 2025] pdsc_auxbus_dev_del+0xef/0x160 [pds_core]\n[Mon Apr 21 21:21:33 2025] pdsc_remove+0xc0/0x1b0 [pds_core]\n[Mon Apr 21 21:21:33 2025] pci_device_remove+0x24/0x70\n[Mon Apr 21 21:21:33 2025] device_release_driver_internal+0x11f/0x180\n[Mon Apr 21 21:21:33 2025] driver_detach+0x45/0x80\n[Mon Apr 21 21:21:33 2025] bus_remove_driver+0x83/0xe0\n[Mon Apr 21 21:21:33 2025] pci_unregister_driver+0x1a/0x80\n\nThe actual device uninit usually happens on a separate thread\nscheduled after this code runs, but there is no guarantee of order\nof thread execution, so this could be a problem. There\u0027s no\nactual need to clear the client_id at this point, so simply\nremove the offending code.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-37916",
"url": "https://www.suse.com/security/cve/CVE-2025-37916"
},
{
"category": "external",
"summary": "SUSE Bug 1243474 for CVE-2025-37916",
"url": "https://bugzilla.suse.com/1243474"
},
{
"category": "external",
"summary": "SUSE Bug 1243535 for CVE-2025-37916",
"url": "https://bugzilla.suse.com/1243535"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-19T16:46:47Z",
"details": "moderate"
}
],
"title": "CVE-2025-37916"
},
{
"cve": "CVE-2025-38084",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-38084"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nmm/hugetlb: unshare page tables during VMA split, not before\n\nCurrently, __split_vma() triggers hugetlb page table unsharing through\nvm_ops-\u003emay_split(). This happens before the VMA lock and rmap locks are\ntaken - which is too early, it allows racing VMA-locked page faults in our\nprocess and racing rmap walks from other processes to cause page tables to\nbe shared again before we actually perform the split.\n\nFix it by explicitly calling into the hugetlb unshare logic from\n__split_vma() in the same place where THP splitting also happens. At that\npoint, both the VMA and the rmap(s) are write-locked.\n\nAn annoying detail is that we can now call into the helper\nhugetlb_unshare_pmds() from two different locking contexts:\n\n1. from hugetlb_split(), holding:\n - mmap lock (exclusively)\n - VMA lock\n - file rmap lock (exclusively)\n2. hugetlb_unshare_all_pmds(), which I think is designed to be able to\n call us with only the mmap lock held (in shared mode), but currently\n only runs while holding mmap lock (exclusively) and VMA lock\n\nBackporting note:\nThis commit fixes a racy protection that was introduced in commit\nb30c14cd6102 (\"hugetlb: unshare some PMDs when splitting VMAs\"); that\ncommit claimed to fix an issue introduced in 5.13, but it should actually\nalso go all the way back.\n\n[jannh@google.com: v2]",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-38084",
"url": "https://www.suse.com/security/cve/CVE-2025-38084"
},
{
"category": "external",
"summary": "SUSE Bug 1245498 for CVE-2025-38084",
"url": "https://bugzilla.suse.com/1245498"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.8,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-19T16:46:47Z",
"details": "moderate"
}
],
"title": "CVE-2025-38084"
},
{
"cve": "CVE-2025-38085",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-38085"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nmm/hugetlb: fix huge_pmd_unshare() vs GUP-fast race\n\nhuge_pmd_unshare() drops a reference on a page table that may have\npreviously been shared across processes, potentially turning it into a\nnormal page table used in another process in which unrelated VMAs can\nafterwards be installed.\n\nIf this happens in the middle of a concurrent gup_fast(), gup_fast() could\nend up walking the page tables of another process. While I don\u0027t see any\nway in which that immediately leads to kernel memory corruption, it is\nreally weird and unexpected.\n\nFix it with an explicit broadcast IPI through tlb_remove_table_sync_one(),\njust like we do in khugepaged when removing page tables for a THP\ncollapse.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-38085",
"url": "https://www.suse.com/security/cve/CVE-2025-38085"
},
{
"category": "external",
"summary": "SUSE Bug 1245499 for CVE-2025-38085",
"url": "https://bugzilla.suse.com/1245499"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.6,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-19T16:46:47Z",
"details": "moderate"
}
],
"title": "CVE-2025-38085"
},
{
"cve": "CVE-2025-38321",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-38321"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nsmb: Log an error when close_all_cached_dirs fails\n\nUnder low-memory conditions, close_all_cached_dirs() can\u0027t move the\ndentries to a separate list to dput() them once the locks are dropped.\nThis will result in a \"Dentry still in use\" error, so add an error\nmessage that makes it clear this is what happened:\n\n[ 495.281119] CIFS: VFS: \\\\otters.example.com\\share Out of memory while dropping dentries\n[ 495.281595] ------------[ cut here ]------------\n[ 495.281887] BUG: Dentry ffff888115531138{i=78,n=/} still in use (2) [unmount of cifs cifs]\n[ 495.282391] WARNING: CPU: 1 PID: 2329 at fs/dcache.c:1536 umount_check+0xc8/0xf0\n\nAlso, bail out of looping through all tcons as soon as a single\nallocation fails, since we\u0027re already in trouble, and kmalloc() attempts\nfor subseqeuent tcons are likely to fail just like the first one did.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-38321",
"url": "https://www.suse.com/security/cve/CVE-2025-38321"
},
{
"category": "external",
"summary": "SUSE Bug 1246328 for CVE-2025-38321",
"url": "https://bugzilla.suse.com/1246328"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-19T16:46:47Z",
"details": "moderate"
}
],
"title": "CVE-2025-38321"
},
{
"cve": "CVE-2025-38728",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-38728"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nsmb3: fix for slab out of bounds on mount to ksmbd\n\nWith KASAN enabled, it is possible to get a slab out of bounds\nduring mount to ksmbd due to missing check in parse_server_interfaces()\n(see below):\n\n BUG: KASAN: slab-out-of-bounds in\n parse_server_interfaces+0x14ee/0x1880 [cifs]\n Read of size 4 at addr ffff8881433dba98 by task mount/9827\n\n CPU: 5 UID: 0 PID: 9827 Comm: mount Tainted: G\n OE 6.16.0-rc2-kasan #2 PREEMPT(voluntary)\n Tainted: [O]=OOT_MODULE, [E]=UNSIGNED_MODULE\n Hardware name: Dell Inc. Precision Tower 3620/0MWYPT,\n BIOS 2.13.1 06/14/2019\n Call Trace:\n \u003cTASK\u003e\n dump_stack_lvl+0x9f/0xf0\n print_report+0xd1/0x670\n __virt_addr_valid+0x22c/0x430\n ? parse_server_interfaces+0x14ee/0x1880 [cifs]\n ? kasan_complete_mode_report_info+0x2a/0x1f0\n ? parse_server_interfaces+0x14ee/0x1880 [cifs]\n kasan_report+0xd6/0x110\n parse_server_interfaces+0x14ee/0x1880 [cifs]\n __asan_report_load_n_noabort+0x13/0x20\n parse_server_interfaces+0x14ee/0x1880 [cifs]\n ? __pfx_parse_server_interfaces+0x10/0x10 [cifs]\n ? trace_hardirqs_on+0x51/0x60\n SMB3_request_interfaces+0x1ad/0x3f0 [cifs]\n ? __pfx_SMB3_request_interfaces+0x10/0x10 [cifs]\n ? SMB2_tcon+0x23c/0x15d0 [cifs]\n smb3_qfs_tcon+0x173/0x2b0 [cifs]\n ? __pfx_smb3_qfs_tcon+0x10/0x10 [cifs]\n ? cifs_get_tcon+0x105d/0x2120 [cifs]\n ? do_raw_spin_unlock+0x5d/0x200\n ? cifs_get_tcon+0x105d/0x2120 [cifs]\n ? __pfx_smb3_qfs_tcon+0x10/0x10 [cifs]\n cifs_mount_get_tcon+0x369/0xb90 [cifs]\n ? dfs_cache_find+0xe7/0x150 [cifs]\n dfs_mount_share+0x985/0x2970 [cifs]\n ? check_path.constprop.0+0x28/0x50\n ? save_trace+0x54/0x370\n ? __pfx_dfs_mount_share+0x10/0x10 [cifs]\n ? __lock_acquire+0xb82/0x2ba0\n ? __kasan_check_write+0x18/0x20\n cifs_mount+0xbc/0x9e0 [cifs]\n ? __pfx_cifs_mount+0x10/0x10 [cifs]\n ? do_raw_spin_unlock+0x5d/0x200\n ? cifs_setup_cifs_sb+0x29d/0x810 [cifs]\n cifs_smb3_do_mount+0x263/0x1990 [cifs]",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-38728",
"url": "https://www.suse.com/security/cve/CVE-2025-38728"
},
{
"category": "external",
"summary": "SUSE Bug 1249256 for CVE-2025-38728",
"url": "https://bugzilla.suse.com/1249256"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-19T16:46:47Z",
"details": "moderate"
}
],
"title": "CVE-2025-38728"
},
{
"cve": "CVE-2025-39805",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-39805"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnet: macb: fix unregister_netdev call order in macb_remove()\n\nWhen removing a macb device, the driver calls phy_exit() before\nunregister_netdev(). This leads to a WARN from kernfs:\n\n ------------[ cut here ]------------\n kernfs: can not remove \u0027attached_dev\u0027, no directory\n WARNING: CPU: 1 PID: 27146 at fs/kernfs/dir.c:1683\n Call trace:\n kernfs_remove_by_name_ns+0xd8/0xf0\n sysfs_remove_link+0x24/0x58\n phy_detach+0x5c/0x168\n phy_disconnect+0x4c/0x70\n phylink_disconnect_phy+0x6c/0xc0 [phylink]\n macb_close+0x6c/0x170 [macb]\n ...\n macb_remove+0x60/0x168 [macb]\n platform_remove+0x5c/0x80\n ...\n\nThe warning happens because the PHY is being exited while the netdev\nis still registered. The correct order is to unregister the netdev\nbefore shutting down the PHY and cleaning up the MDIO bus.\n\nFix this by moving unregister_netdev() ahead of phy_exit() in\nmacb_remove().",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-39805",
"url": "https://www.suse.com/security/cve/CVE-2025-39805"
},
{
"category": "external",
"summary": "SUSE Bug 1249982 for CVE-2025-39805",
"url": "https://bugzilla.suse.com/1249982"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-19T16:46:47Z",
"details": "moderate"
}
],
"title": "CVE-2025-39805"
},
{
"cve": "CVE-2025-39819",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-39819"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nfs/smb: Fix inconsistent refcnt update\n\nA possible inconsistent update of refcount was identified in `smb2_compound_op`.\nSuch inconsistent update could lead to possible resource leaks.\n\nWhy it is a possible bug:\n1. In the comment section of the function, it clearly states that the\nreference to `cfile` should be dropped after calling this function.\n2. Every control flow path would check and drop the reference to\n`cfile`, except the patched one.\n3. Existing callers would not handle refcount update of `cfile` if\n-ENOMEM is returned.\n\nTo fix the bug, an extra goto label \"out\" is added, to make sure that the\ncleanup logic would always be respected. As the problem is caused by the\nallocation failure of `vars`, the cleanup logic between label \"finished\"\nand \"out\" can be safely ignored. According to the definition of function\n`is_replayable_error`, the error code of \"-ENOMEM\" is not recoverable.\nTherefore, the replay logic also gets ignored.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-39819",
"url": "https://www.suse.com/security/cve/CVE-2025-39819"
},
{
"category": "external",
"summary": "SUSE Bug 1250176 for CVE-2025-39819",
"url": "https://bugzilla.suse.com/1250176"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-19T16:46:47Z",
"details": "moderate"
}
],
"title": "CVE-2025-39819"
},
{
"cve": "CVE-2025-39822",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-39822"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nio_uring/kbuf: fix signedness in this_len calculation\n\nWhen importing and using buffers, buf-\u003elen is considered unsigned.\nHowever, buf-\u003elen is converted to signed int when committing. This can\nlead to unexpected behavior if the buffer is large enough to be\ninterpreted as a negative value. Make min_t calculation unsigned.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-39822",
"url": "https://www.suse.com/security/cve/CVE-2025-39822"
},
{
"category": "external",
"summary": "SUSE Bug 1250034 for CVE-2025-39822",
"url": "https://bugzilla.suse.com/1250034"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-19T16:46:47Z",
"details": "moderate"
}
],
"title": "CVE-2025-39822"
},
{
"cve": "CVE-2025-39831",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-39831"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nfbnic: Move phylink resume out of service_task and into open/close\n\nThe fbnic driver was presenting with the following locking assert coming\nout of a PM resume:\n[ 42.208116][ T164] RTNL: assertion failed at drivers/net/phy/phylink.c (2611)\n[ 42.208492][ T164] WARNING: CPU: 1 PID: 164 at drivers/net/phy/phylink.c:2611 phylink_resume+0x190/0x1e0\n[ 42.208872][ T164] Modules linked in:\n[ 42.209140][ T164] CPU: 1 UID: 0 PID: 164 Comm: bash Not tainted 6.17.0-rc2-virtme #134 PREEMPT(full)\n[ 42.209496][ T164] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.17.0-5.fc42 04/01/2014\n[ 42.209861][ T164] RIP: 0010:phylink_resume+0x190/0x1e0\n[ 42.210057][ T164] Code: 83 e5 01 0f 85 b0 fe ff ff c6 05 1c cd 3e 02 01 90 ba 33 0a 00 00 48 c7 c6 20 3a 1d a5 48 c7 c7 e0 3e 1d a5 e8 21 b8 90 fe 90 \u003c0f\u003e 0b 90 90 e9 86 fe ff ff e8 42 ea 1f ff e9 e2 fe ff ff 48 89 ef\n[ 42.210708][ T164] RSP: 0018:ffffc90000affbd8 EFLAGS: 00010296\n[ 42.210983][ T164] RAX: 0000000000000000 RBX: ffff8880078d8400 RCX: 0000000000000000\n[ 42.211235][ T164] RDX: 0000000000000000 RSI: 1ffffffff4f10938 RDI: 0000000000000001\n[ 42.211466][ T164] RBP: 0000000000000000 R08: ffffffffa2ae79ea R09: fffffbfff4b3eb84\n[ 42.211707][ T164] R10: 0000000000000003 R11: 0000000000000000 R12: ffff888007ad8000\n[ 42.211997][ T164] R13: 0000000000000002 R14: ffff888006a18800 R15: ffffffffa34c59e0\n[ 42.212234][ T164] FS: 00007f0dc8e39740(0000) GS:ffff88808f51f000(0000) knlGS:0000000000000000\n[ 42.212505][ T164] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033\n[ 42.212704][ T164] CR2: 00007f0dc8e9fe10 CR3: 000000000b56d003 CR4: 0000000000772ef0\n[ 42.213227][ T164] PKRU: 55555554\n[ 42.213366][ T164] Call Trace:\n[ 42.213483][ T164] \u003cTASK\u003e\n[ 42.213565][ T164] __fbnic_pm_attach.isra.0+0x8e/0xa0\n[ 42.213725][ T164] pci_reset_function+0x116/0x1d0\n[ 42.213895][ T164] reset_store+0xa0/0x100\n[ 42.214025][ T164] ? pci_dev_reset_attr_is_visible+0x50/0x50\n[ 42.214221][ T164] ? sysfs_file_kobj+0xc1/0x1e0\n[ 42.214374][ T164] ? sysfs_kf_write+0x65/0x160\n[ 42.214526][ T164] kernfs_fop_write_iter+0x2f8/0x4c0\n[ 42.214677][ T164] ? kernfs_vma_page_mkwrite+0x1f0/0x1f0\n[ 42.214836][ T164] new_sync_write+0x308/0x6f0\n[ 42.214987][ T164] ? __lock_acquire+0x34c/0x740\n[ 42.215135][ T164] ? new_sync_read+0x6f0/0x6f0\n[ 42.215288][ T164] ? lock_acquire.part.0+0xbc/0x260\n[ 42.215440][ T164] ? ksys_write+0xff/0x200\n[ 42.215590][ T164] ? perf_trace_sched_switch+0x6d0/0x6d0\n[ 42.215742][ T164] vfs_write+0x65e/0xbb0\n[ 42.215876][ T164] ksys_write+0xff/0x200\n[ 42.215994][ T164] ? __ia32_sys_read+0xc0/0xc0\n[ 42.216141][ T164] ? do_user_addr_fault+0x269/0x9f0\n[ 42.216292][ T164] ? rcu_is_watching+0x15/0xd0\n[ 42.216442][ T164] do_syscall_64+0xbb/0x360\n[ 42.216591][ T164] entry_SYSCALL_64_after_hwframe+0x4b/0x53\n[ 42.216784][ T164] RIP: 0033:0x7f0dc8ea9986\n\nA bit of digging showed that we were invoking the phylink_resume as a part\nof the fbnic_up path when we were enabling the service task while not\nholding the RTNL lock. We should be enabling this sooner as a part of the\nndo_open path and then just letting the service task come online later.\nThis will help to enforce the correct locking and brings the phylink\ninterface online at the same time as the network interface, instead of at a\nlater time.\n\nI tested this on QEMU to verify this was working by putting the system to\nsleep using \"echo mem \u003e /sys/power/state\" to put the system to sleep in the\nguest and then using the command \"system_wakeup\" in the QEMU monitor.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-39831",
"url": "https://www.suse.com/security/cve/CVE-2025-39831"
},
{
"category": "external",
"summary": "SUSE Bug 1249977 for CVE-2025-39831",
"url": "https://bugzilla.suse.com/1249977"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-19T16:46:47Z",
"details": "moderate"
}
],
"title": "CVE-2025-39831"
},
{
"cve": "CVE-2025-39859",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-39859"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nptp: ocp: fix use-after-free bugs causing by ptp_ocp_watchdog\n\nThe ptp_ocp_detach() only shuts down the watchdog timer if it is\npending. However, if the timer handler is already running, the\ntimer_delete_sync() is not called. This leads to race conditions\nwhere the devlink that contains the ptp_ocp is deallocated while\nthe timer handler is still accessing it, resulting in use-after-free\nbugs. The following details one of the race scenarios.\n\n(thread 1) | (thread 2)\nptp_ocp_remove() |\n ptp_ocp_detach() | ptp_ocp_watchdog()\n if (timer_pending(\u0026bp-\u003ewatchdog))| bp = timer_container_of()\n timer_delete_sync() |\n |\n devlink_free(devlink) //free |\n | bp-\u003e //use\n\nResolve this by unconditionally calling timer_delete_sync() to ensure\nthe timer is reliably deactivated, preventing any access after free.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-39859",
"url": "https://www.suse.com/security/cve/CVE-2025-39859"
},
{
"category": "external",
"summary": "SUSE Bug 1250252 for CVE-2025-39859",
"url": "https://bugzilla.suse.com/1250252"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-19T16:46:47Z",
"details": "moderate"
}
],
"title": "CVE-2025-39859"
},
{
"cve": "CVE-2025-39897",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-39897"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnet: xilinx: axienet: Add error handling for RX metadata pointer retrieval\n\nAdd proper error checking for dmaengine_desc_get_metadata_ptr() which\ncan return an error pointer and lead to potential crashes or undefined\nbehaviour if the pointer retrieval fails.\n\nProperly handle the error by unmapping DMA buffer, freeing the skb and\nreturning early to prevent further processing with invalid data.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-39897",
"url": "https://www.suse.com/security/cve/CVE-2025-39897"
},
{
"category": "external",
"summary": "SUSE Bug 1250746 for CVE-2025-39897",
"url": "https://bugzilla.suse.com/1250746"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.6,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-19T16:46:47Z",
"details": "moderate"
}
],
"title": "CVE-2025-39897"
},
{
"cve": "CVE-2025-39917",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-39917"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nbpf: Fix out-of-bounds dynptr write in bpf_crypto_crypt\n\nStanislav reported that in bpf_crypto_crypt() the destination dynptr\u0027s\nsize is not validated to be at least as large as the source dynptr\u0027s\nsize before calling into the crypto backend with \u0027len = src_len\u0027. This\ncan result in an OOB write when the destination is smaller than the\nsource.\n\nConcretely, in mentioned function, psrc and pdst are both linear\nbuffers fetched from each dynptr:\n\n psrc = __bpf_dynptr_data(src, src_len);\n [...]\n pdst = __bpf_dynptr_data_rw(dst, dst_len);\n [...]\n err = decrypt ?\n ctx-\u003etype-\u003edecrypt(ctx-\u003etfm, psrc, pdst, src_len, piv) :\n ctx-\u003etype-\u003eencrypt(ctx-\u003etfm, psrc, pdst, src_len, piv);\n\nThe crypto backend expects pdst to be large enough with a src_len length\nthat can be written. Add an additional src_len \u003e dst_len check and bail\nout if it\u0027s the case. Note that these kfuncs are accessible under root\nprivileges only.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-39917",
"url": "https://www.suse.com/security/cve/CVE-2025-39917"
},
{
"category": "external",
"summary": "SUSE Bug 1250723 for CVE-2025-39917",
"url": "https://bugzilla.suse.com/1250723"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-19T16:46:47Z",
"details": "moderate"
}
],
"title": "CVE-2025-39917"
},
{
"cve": "CVE-2025-39944",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-39944"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nocteontx2-pf: Fix use-after-free bugs in otx2_sync_tstamp()\n\nThe original code relies on cancel_delayed_work() in otx2_ptp_destroy(),\nwhich does not ensure that the delayed work item synctstamp_work has fully\ncompleted if it was already running. This leads to use-after-free scenarios\nwhere otx2_ptp is deallocated by otx2_ptp_destroy(), while synctstamp_work\nremains active and attempts to dereference otx2_ptp in otx2_sync_tstamp().\nFurthermore, the synctstamp_work is cyclic, the likelihood of triggering\nthe bug is nonnegligible.\n\nA typical race condition is illustrated below:\n\nCPU 0 (cleanup) | CPU 1 (delayed work callback)\notx2_remove() |\n otx2_ptp_destroy() | otx2_sync_tstamp()\n cancel_delayed_work() |\n kfree(ptp) |\n | ptp = container_of(...); //UAF\n | ptp-\u003e //UAF\n\nThis is confirmed by a KASAN report:\n\nBUG: KASAN: slab-use-after-free in __run_timer_base.part.0+0x7d7/0x8c0\nWrite of size 8 at addr ffff88800aa09a18 by task bash/136\n...\nCall Trace:\n \u003cIRQ\u003e\n dump_stack_lvl+0x55/0x70\n print_report+0xcf/0x610\n ? __run_timer_base.part.0+0x7d7/0x8c0\n kasan_report+0xb8/0xf0\n ? __run_timer_base.part.0+0x7d7/0x8c0\n __run_timer_base.part.0+0x7d7/0x8c0\n ? __pfx___run_timer_base.part.0+0x10/0x10\n ? __pfx_read_tsc+0x10/0x10\n ? ktime_get+0x60/0x140\n ? lapic_next_event+0x11/0x20\n ? clockevents_program_event+0x1d4/0x2a0\n run_timer_softirq+0xd1/0x190\n handle_softirqs+0x16a/0x550\n irq_exit_rcu+0xaf/0xe0\n sysvec_apic_timer_interrupt+0x70/0x80\n \u003c/IRQ\u003e\n...\nAllocated by task 1:\n kasan_save_stack+0x24/0x50\n kasan_save_track+0x14/0x30\n __kasan_kmalloc+0x7f/0x90\n otx2_ptp_init+0xb1/0x860\n otx2_probe+0x4eb/0xc30\n local_pci_probe+0xdc/0x190\n pci_device_probe+0x2fe/0x470\n really_probe+0x1ca/0x5c0\n __driver_probe_device+0x248/0x310\n driver_probe_device+0x44/0x120\n __driver_attach+0xd2/0x310\n bus_for_each_dev+0xed/0x170\n bus_add_driver+0x208/0x500\n driver_register+0x132/0x460\n do_one_initcall+0x89/0x300\n kernel_init_freeable+0x40d/0x720\n kernel_init+0x1a/0x150\n ret_from_fork+0x10c/0x1a0\n ret_from_fork_asm+0x1a/0x30\n\nFreed by task 136:\n kasan_save_stack+0x24/0x50\n kasan_save_track+0x14/0x30\n kasan_save_free_info+0x3a/0x60\n __kasan_slab_free+0x3f/0x50\n kfree+0x137/0x370\n otx2_ptp_destroy+0x38/0x80\n otx2_remove+0x10d/0x4c0\n pci_device_remove+0xa6/0x1d0\n device_release_driver_internal+0xf8/0x210\n pci_stop_bus_device+0x105/0x150\n pci_stop_and_remove_bus_device_locked+0x15/0x30\n remove_store+0xcc/0xe0\n kernfs_fop_write_iter+0x2c3/0x440\n vfs_write+0x871/0xd70\n ksys_write+0xee/0x1c0\n do_syscall_64+0xac/0x280\n entry_SYSCALL_64_after_hwframe+0x77/0x7f\n...\n\nReplace cancel_delayed_work() with cancel_delayed_work_sync() to ensure\nthat the delayed work item is properly canceled before the otx2_ptp is\ndeallocated.\n\nThis bug was initially identified through static analysis. To reproduce\nand test it, I simulated the OcteonTX2 PCI device in QEMU and introduced\nartificial delays within the otx2_sync_tstamp() function to increase the\nlikelihood of triggering the bug.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-39944",
"url": "https://www.suse.com/security/cve/CVE-2025-39944"
},
{
"category": "external",
"summary": "SUSE Bug 1251120 for CVE-2025-39944",
"url": "https://bugzilla.suse.com/1251120"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-19T16:46:47Z",
"details": "moderate"
}
],
"title": "CVE-2025-39944"
},
{
"cve": "CVE-2025-39961",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-39961"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\niommu/amd/pgtbl: Fix possible race while increase page table level\n\nThe AMD IOMMU host page table implementation supports dynamic page table levels\n(up to 6 levels), starting with a 3-level configuration that expands based on\nIOVA address. The kernel maintains a root pointer and current page table level\nto enable proper page table walks in alloc_pte()/fetch_pte() operations.\n\nThe IOMMU IOVA allocator initially starts with 32-bit address and onces its\nexhuasted it switches to 64-bit address (max address is determined based\non IOMMU and device DMA capability). To support larger IOVA, AMD IOMMU\ndriver increases page table level.\n\nBut in unmap path (iommu_v1_unmap_pages()), fetch_pte() reads\npgtable-\u003e[root/mode] without lock. So its possible that in exteme corner case,\nwhen increase_address_space() is updating pgtable-\u003e[root/mode], fetch_pte()\nreads wrong page table level (pgtable-\u003emode). It does compare the value with\nlevel encoded in page table and returns NULL. This will result is\niommu_unmap ops to fail and upper layer may retry/log WARN_ON.\n\nCPU 0 CPU 1\n------ ------\nmap pages unmap pages\nalloc_pte() -\u003e increase_address_space() iommu_v1_unmap_pages() -\u003e fetch_pte()\n pgtable-\u003eroot = pte (new root value)\n READ pgtable-\u003e[mode/root]\n\t\t\t\t\t Reads new root, old mode\n Updates mode (pgtable-\u003emode += 1)\n\nSince Page table level updates are infrequent and already synchronized with a\nspinlock, implement seqcount to enable lock-free read operations on the read path.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-39961",
"url": "https://www.suse.com/security/cve/CVE-2025-39961"
},
{
"category": "external",
"summary": "SUSE Bug 1251817 for CVE-2025-39961",
"url": "https://bugzilla.suse.com/1251817"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.8,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-19T16:46:47Z",
"details": "moderate"
}
],
"title": "CVE-2025-39961"
},
{
"cve": "CVE-2025-39980",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-39980"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnexthop: Forbid FDB status change while nexthop is in a group\n\nThe kernel forbids the creation of non-FDB nexthop groups with FDB\nnexthops:\n\n # ip nexthop add id 1 via 192.0.2.1 fdb\n # ip nexthop add id 2 group 1\n Error: Non FDB nexthop group cannot have fdb nexthops.\n\nAnd vice versa:\n\n # ip nexthop add id 3 via 192.0.2.2 dev dummy1\n # ip nexthop add id 4 group 3 fdb\n Error: FDB nexthop group can only have fdb nexthops.\n\nHowever, as long as no routes are pointing to a non-FDB nexthop group,\nthe kernel allows changing the type of a nexthop from FDB to non-FDB and\nvice versa:\n\n # ip nexthop add id 5 via 192.0.2.2 dev dummy1\n # ip nexthop add id 6 group 5\n # ip nexthop replace id 5 via 192.0.2.2 fdb\n # echo $?\n 0\n\nThis configuration is invalid and can result in a NPD [1] since FDB\nnexthops are not associated with a nexthop device:\n\n # ip route add 198.51.100.1/32 nhid 6\n # ping 198.51.100.1\n\nFix by preventing nexthop FDB status change while the nexthop is in a\ngroup:\n\n # ip nexthop add id 7 via 192.0.2.2 dev dummy1\n # ip nexthop add id 8 group 7\n # ip nexthop replace id 7 via 192.0.2.2 fdb\n Error: Cannot change nexthop FDB status while in a group.\n\n[1]\nBUG: kernel NULL pointer dereference, address: 00000000000003c0\n[...]\nOops: Oops: 0000 [#1] SMP\nCPU: 6 UID: 0 PID: 367 Comm: ping Not tainted 6.17.0-rc6-virtme-gb65678cacc03 #1 PREEMPT(voluntary)\nHardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.17.0-4.fc41 04/01/2014\nRIP: 0010:fib_lookup_good_nhc+0x1e/0x80\n[...]\nCall Trace:\n \u003cTASK\u003e\n fib_table_lookup+0x541/0x650\n ip_route_output_key_hash_rcu+0x2ea/0x970\n ip_route_output_key_hash+0x55/0x80\n __ip4_datagram_connect+0x250/0x330\n udp_connect+0x2b/0x60\n __sys_connect+0x9c/0xd0\n __x64_sys_connect+0x18/0x20\n do_syscall_64+0xa4/0x2a0\n entry_SYSCALL_64_after_hwframe+0x4b/0x53",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-39980",
"url": "https://www.suse.com/security/cve/CVE-2025-39980"
},
{
"category": "external",
"summary": "SUSE Bug 1252063 for CVE-2025-39980",
"url": "https://bugzilla.suse.com/1252063"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-19T16:46:47Z",
"details": "moderate"
}
],
"title": "CVE-2025-39980"
},
{
"cve": "CVE-2025-39990",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-39990"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nbpf: Check the helper function is valid in get_helper_proto\n\nkernel test robot reported verifier bug [1] where the helper func\npointer could be NULL due to disabled config option.\n\nAs Alexei suggested we could check on that in get_helper_proto\ndirectly. Marking tail_call helper func with BPF_PTR_POISON,\nbecause it is unused by design.\n\n [1] https://lore.kernel.org/oe-lkp/202507160818.68358831-lkp@intel.com",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-39990",
"url": "https://www.suse.com/security/cve/CVE-2025-39990"
},
{
"category": "external",
"summary": "SUSE Bug 1252054 for CVE-2025-39990",
"url": "https://bugzilla.suse.com/1252054"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-19T16:46:47Z",
"details": "moderate"
}
],
"title": "CVE-2025-39990"
},
{
"cve": "CVE-2025-40001",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40001"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nscsi: mvsas: Fix use-after-free bugs in mvs_work_queue\n\nDuring the detaching of Marvell\u0027s SAS/SATA controller, the original code\ncalls cancel_delayed_work() in mvs_free() to cancel the delayed work\nitem mwq-\u003ework_q. However, if mwq-\u003ework_q is already running, the\ncancel_delayed_work() may fail to cancel it. This can lead to\nuse-after-free scenarios where mvs_free() frees the mvs_info while\nmvs_work_queue() is still executing and attempts to access the\nalready-freed mvs_info.\n\nA typical race condition is illustrated below:\n\nCPU 0 (remove) | CPU 1 (delayed work callback)\nmvs_pci_remove() |\n mvs_free() | mvs_work_queue()\n cancel_delayed_work() |\n kfree(mvi) |\n | mvi-\u003e // UAF\n\nReplace cancel_delayed_work() with cancel_delayed_work_sync() to ensure\nthat the delayed work item is properly canceled and any executing\ndelayed work item completes before the mvs_info is deallocated.\n\nThis bug was found by static analysis.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40001",
"url": "https://www.suse.com/security/cve/CVE-2025-40001"
},
{
"category": "external",
"summary": "SUSE Bug 1252303 for CVE-2025-40001",
"url": "https://bugzilla.suse.com/1252303"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.8,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-19T16:46:47Z",
"details": "moderate"
}
],
"title": "CVE-2025-40001"
},
{
"cve": "CVE-2025-40003",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40003"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnet: mscc: ocelot: Fix use-after-free caused by cyclic delayed work\n\nThe origin code calls cancel_delayed_work() in ocelot_stats_deinit()\nto cancel the cyclic delayed work item ocelot-\u003estats_work. However,\ncancel_delayed_work() may fail to cancel the work item if it is already\nexecuting. While destroy_workqueue() does wait for all pending work items\nin the work queue to complete before destroying the work queue, it cannot\nprevent the delayed work item from being rescheduled within the\nocelot_check_stats_work() function. This limitation exists because the\ndelayed work item is only enqueued into the work queue after its timer\nexpires. Before the timer expiration, destroy_workqueue() has no visibility\nof this pending work item. Once the work queue appears empty,\ndestroy_workqueue() proceeds with destruction. When the timer eventually\nexpires, the delayed work item gets queued again, leading to the following\nwarning:\n\nworkqueue: cannot queue ocelot_check_stats_work on wq ocelot-switch-stats\nWARNING: CPU: 2 PID: 0 at kernel/workqueue.c:2255 __queue_work+0x875/0xaf0\n...\nRIP: 0010:__queue_work+0x875/0xaf0\n...\nRSP: 0018:ffff88806d108b10 EFLAGS: 00010086\nRAX: 0000000000000000 RBX: 0000000000000101 RCX: 0000000000000027\nRDX: 0000000000000027 RSI: 0000000000000004 RDI: ffff88806d123e88\nRBP: ffffffff813c3170 R08: 0000000000000000 R09: ffffed100da247d2\nR10: ffffed100da247d1 R11: ffff88806d123e8b R12: ffff88800c00f000\nR13: ffff88800d7285c0 R14: ffff88806d0a5580 R15: ffff88800d7285a0\nFS: 0000000000000000(0000) GS:ffff8880e5725000(0000) knlGS:0000000000000000\nCS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033\nCR2: 00007fe18e45ea10 CR3: 0000000005e6c000 CR4: 00000000000006f0\nCall Trace:\n \u003cIRQ\u003e\n ? kasan_report+0xc6/0xf0\n ? __pfx_delayed_work_timer_fn+0x10/0x10\n ? __pfx_delayed_work_timer_fn+0x10/0x10\n call_timer_fn+0x25/0x1c0\n __run_timer_base.part.0+0x3be/0x8c0\n ? __pfx_delayed_work_timer_fn+0x10/0x10\n ? rcu_sched_clock_irq+0xb06/0x27d0\n ? __pfx___run_timer_base.part.0+0x10/0x10\n ? try_to_wake_up+0xb15/0x1960\n ? _raw_spin_lock_irq+0x80/0xe0\n ? __pfx__raw_spin_lock_irq+0x10/0x10\n tmigr_handle_remote_up+0x603/0x7e0\n ? __pfx_tmigr_handle_remote_up+0x10/0x10\n ? sched_balance_trigger+0x1c0/0x9f0\n ? sched_tick+0x221/0x5a0\n ? _raw_spin_lock_irq+0x80/0xe0\n ? __pfx__raw_spin_lock_irq+0x10/0x10\n ? tick_nohz_handler+0x339/0x440\n ? __pfx_tmigr_handle_remote_up+0x10/0x10\n __walk_groups.isra.0+0x42/0x150\n tmigr_handle_remote+0x1f4/0x2e0\n ? __pfx_tmigr_handle_remote+0x10/0x10\n ? ktime_get+0x60/0x140\n ? lapic_next_event+0x11/0x20\n ? clockevents_program_event+0x1d4/0x2a0\n ? hrtimer_interrupt+0x322/0x780\n handle_softirqs+0x16a/0x550\n irq_exit_rcu+0xaf/0xe0\n sysvec_apic_timer_interrupt+0x70/0x80\n \u003c/IRQ\u003e\n...\n\nThe following diagram reveals the cause of the above warning:\n\nCPU 0 (remove) | CPU 1 (delayed work callback)\nmscc_ocelot_remove() |\n ocelot_deinit() | ocelot_check_stats_work()\n ocelot_stats_deinit() |\n cancel_delayed_work()| ...\n | queue_delayed_work()\n destroy_workqueue() | (wait a time)\n | __queue_work() //UAF\n\nThe above scenario actually constitutes a UAF vulnerability.\n\nThe ocelot_stats_deinit() is only invoked when initialization\nfailure or resource destruction, so we must ensure that any\ndelayed work items cannot be rescheduled.\n\nReplace cancel_delayed_work() with disable_delayed_work_sync()\nto guarantee proper cancellation of the delayed work item and\nensure completion of any currently executing work before the\nworkqueue is deallocated.\n\nA deadlock concern was considered: ocelot_stats_deinit() is called\nin a process context and is not holding any locks that the delayed\nwork item might also need. Therefore, the use of the _sync() variant\nis safe here.\n\nThis bug was identified through static analysis. To reproduce the\nissue and validate the fix, I simulated ocelot-swit\n---truncated---",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40003",
"url": "https://www.suse.com/security/cve/CVE-2025-40003"
},
{
"category": "external",
"summary": "SUSE Bug 1252301 for CVE-2025-40003",
"url": "https://bugzilla.suse.com/1252301"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-19T16:46:47Z",
"details": "moderate"
}
],
"title": "CVE-2025-40003"
},
{
"cve": "CVE-2025-40006",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40006"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nmm/hugetlb: fix folio is still mapped when deleted\n\nMigration may be raced with fallocating hole. remove_inode_single_folio\nwill unmap the folio if the folio is still mapped. However, it\u0027s called\nwithout folio lock. If the folio is migrated and the mapped pte has been\nconverted to migration entry, folio_mapped() returns false, and won\u0027t\nunmap it. Due to extra refcount held by remove_inode_single_folio,\nmigration fails, restores migration entry to normal pte, and the folio is\nmapped again. As a result, we triggered BUG in filemap_unaccount_folio.\n\nThe log is as follows:\n BUG: Bad page cache in process hugetlb pfn:156c00\n page: refcount:515 mapcount:0 mapping:0000000099fef6e1 index:0x0 pfn:0x156c00\n head: order:9 mapcount:1 entire_mapcount:1 nr_pages_mapped:0 pincount:0\n aops:hugetlbfs_aops ino:dcc dentry name(?):\"my_hugepage_file\"\n flags: 0x17ffffc00000c1(locked|waiters|head|node=0|zone=2|lastcpupid=0x1fffff)\n page_type: f4(hugetlb)\n page dumped because: still mapped when deleted\n CPU: 1 UID: 0 PID: 395 Comm: hugetlb Not tainted 6.17.0-rc5-00044-g7aac71907bde-dirty #484 NONE\n Hardware name: QEMU Ubuntu 24.04 PC (i440FX + PIIX, 1996), BIOS 0.0.0 02/06/2015\n Call Trace:\n \u003cTASK\u003e\n dump_stack_lvl+0x4f/0x70\n filemap_unaccount_folio+0xc4/0x1c0\n __filemap_remove_folio+0x38/0x1c0\n filemap_remove_folio+0x41/0xd0\n remove_inode_hugepages+0x142/0x250\n hugetlbfs_fallocate+0x471/0x5a0\n vfs_fallocate+0x149/0x380\n\nHold folio lock before checking if the folio is mapped to avold race with\nmigration.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40006",
"url": "https://www.suse.com/security/cve/CVE-2025-40006"
},
{
"category": "external",
"summary": "SUSE Bug 1252342 for CVE-2025-40006",
"url": "https://bugzilla.suse.com/1252342"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.7,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-19T16:46:47Z",
"details": "moderate"
}
],
"title": "CVE-2025-40006"
},
{
"cve": "CVE-2025-40021",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40021"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\ntracing: dynevent: Add a missing lockdown check on dynevent\n\nSince dynamic_events interface on tracefs is compatible with\nkprobe_events and uprobe_events, it should also check the lockdown\nstatus and reject if it is set.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40021",
"url": "https://www.suse.com/security/cve/CVE-2025-40021"
},
{
"category": "external",
"summary": "SUSE Bug 1252681 for CVE-2025-40021",
"url": "https://bugzilla.suse.com/1252681"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-19T16:46:47Z",
"details": "moderate"
}
],
"title": "CVE-2025-40021"
},
{
"cve": "CVE-2025-40024",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40024"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nvhost: Take a reference on the task in struct vhost_task.\n\nvhost_task_create() creates a task and keeps a reference to its\ntask_struct. That task may exit early via a signal and its task_struct\nwill be released.\nA pending vhost_task_wake() will then attempt to wake the task and\naccess a task_struct which is no longer there.\n\nAcquire a reference on the task_struct while creating the thread and\nrelease the reference while the struct vhost_task itself is removed.\nIf the task exits early due to a signal, then the vhost_task_wake() will\nstill access a valid task_struct. The wake is safe and will be skipped\nin this case.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40024",
"url": "https://www.suse.com/security/cve/CVE-2025-40024"
},
{
"category": "external",
"summary": "SUSE Bug 1252686 for CVE-2025-40024",
"url": "https://bugzilla.suse.com/1252686"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-19T16:46:47Z",
"details": "moderate"
}
],
"title": "CVE-2025-40024"
},
{
"cve": "CVE-2025-40027",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40027"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnet/9p: fix double req put in p9_fd_cancelled\n\nSyzkaller reports a KASAN issue as below:\n\ngeneral protection fault, probably for non-canonical address 0xfbd59c0000000021: 0000 [#1] PREEMPT SMP KASAN NOPTI\nKASAN: maybe wild-memory-access in range [0xdead000000000108-0xdead00000000010f]\nCPU: 0 PID: 5083 Comm: syz-executor.2 Not tainted 6.1.134-syzkaller-00037-g855bd1d7d838 #0\nHardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014\nRIP: 0010:__list_del include/linux/list.h:114 [inline]\nRIP: 0010:__list_del_entry include/linux/list.h:137 [inline]\nRIP: 0010:list_del include/linux/list.h:148 [inline]\nRIP: 0010:p9_fd_cancelled+0xe9/0x200 net/9p/trans_fd.c:734\n\nCall Trace:\n \u003cTASK\u003e\n p9_client_flush+0x351/0x440 net/9p/client.c:614\n p9_client_rpc+0xb6b/0xc70 net/9p/client.c:734\n p9_client_version net/9p/client.c:920 [inline]\n p9_client_create+0xb51/0x1240 net/9p/client.c:1027\n v9fs_session_init+0x1f0/0x18f0 fs/9p/v9fs.c:408\n v9fs_mount+0xba/0xcb0 fs/9p/vfs_super.c:126\n legacy_get_tree+0x108/0x220 fs/fs_context.c:632\n vfs_get_tree+0x8e/0x300 fs/super.c:1573\n do_new_mount fs/namespace.c:3056 [inline]\n path_mount+0x6a6/0x1e90 fs/namespace.c:3386\n do_mount fs/namespace.c:3399 [inline]\n __do_sys_mount fs/namespace.c:3607 [inline]\n __se_sys_mount fs/namespace.c:3584 [inline]\n __x64_sys_mount+0x283/0x300 fs/namespace.c:3584\n do_syscall_x64 arch/x86/entry/common.c:51 [inline]\n do_syscall_64+0x35/0x80 arch/x86/entry/common.c:81\n entry_SYSCALL_64_after_hwframe+0x6e/0xd8\n\nThis happens because of a race condition between:\n\n- The 9p client sending an invalid flush request and later cleaning it up;\n- The 9p client in p9_read_work() canceled all pending requests.\n\n Thread 1 Thread 2\n ...\n p9_client_create()\n ...\n p9_fd_create()\n ...\n p9_conn_create()\n ...\n // start Thread 2\n INIT_WORK(\u0026m-\u003erq, p9_read_work);\n p9_read_work()\n ...\n p9_client_rpc()\n ...\n ...\n p9_conn_cancel()\n ...\n spin_lock(\u0026m-\u003ereq_lock);\n ...\n p9_fd_cancelled()\n ...\n ...\n spin_unlock(\u0026m-\u003ereq_lock);\n // status rewrite\n p9_client_cb(m-\u003eclient, req, REQ_STATUS_ERROR)\n // first remove\n list_del(\u0026req-\u003ereq_list);\n ...\n\n spin_lock(\u0026m-\u003ereq_lock)\n ...\n // second remove\n list_del(\u0026req-\u003ereq_list);\n spin_unlock(\u0026m-\u003ereq_lock)\n ...\n\nCommit 74d6a5d56629 (\"9p/trans_fd: Fix concurrency del of req_list in\np9_fd_cancelled/p9_read_work\") fixes a concurrency issue in the 9p filesystem\nclient where the req_list could be deleted simultaneously by both\np9_read_work and p9_fd_cancelled functions, but for the case where req-\u003estatus\nequals REQ_STATUS_RCVD.\n\nUpdate the check for req-\u003estatus in p9_fd_cancelled to skip processing not\njust received requests, but anything that is not SENT, as whatever\nchanged the state from SENT also removed the request from its list.\n\nFound by Linux Verification Center (linuxtesting.org) with Syzkaller.\n\n[updated the check from status == RECV || status == ERROR to status != SENT]",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40027",
"url": "https://www.suse.com/security/cve/CVE-2025-40027"
},
{
"category": "external",
"summary": "SUSE Bug 1252763 for CVE-2025-40027",
"url": "https://bugzilla.suse.com/1252763"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-19T16:46:47Z",
"details": "moderate"
}
],
"title": "CVE-2025-40027"
},
{
"cve": "CVE-2025-40031",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40031"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\ntee: fix register_shm_helper()\n\nIn register_shm_helper(), fix incorrect error handling for a call to\niov_iter_extract_pages(). A case is missing for when\niov_iter_extract_pages() only got some pages and return a number larger\nthan 0, but not the requested amount.\n\nThis fixes a possible NULL pointer dereference following a bad input from\nioctl(TEE_IOC_SHM_REGISTER) where parts of the buffer isn\u0027t mapped.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40031",
"url": "https://www.suse.com/security/cve/CVE-2025-40031"
},
{
"category": "external",
"summary": "SUSE Bug 1252779 for CVE-2025-40031",
"url": "https://bugzilla.suse.com/1252779"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-19T16:46:47Z",
"details": "moderate"
}
],
"title": "CVE-2025-40031"
},
{
"cve": "CVE-2025-40033",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40033"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nremoteproc: pru: Fix potential NULL pointer dereference in pru_rproc_set_ctable()\n\npru_rproc_set_ctable() accessed rproc-\u003epriv before the IS_ERR_OR_NULL\ncheck, which could lead to a null pointer dereference. Move the pru\nassignment, ensuring we never dereference a NULL rproc pointer.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40033",
"url": "https://www.suse.com/security/cve/CVE-2025-40033"
},
{
"category": "external",
"summary": "SUSE Bug 1252824 for CVE-2025-40033",
"url": "https://bugzilla.suse.com/1252824"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-19T16:46:47Z",
"details": "moderate"
}
],
"title": "CVE-2025-40033"
},
{
"cve": "CVE-2025-40038",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40038"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nKVM: SVM: Skip fastpath emulation on VM-Exit if next RIP isn\u0027t valid\n\nSkip the WRMSR and HLT fastpaths in SVM\u0027s VM-Exit handler if the next RIP\nisn\u0027t valid, e.g. because KVM is running with nrips=false. SVM must\ndecode and emulate to skip the instruction if the CPU doesn\u0027t provide the\nnext RIP, and getting the instruction bytes to decode requires reading\nguest memory. Reading guest memory through the emulator can fault, i.e.\ncan sleep, which is disallowed since the fastpath handlers run with IRQs\ndisabled.\n\n BUG: sleeping function called from invalid context at ./include/linux/uaccess.h:106\n in_atomic(): 1, irqs_disabled(): 1, non_block: 0, pid: 32611, name: qemu\n preempt_count: 1, expected: 0\n INFO: lockdep is turned off.\n irq event stamp: 30580\n hardirqs last enabled at (30579): [\u003cffffffffc08b2527\u003e] vcpu_run+0x1787/0x1db0 [kvm]\n hardirqs last disabled at (30580): [\u003cffffffffb4f62e32\u003e] __schedule+0x1e2/0xed0\n softirqs last enabled at (30570): [\u003cffffffffb4247a64\u003e] fpu_swap_kvm_fpstate+0x44/0x210\n softirqs last disabled at (30568): [\u003cffffffffb4247a64\u003e] fpu_swap_kvm_fpstate+0x44/0x210\n CPU: 298 UID: 0 PID: 32611 Comm: qemu Tainted: G U 6.16.0-smp--e6c618b51cfe-sleep #782 NONE\n Tainted: [U]=USER\n Hardware name: Google Astoria-Turin/astoria, BIOS 0.20241223.2-0 01/17/2025\n Call Trace:\n \u003cTASK\u003e\n dump_stack_lvl+0x7d/0xb0\n __might_resched+0x271/0x290\n __might_fault+0x28/0x80\n kvm_vcpu_read_guest_page+0x8d/0xc0 [kvm]\n kvm_fetch_guest_virt+0x92/0xc0 [kvm]\n __do_insn_fetch_bytes+0xf3/0x1e0 [kvm]\n x86_decode_insn+0xd1/0x1010 [kvm]\n x86_emulate_instruction+0x105/0x810 [kvm]\n __svm_skip_emulated_instruction+0xc4/0x140 [kvm_amd]\n handle_fastpath_invd+0xc4/0x1a0 [kvm]\n vcpu_run+0x11a1/0x1db0 [kvm]\n kvm_arch_vcpu_ioctl_run+0x5cc/0x730 [kvm]\n kvm_vcpu_ioctl+0x578/0x6a0 [kvm]\n __se_sys_ioctl+0x6d/0xb0\n do_syscall_64+0x8a/0x2c0\n entry_SYSCALL_64_after_hwframe+0x4b/0x53\n RIP: 0033:0x7f479d57a94b\n \u003c/TASK\u003e\n\nNote, this is essentially a reapply of commit 5c30e8101e8d (\"KVM: SVM:\nSkip WRMSR fastpath on VM-Exit if next RIP isn\u0027t valid\"), but with\ndifferent justification (KVM now grabs SRCU when skipping the instruction\nfor other reasons).",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40038",
"url": "https://www.suse.com/security/cve/CVE-2025-40038"
},
{
"category": "external",
"summary": "SUSE Bug 1252817 for CVE-2025-40038",
"url": "https://bugzilla.suse.com/1252817"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-19T16:46:47Z",
"details": "moderate"
}
],
"title": "CVE-2025-40038"
},
{
"cve": "CVE-2025-40047",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40047"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nio_uring/waitid: always prune wait queue entry in io_waitid_wait()\n\nFor a successful return, always remove our entry from the wait queue\nentry list. Previously this was skipped if a cancelation was in\nprogress, but this can race with another invocation of the wait queue\nentry callback.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40047",
"url": "https://www.suse.com/security/cve/CVE-2025-40047"
},
{
"category": "external",
"summary": "SUSE Bug 1252790 for CVE-2025-40047",
"url": "https://bugzilla.suse.com/1252790"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.7,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-19T16:46:47Z",
"details": "moderate"
}
],
"title": "CVE-2025-40047"
},
{
"cve": "CVE-2025-40053",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40053"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnet: dlink: handle copy_thresh allocation failure\n\nThe driver did not handle failure of `netdev_alloc_skb_ip_align()`.\nIf the allocation failed, dereferencing `skb-\u003eprotocol` could lead to\na NULL pointer dereference.\n\nThis patch tries to allocate `skb`. If the allocation fails, it falls\nback to the normal path.\n\nTested-on: D-Link DGE-550T Rev-A3",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40053",
"url": "https://www.suse.com/security/cve/CVE-2025-40053"
},
{
"category": "external",
"summary": "SUSE Bug 1252808 for CVE-2025-40053",
"url": "https://bugzilla.suse.com/1252808"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-19T16:46:47Z",
"details": "moderate"
}
],
"title": "CVE-2025-40053"
},
{
"cve": "CVE-2025-40055",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40055"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nocfs2: fix double free in user_cluster_connect()\n\nuser_cluster_disconnect() frees \"conn-\u003ecc_private\" which is \"lc\" but then\nthe error handling frees \"lc\" a second time. Set \"lc\" to NULL on this\npath to avoid a double free.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40055",
"url": "https://www.suse.com/security/cve/CVE-2025-40055"
},
{
"category": "external",
"summary": "SUSE Bug 1252821 for CVE-2025-40055",
"url": "https://bugzilla.suse.com/1252821"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-19T16:46:47Z",
"details": "moderate"
}
],
"title": "CVE-2025-40055"
},
{
"cve": "CVE-2025-40059",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40059"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\ncoresight: Fix incorrect handling for return value of devm_kzalloc\n\nThe return value of devm_kzalloc could be an null pointer,\nuse \"!desc.pdata\" to fix incorrect handling return value\nof devm_kzalloc.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40059",
"url": "https://www.suse.com/security/cve/CVE-2025-40059"
},
{
"category": "external",
"summary": "SUSE Bug 1252809 for CVE-2025-40059",
"url": "https://bugzilla.suse.com/1252809"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-19T16:46:47Z",
"details": "moderate"
}
],
"title": "CVE-2025-40059"
},
{
"cve": "CVE-2025-40064",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40064"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nsmc: Fix use-after-free in __pnet_find_base_ndev().\n\nsyzbot reported use-after-free of net_device in __pnet_find_base_ndev(),\nwhich was called during connect(). [0]\n\nsmc_pnet_find_ism_resource() fetches sk_dst_get(sk)-\u003edev and passes\ndown to pnet_find_base_ndev(), where RTNL is held. Then, UAF happened\nat __pnet_find_base_ndev() when the dev is first used.\n\nThis means dev had already been freed before acquiring RTNL in\npnet_find_base_ndev().\n\nWhile dev is going away, dst-\u003edev could be swapped with blackhole_netdev,\nand the dev\u0027s refcnt by dst will be released.\n\nWe must hold dev\u0027s refcnt before calling smc_pnet_find_ism_resource().\n\nAlso, smc_pnet_find_roce_resource() has the same problem.\n\nLet\u0027s use __sk_dst_get() and dst_dev_rcu() in the two functions.\n\n[0]:\nBUG: KASAN: use-after-free in __pnet_find_base_ndev+0x1b1/0x1c0 net/smc/smc_pnet.c:926\nRead of size 1 at addr ffff888036bac33a by task syz.0.3632/18609\n\nCPU: 1 UID: 0 PID: 18609 Comm: syz.0.3632 Not tainted syzkaller #0 PREEMPT(full)\nHardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/18/2025\nCall Trace:\n \u003cTASK\u003e\n dump_stack_lvl+0x189/0x250 lib/dump_stack.c:120\n print_address_description mm/kasan/report.c:378 [inline]\n print_report+0xca/0x240 mm/kasan/report.c:482\n kasan_report+0x118/0x150 mm/kasan/report.c:595\n __pnet_find_base_ndev+0x1b1/0x1c0 net/smc/smc_pnet.c:926\n pnet_find_base_ndev net/smc/smc_pnet.c:946 [inline]\n smc_pnet_find_ism_by_pnetid net/smc/smc_pnet.c:1103 [inline]\n smc_pnet_find_ism_resource+0xef/0x390 net/smc/smc_pnet.c:1154\n smc_find_ism_device net/smc/af_smc.c:1030 [inline]\n smc_find_proposal_devices net/smc/af_smc.c:1115 [inline]\n __smc_connect+0x372/0x1890 net/smc/af_smc.c:1545\n smc_connect+0x877/0xd90 net/smc/af_smc.c:1715\n __sys_connect_file net/socket.c:2086 [inline]\n __sys_connect+0x313/0x440 net/socket.c:2105\n __do_sys_connect net/socket.c:2111 [inline]\n __se_sys_connect net/socket.c:2108 [inline]\n __x64_sys_connect+0x7a/0x90 net/socket.c:2108\n do_syscall_x64 arch/x86/entry/syscall_64.c:63 [inline]\n do_syscall_64+0xfa/0x3b0 arch/x86/entry/syscall_64.c:94\n entry_SYSCALL_64_after_hwframe+0x77/0x7f\nRIP: 0033:0x7f47cbf8eba9\nCode: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 \u003c48\u003e 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48\nRSP: 002b:00007f47ccdb1038 EFLAGS: 00000246 ORIG_RAX: 000000000000002a\nRAX: ffffffffffffffda RBX: 00007f47cc1d5fa0 RCX: 00007f47cbf8eba9\nRDX: 0000000000000010 RSI: 0000200000000280 RDI: 000000000000000b\nRBP: 00007f47cc011e19 R08: 0000000000000000 R09: 0000000000000000\nR10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000\nR13: 00007f47cc1d6038 R14: 00007f47cc1d5fa0 R15: 00007ffc512f8aa8\n \u003c/TASK\u003e\n\nThe buggy address belongs to the physical page:\npage: refcount:0 mapcount:0 mapping:0000000000000000 index:0xffff888036bacd00 pfn:0x36bac\nflags: 0xfff00000000000(node=0|zone=1|lastcpupid=0x7ff)\nraw: 00fff00000000000 ffffea0001243d08 ffff8880b863fdc0 0000000000000000\nraw: ffff888036bacd00 0000000000000000 00000000ffffffff 0000000000000000\npage dumped because: kasan: bad access detected\npage_owner tracks the page as freed\npage last allocated via order 2, migratetype Unmovable, gfp_mask 0x446dc0(GFP_KERNEL_ACCOUNT|__GFP_ZERO|__GFP_NOWARN|__GFP_RETRY_MAYFAIL|__GFP_COMP), pid 16741, tgid 16741 (syz-executor), ts 343313197788, free_ts 380670750466\n set_page_owner include/linux/page_owner.h:32 [inline]\n post_alloc_hook+0x240/0x2a0 mm/page_alloc.c:1851\n prep_new_page mm/page_alloc.c:1859 [inline]\n get_page_from_freelist+0x21e4/0x22c0 mm/page_alloc.c:3858\n __alloc_frozen_pages_noprof+0x181/0x370 mm/page_alloc.c:5148\n alloc_pages_mpol+0x232/0x4a0 mm/mempolicy.c:2416\n ___kmalloc_large_node+0x5f/0x1b0 mm/slub.c:4317\n __kmalloc_large_node_noprof+0x18/0x90 mm/slub.c:4348\n __do_kmalloc_node mm/slub.c:4364 [inline]\n __kvmalloc_node\n---truncated---",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40064",
"url": "https://www.suse.com/security/cve/CVE-2025-40064"
},
{
"category": "external",
"summary": "SUSE Bug 1252845 for CVE-2025-40064",
"url": "https://bugzilla.suse.com/1252845"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-19T16:46:47Z",
"details": "moderate"
}
],
"title": "CVE-2025-40064"
},
{
"cve": "CVE-2025-40070",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40070"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\npps: fix warning in pps_register_cdev when register device fail\n\nSimilar to previous commit 2a934fdb01db (\"media: v4l2-dev: fix error\nhandling in __video_register_device()\"), the release hook should be set\nbefore device_register(). Otherwise, when device_register() return error\nand put_device() try to callback the release function, the below warning\nmay happen.\n\n ------------[ cut here ]------------\n WARNING: CPU: 1 PID: 4760 at drivers/base/core.c:2567 device_release+0x1bd/0x240 drivers/base/core.c:2567\n Modules linked in:\n CPU: 1 UID: 0 PID: 4760 Comm: syz.4.914 Not tainted 6.17.0-rc3+ #1 NONE\n RIP: 0010:device_release+0x1bd/0x240 drivers/base/core.c:2567\n Call Trace:\n \u003cTASK\u003e\n kobject_cleanup+0x136/0x410 lib/kobject.c:689\n kobject_release lib/kobject.c:720 [inline]\n kref_put include/linux/kref.h:65 [inline]\n kobject_put+0xe9/0x130 lib/kobject.c:737\n put_device+0x24/0x30 drivers/base/core.c:3797\n pps_register_cdev+0x2da/0x370 drivers/pps/pps.c:402\n pps_register_source+0x2f6/0x480 drivers/pps/kapi.c:108\n pps_tty_open+0x190/0x310 drivers/pps/clients/pps-ldisc.c:57\n tty_ldisc_open+0xa7/0x120 drivers/tty/tty_ldisc.c:432\n tty_set_ldisc+0x333/0x780 drivers/tty/tty_ldisc.c:563\n tiocsetd drivers/tty/tty_io.c:2429 [inline]\n tty_ioctl+0x5d1/0x1700 drivers/tty/tty_io.c:2728\n vfs_ioctl fs/ioctl.c:51 [inline]\n __do_sys_ioctl fs/ioctl.c:598 [inline]\n __se_sys_ioctl fs/ioctl.c:584 [inline]\n __x64_sys_ioctl+0x194/0x210 fs/ioctl.c:584\n do_syscall_x64 arch/x86/entry/syscall_64.c:63 [inline]\n do_syscall_64+0x5f/0x2a0 arch/x86/entry/syscall_64.c:94\n entry_SYSCALL_64_after_hwframe+0x76/0x7e\n \u003c/TASK\u003e\n\nBefore commit c79a39dc8d06 (\"pps: Fix a use-after-free\"),\npps_register_cdev() call device_create() to create pps-\u003edev, which will\ninit dev-\u003erelease to device_create_release(). Now the comment is outdated,\njust remove it.\n\nThanks for the reminder from Calvin Owens, \u0027kfree_pps\u0027 should be removed\nin pps_register_source() to avoid a double free in the failure case.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40070",
"url": "https://www.suse.com/security/cve/CVE-2025-40070"
},
{
"category": "external",
"summary": "SUSE Bug 1252836 for CVE-2025-40070",
"url": "https://bugzilla.suse.com/1252836"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-19T16:46:47Z",
"details": "moderate"
}
],
"title": "CVE-2025-40070"
},
{
"cve": "CVE-2025-40074",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40074"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nipv4: start using dst_dev_rcu()\n\nChange icmpv4_xrlim_allow(), ip_defrag() to prevent possible UAF.\n\nChange ipmr_prepare_xmit(), ipmr_queue_fwd_xmit(), ip_mr_output(),\nipv4_neigh_lookup() to use lockdep enabled dst_dev_rcu().",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40074",
"url": "https://www.suse.com/security/cve/CVE-2025-40074"
},
{
"category": "external",
"summary": "SUSE Bug 1252794 for CVE-2025-40074",
"url": "https://bugzilla.suse.com/1252794"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-19T16:46:47Z",
"details": "moderate"
}
],
"title": "CVE-2025-40074"
},
{
"cve": "CVE-2025-40075",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40075"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\ntcp_metrics: use dst_dev_net_rcu()\n\nReplace three dst_dev() with a lockdep enabled helper.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40075",
"url": "https://www.suse.com/security/cve/CVE-2025-40075"
},
{
"category": "external",
"summary": "SUSE Bug 1252795 for CVE-2025-40075",
"url": "https://bugzilla.suse.com/1252795"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-19T16:46:47Z",
"details": "moderate"
}
],
"title": "CVE-2025-40075"
},
{
"cve": "CVE-2025-40081",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40081"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nperf: arm_spe: Prevent overflow in PERF_IDX2OFF()\n\nCast nr_pages to unsigned long to avoid overflow when handling large\nAUX buffer sizes (\u003e= 2 GiB).",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40081",
"url": "https://www.suse.com/security/cve/CVE-2025-40081"
},
{
"category": "external",
"summary": "SUSE Bug 1252776 for CVE-2025-40081",
"url": "https://bugzilla.suse.com/1252776"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-19T16:46:47Z",
"details": "moderate"
}
],
"title": "CVE-2025-40081"
},
{
"cve": "CVE-2025-40083",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40083"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnet/sched: sch_qfq: Fix null-deref in agg_dequeue\n\nTo prevent a potential crash in agg_dequeue (net/sched/sch_qfq.c)\nwhen cl-\u003eqdisc-\u003eops-\u003epeek(cl-\u003eqdisc) returns NULL, we check the return\nvalue before using it, similar to the existing approach in sch_hfsc.c.\n\nTo avoid code duplication, the following changes are made:\n\n1. Changed qdisc_warn_nonwc(include/net/pkt_sched.h) into a static\ninline function.\n\n2. Moved qdisc_peek_len from net/sched/sch_hfsc.c to\ninclude/net/pkt_sched.h so that sch_qfq can reuse it.\n\n3. Applied qdisc_peek_len in agg_dequeue to avoid crashing.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40083",
"url": "https://www.suse.com/security/cve/CVE-2025-40083"
},
{
"category": "external",
"summary": "SUSE Bug 1252912 for CVE-2025-40083",
"url": "https://bugzilla.suse.com/1252912"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-19T16:46:47Z",
"details": "moderate"
}
],
"title": "CVE-2025-40083"
},
{
"cve": "CVE-2025-40086",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40086"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\ndrm/xe: Don\u0027t allow evicting of BOs in same VM in array of VM binds\n\nAn array of VM binds can potentially evict other buffer objects (BOs)\nwithin the same VM under certain conditions, which may lead to NULL\npointer dereferences later in the bind pipeline. To prevent this, clear\nthe allow_res_evict flag in the xe_bo_validate call.\n\nv2:\n - Invert polarity of no_res_evict (Thomas)\n - Add comment in code explaining issue (Thomas)\n\n(cherry picked from commit 8b9ba8d6d95fe75fed6b0480bb03da4b321bea08)",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40086",
"url": "https://www.suse.com/security/cve/CVE-2025-40086"
},
{
"category": "external",
"summary": "SUSE Bug 1252923 for CVE-2025-40086",
"url": "https://bugzilla.suse.com/1252923"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.1,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-19T16:46:47Z",
"details": "moderate"
}
],
"title": "CVE-2025-40086"
},
{
"cve": "CVE-2025-40098",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40098"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nALSA: hda: cs35l41: Fix NULL pointer dereference in cs35l41_get_acpi_mute_state()\n\nReturn value of a function acpi_evaluate_dsm() is dereferenced without\nchecking for NULL, but it is usually checked for this function.\n\nacpi_evaluate_dsm() may return NULL, when acpi_evaluate_object() returns\nacpi_status other than ACPI_SUCCESS, so add a check to prevent the crach.\n\nFound by Linux Verification Center (linuxtesting.org) with SVACE.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40098",
"url": "https://www.suse.com/security/cve/CVE-2025-40098"
},
{
"category": "external",
"summary": "SUSE Bug 1252917 for CVE-2025-40098",
"url": "https://bugzilla.suse.com/1252917"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-19T16:46:47Z",
"details": "moderate"
}
],
"title": "CVE-2025-40098"
},
{
"cve": "CVE-2025-40101",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40101"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nbtrfs: fix memory leaks when rejecting a non SINGLE data profile without an RST\n\nAt the end of btrfs_load_block_group_zone_info() the first thing we do\nis to ensure that if the mapping type is not a SINGLE one and there is\nno RAID stripe tree, then we return early with an error.\n\nDoing that, though, prevents the code from running the last calls from\nthis function which are about freeing memory allocated during its\nrun. Hence, in this case, instead of returning early, we set the ret\nvalue and fall through the rest of the cleanup code.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40101",
"url": "https://www.suse.com/security/cve/CVE-2025-40101"
},
{
"category": "external",
"summary": "SUSE Bug 1252901 for CVE-2025-40101",
"url": "https://bugzilla.suse.com/1252901"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.3,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-19T16:46:47Z",
"details": "low"
}
],
"title": "CVE-2025-40101"
},
{
"cve": "CVE-2025-40102",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40102"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nKVM: arm64: Prevent access to vCPU events before init\n\nAnother day, another syzkaller bug. KVM erroneously allows userspace to\npend vCPU events for a vCPU that hasn\u0027t been initialized yet, leading to\nKVM interpreting a bunch of uninitialized garbage for routing /\ninjecting the exception.\n\nIn one case the injection code and the hyp disagree on whether the vCPU\nhas a 32bit EL1 and put the vCPU into an illegal mode for AArch64,\ntripping the BUG() in exception_target_el() during the next injection:\n\n kernel BUG at arch/arm64/kvm/inject_fault.c:40!\n Internal error: Oops - BUG: 00000000f2000800 [#1] SMP\n CPU: 3 UID: 0 PID: 318 Comm: repro Not tainted 6.17.0-rc4-00104-g10fd0285305d #6 PREEMPT\n Hardware name: linux,dummy-virt (DT)\n pstate: 21402009 (nzCv daif +PAN -UAO -TCO +DIT -SSBS BTYPE=--)\n pc : exception_target_el+0x88/0x8c\n lr : pend_serror_exception+0x18/0x13c\n sp : ffff800082f03a10\n x29: ffff800082f03a10 x28: ffff0000cb132280 x27: 0000000000000000\n x26: 0000000000000000 x25: ffff0000c2a99c20 x24: 0000000000000000\n x23: 0000000000008000 x22: 0000000000000002 x21: 0000000000000004\n x20: 0000000000008000 x19: ffff0000c2a99c20 x18: 0000000000000000\n x17: 0000000000000000 x16: 0000000000000000 x15: 00000000200000c0\n x14: 0000000000000000 x13: 0000000000000000 x12: 0000000000000000\n x11: 0000000000000000 x10: 0000000000000000 x9 : 0000000000000000\n x8 : ffff800082f03af8 x7 : 0000000000000000 x6 : 0000000000000000\n x5 : ffff800080f621f0 x4 : 0000000000000000 x3 : 0000000000000000\n x2 : 000000000040009b x1 : 0000000000000003 x0 : ffff0000c2a99c20\n Call trace:\n exception_target_el+0x88/0x8c (P)\n kvm_inject_serror_esr+0x40/0x3b4\n __kvm_arm_vcpu_set_events+0xf0/0x100\n kvm_arch_vcpu_ioctl+0x180/0x9d4\n kvm_vcpu_ioctl+0x60c/0x9f4\n __arm64_sys_ioctl+0xac/0x104\n invoke_syscall+0x48/0x110\n el0_svc_common.constprop.0+0x40/0xe0\n do_el0_svc+0x1c/0x28\n el0_svc+0x34/0xf0\n el0t_64_sync_handler+0xa0/0xe4\n el0t_64_sync+0x198/0x19c\n Code: f946bc01 b4fffe61 9101e020 17fffff2 (d4210000)\n\nReject the ioctls outright as no sane VMM would call these before\nKVM_ARM_VCPU_INIT anyway. Even if it did the exception would\u0027ve been\nthrown away by the eventual reset of the vCPU\u0027s state.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40102",
"url": "https://www.suse.com/security/cve/CVE-2025-40102"
},
{
"category": "external",
"summary": "SUSE Bug 1252919 for CVE-2025-40102",
"url": "https://bugzilla.suse.com/1252919"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 0,
"baseSeverity": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-19T16:46:47Z",
"details": "moderate"
}
],
"title": "CVE-2025-40102"
},
{
"cve": "CVE-2025-40105",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40105"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nvfs: Don\u0027t leak disconnected dentries on umount\n\nWhen user calls open_by_handle_at() on some inode that is not cached, we\nwill create disconnected dentry for it. If such dentry is a directory,\nexportfs_decode_fh_raw() will then try to connect this dentry to the\ndentry tree through reconnect_path(). It may happen for various reasons\n(such as corrupted fs or race with rename) that the call to\nlookup_one_unlocked() in reconnect_one() will fail to find the dentry we\nare trying to reconnect and instead create a new dentry under the\nparent. Now this dentry will not be marked as disconnected although the\nparent still may well be disconnected (at least in case this\ninconsistency happened because the fs is corrupted and .. doesn\u0027t point\nto the real parent directory). This creates inconsistency in\ndisconnected flags but AFAICS it was mostly harmless. At least until\ncommit f1ee616214cb (\"VFS: don\u0027t keep disconnected dentries on d_anon\")\nwhich removed adding of most disconnected dentries to sb-\u003es_anon list.\nThus after this commit cleanup of disconnected dentries implicitely\nrelies on the fact that dput() will immediately reclaim such dentries.\nHowever when some leaf dentry isn\u0027t marked as disconnected, as in the\nscenario described above, the reclaim doesn\u0027t happen and the dentries\nare \"leaked\". Memory reclaim can eventually reclaim them but otherwise\nthey stay in memory and if umount comes first, we hit infamous \"Busy\ninodes after unmount\" bug. Make sure all dentries created under a\ndisconnected parent are marked as disconnected as well.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40105",
"url": "https://www.suse.com/security/cve/CVE-2025-40105"
},
{
"category": "external",
"summary": "SUSE Bug 1252928 for CVE-2025-40105",
"url": "https://bugzilla.suse.com/1252928"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.3,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-19T16:46:47Z",
"details": "low"
}
],
"title": "CVE-2025-40105"
},
{
"cve": "CVE-2025-40107",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40107"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\ncan: hi311x: fix null pointer dereference when resuming from sleep before interface was enabled\n\nThis issue is similar to the vulnerability in the `mcp251x` driver,\nwhich was fixed in commit 03c427147b2d (\"can: mcp251x: fix resume from\nsleep before interface was brought up\").\n\nIn the `hi311x` driver, when the device resumes from sleep, the driver\nschedules `priv-\u003erestart_work`. However, if the network interface was\nnot previously enabled, the `priv-\u003ewq` (workqueue) is not allocated and\ninitialized, leading to a null pointer dereference.\n\nTo fix this, we move the allocation and initialization of the workqueue\nfrom the `hi3110_open` function to the `hi3110_can_probe` function.\nThis ensures that the workqueue is properly initialized before it is\nused during device resume. And added logic to destroy the workqueue\nin the error handling paths of `hi3110_can_probe` and in the\n`hi3110_can_remove` function to prevent resource leaks.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40107",
"url": "https://www.suse.com/security/cve/CVE-2025-40107"
},
{
"category": "external",
"summary": "SUSE Bug 1253018 for CVE-2025-40107",
"url": "https://bugzilla.suse.com/1253018"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-19T16:46:47Z",
"details": "moderate"
}
],
"title": "CVE-2025-40107"
},
{
"cve": "CVE-2025-40109",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40109"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\ncrypto: rng - Ensure set_ent is always present\n\nEnsure that set_ent is always set since only drbg provides it.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40109",
"url": "https://www.suse.com/security/cve/CVE-2025-40109"
},
{
"category": "external",
"summary": "SUSE Bug 1253176 for CVE-2025-40109",
"url": "https://bugzilla.suse.com/1253176"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-19T16:46:47Z",
"details": "moderate"
}
],
"title": "CVE-2025-40109"
},
{
"cve": "CVE-2025-40110",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40110"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\ndrm/vmwgfx: Fix a null-ptr access in the cursor snooper\n\nCheck that the resource which is converted to a surface exists before\ntrying to use the cursor snooper on it.\n\nvmw_cmd_res_check allows explicit invalid (SVGA3D_INVALID_ID) identifiers\nbecause some svga commands accept SVGA3D_INVALID_ID to mean \"no surface\",\nunfortunately functions that accept the actual surfaces as objects might\n(and in case of the cursor snooper, do not) be able to handle null\nobjects. Make sure that we validate not only the identifier (via the\nvmw_cmd_res_check) but also check that the actual resource exists before\ntrying to do something with it.\n\nFixes unchecked null-ptr reference in the snooping code.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40110",
"url": "https://www.suse.com/security/cve/CVE-2025-40110"
},
{
"category": "external",
"summary": "SUSE Bug 1253275 for CVE-2025-40110",
"url": "https://bugzilla.suse.com/1253275"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.1,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-19T16:46:47Z",
"details": "moderate"
}
],
"title": "CVE-2025-40110"
},
{
"cve": "CVE-2025-40111",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40111"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\ndrm/vmwgfx: Fix Use-after-free in validation\n\nNodes stored in the validation duplicates hashtable come from an arena\nallocator that is cleared at the end of vmw_execbuf_process. All nodes\nare expected to be cleared in vmw_validation_drop_ht but this node escaped\nbecause its resource was destroyed prematurely.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40111",
"url": "https://www.suse.com/security/cve/CVE-2025-40111"
},
{
"category": "external",
"summary": "SUSE Bug 1253362 for CVE-2025-40111",
"url": "https://bugzilla.suse.com/1253362"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.7,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:L/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-19T16:46:47Z",
"details": "moderate"
}
],
"title": "CVE-2025-40111"
},
{
"cve": "CVE-2025-40115",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40115"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nscsi: mpt3sas: Fix crash in transport port remove by using ioc_info()\n\nDuring mpt3sas_transport_port_remove(), messages were logged with\ndev_printk() against \u0026mpt3sas_port-\u003eport-\u003edev. At this point the SAS\ntransport device may already be partially unregistered or freed, leading\nto a crash when accessing its struct device.\n\nUsing ioc_info(), which logs via the PCI device (ioc-\u003epdev-\u003edev),\nguaranteed to remain valid until driver removal.\n\n[83428.295776] Oops: general protection fault, probably for non-canonical address 0x6f702f323a33312d: 0000 [#1] SMP NOPTI\n[83428.295785] CPU: 145 UID: 0 PID: 113296 Comm: rmmod Kdump: loaded Tainted: G OE 6.16.0-rc1+ #1 PREEMPT(voluntary)\n[83428.295792] Tainted: [O]=OOT_MODULE, [E]=UNSIGNED_MODULE\n[83428.295795] Hardware name: Dell Inc. Precision 7875 Tower/, BIOS 89.1.67 02/23/2024\n[83428.295799] RIP: 0010:__dev_printk+0x1f/0x70\n[83428.295805] Code: 90 90 90 90 90 90 90 90 90 90 90 0f 1f 44 00 00 49 89 d1 48 85 f6 74 52 4c 8b 46 50 4d 85 c0 74 1f 48 8b 46 68 48 85 c0 74 22 \u003c48\u003e 8b 08 0f b6 7f 01 48 c7 c2 db e8 42 ad 83 ef 30 e9 7b f8 ff ff\n[83428.295813] RSP: 0018:ff85aeafc3137bb0 EFLAGS: 00010206\n[83428.295817] RAX: 6f702f323a33312d RBX: ff4290ee81292860 RCX: 5000cca25103be32\n[83428.295820] RDX: ff85aeafc3137bb8 RSI: ff4290eeb1966c00 RDI: ffffffffc1560845\n[83428.295823] RBP: ff85aeafc3137c18 R08: 74726f702f303a33 R09: ff85aeafc3137bb8\n[83428.295826] R10: ff85aeafc3137b18 R11: ff4290f5bd60fe68 R12: ff4290ee81290000\n[83428.295830] R13: ff4290ee6e345de0 R14: ff4290ee81290000 R15: ff4290ee6e345e30\n[83428.295833] FS: 00007fd9472a6740(0000) GS:ff4290f5ce96b000(0000) knlGS:0000000000000000\n[83428.295837] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033\n[83428.295840] CR2: 00007f242b4db238 CR3: 00000002372b8006 CR4: 0000000000771ef0\n[83428.295844] PKRU: 55555554\n[83428.295846] Call Trace:\n[83428.295848] \u003cTASK\u003e\n[83428.295850] _dev_printk+0x5c/0x80\n[83428.295857] ? srso_alias_return_thunk+0x5/0xfbef5\n[83428.295863] mpt3sas_transport_port_remove+0x1c7/0x420 [mpt3sas]\n[83428.295882] _scsih_remove_device+0x21b/0x280 [mpt3sas]\n[83428.295894] ? _scsih_expander_node_remove+0x108/0x140 [mpt3sas]\n[83428.295906] ? srso_alias_return_thunk+0x5/0xfbef5\n[83428.295910] mpt3sas_device_remove_by_sas_address.part.0+0x8f/0x110 [mpt3sas]\n[83428.295921] _scsih_expander_node_remove+0x129/0x140 [mpt3sas]\n[83428.295933] _scsih_expander_node_remove+0x6a/0x140 [mpt3sas]\n[83428.295944] scsih_remove+0x3f0/0x4a0 [mpt3sas]\n[83428.295957] pci_device_remove+0x3b/0xb0\n[83428.295962] device_release_driver_internal+0x193/0x200\n[83428.295968] driver_detach+0x44/0x90\n[83428.295971] bus_remove_driver+0x69/0xf0\n[83428.295975] pci_unregister_driver+0x2a/0xb0\n[83428.295979] _mpt3sas_exit+0x1f/0x300 [mpt3sas]\n[83428.295991] __do_sys_delete_module.constprop.0+0x174/0x310\n[83428.295997] ? srso_alias_return_thunk+0x5/0xfbef5\n[83428.296000] ? __x64_sys_getdents64+0x9a/0x110\n[83428.296005] ? srso_alias_return_thunk+0x5/0xfbef5\n[83428.296009] ? syscall_trace_enter+0xf6/0x1b0\n[83428.296014] do_syscall_64+0x7b/0x2c0\n[83428.296019] ? srso_alias_return_thunk+0x5/0xfbef5\n[83428.296023] entry_SYSCALL_64_after_hwframe+0x76/0x7e",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40115",
"url": "https://www.suse.com/security/cve/CVE-2025-40115"
},
{
"category": "external",
"summary": "SUSE Bug 1253318 for CVE-2025-40115",
"url": "https://bugzilla.suse.com/1253318"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-19T16:46:47Z",
"details": "moderate"
}
],
"title": "CVE-2025-40115"
},
{
"cve": "CVE-2025-40116",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40116"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nusb: host: max3421-hcd: Fix error pointer dereference in probe cleanup\n\nThe kthread_run() function returns error pointers so the\nmax3421_hcd-\u003espi_thread pointer can be either error pointers or NULL.\nCheck for both before dereferencing it.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40116",
"url": "https://www.suse.com/security/cve/CVE-2025-40116"
},
{
"category": "external",
"summary": "SUSE Bug 1253324 for CVE-2025-40116",
"url": "https://bugzilla.suse.com/1253324"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-19T16:46:47Z",
"details": "moderate"
}
],
"title": "CVE-2025-40116"
},
{
"cve": "CVE-2025-40118",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40118"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nscsi: pm80xx: Fix array-index-out-of-of-bounds on rmmod\n\nSince commit f7b705c238d1 (\"scsi: pm80xx: Set phy_attached to zero when\ndevice is gone\") UBSAN reports:\n\n UBSAN: array-index-out-of-bounds in drivers/scsi/pm8001/pm8001_sas.c:786:17\n index 28 is out of range for type \u0027pm8001_phy [16]\u0027\n\non rmmod when using an expander.\n\nFor a direct attached device, attached_phy contains the local phy id.\nFor a device behind an expander, attached_phy contains the remote phy\nid, not the local phy id.\n\nI.e. while pm8001_ha will have pm8001_ha-\u003echip-\u003en_phy local phys, for a\ndevice behind an expander, attached_phy can be much larger than\npm8001_ha-\u003echip-\u003en_phy (depending on the amount of phys of the\nexpander).\n\nE.g. on my system pm8001_ha has 8 phys with phy ids 0-7. One of the\nports has an expander connected. The expander has 31 phys with phy ids\n0-30.\n\nThe pm8001_ha-\u003ephy array only contains the phys of the HBA. It does not\ncontain the phys of the expander. Thus, it is wrong to use attached_phy\nto index the pm8001_ha-\u003ephy array for a device behind an expander.\n\nThus, we can only clear phy_attached for devices that are directly\nattached.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40118",
"url": "https://www.suse.com/security/cve/CVE-2025-40118"
},
{
"category": "external",
"summary": "SUSE Bug 1253363 for CVE-2025-40118",
"url": "https://bugzilla.suse.com/1253363"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.1,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-19T16:46:47Z",
"details": "moderate"
}
],
"title": "CVE-2025-40118"
},
{
"cve": "CVE-2025-40120",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40120"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnet: usb: asix: hold PM usage ref to avoid PM/MDIO + RTNL deadlock\n\nPrevent USB runtime PM (autosuspend) for AX88772* in bind.\n\nusbnet enables runtime PM (autosuspend) by default, so disabling it via\nthe usb_driver flag is ineffective. On AX88772B, autosuspend shows no\nmeasurable power saving with current driver (no link partner, admin\nup/down). The ~0.453 W -\u003e ~0.248 W drop on v6.1 comes from phylib powering\nthe PHY off on admin-down, not from USB autosuspend.\n\nThe real hazard is that with runtime PM enabled, ndo_open() (under RTNL)\nmay synchronously trigger autoresume (usb_autopm_get_interface()) into\nasix_resume() while the USB PM lock is held. Resume paths then invoke\nphylink/phylib and MDIO, which also expect RTNL, leading to possible\ndeadlocks or PM lock vs MDIO wake issues.\n\nTo avoid this, keep the device runtime-PM active by taking a usage\nreference in ax88772_bind() and dropping it in unbind(). A non-zero PM\nusage count blocks runtime suspend regardless of userspace policy\n(.../power/control - pm_runtime_allow/forbid), making this approach\nrobust against sysfs overrides.\n\nHolding a runtime-PM usage ref does not affect system-wide suspend;\nsystem sleep/resume callbacks continue to run as before.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40120",
"url": "https://www.suse.com/security/cve/CVE-2025-40120"
},
{
"category": "external",
"summary": "SUSE Bug 1253360 for CVE-2025-40120",
"url": "https://bugzilla.suse.com/1253360"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-19T16:46:47Z",
"details": "moderate"
}
],
"title": "CVE-2025-40120"
},
{
"cve": "CVE-2025-40121",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40121"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nASoC: Intel: bytcr_rt5651: Fix invalid quirk input mapping\n\nWhen an invalid value is passed via quirk option, currently\nbytcr_rt5640 driver just ignores and leaves as is, which may lead to\nunepxected results like OOB access.\n\nThis patch adds the sanity check and corrects the input mapping to the\ncertain default value if an invalid value is passed.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40121",
"url": "https://www.suse.com/security/cve/CVE-2025-40121"
},
{
"category": "external",
"summary": "SUSE Bug 1253367 for CVE-2025-40121",
"url": "https://bugzilla.suse.com/1253367"
},
{
"category": "external",
"summary": "SUSE Bug 1253430 for CVE-2025-40121",
"url": "https://bugzilla.suse.com/1253430"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-19T16:46:47Z",
"details": "moderate"
}
],
"title": "CVE-2025-40121"
},
{
"cve": "CVE-2025-40127",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40127"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nhwrng: ks-sa - fix division by zero in ks_sa_rng_init\n\nFix division by zero in ks_sa_rng_init caused by missing clock\npointer initialization. The clk_get_rate() call is performed on\nan uninitialized clk pointer, resulting in division by zero when\ncalculating delay values.\n\nAdd clock initialization code before using the clock.\n\n\n drivers/char/hw_random/ks-sa-rng.c | 7 +++++++\n 1 file changed, 7 insertions(+)",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40127",
"url": "https://www.suse.com/security/cve/CVE-2025-40127"
},
{
"category": "external",
"summary": "SUSE Bug 1253369 for CVE-2025-40127",
"url": "https://bugzilla.suse.com/1253369"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-19T16:46:47Z",
"details": "moderate"
}
],
"title": "CVE-2025-40127"
},
{
"cve": "CVE-2025-40129",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40129"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nsunrpc: fix null pointer dereference on zero-length checksum\n\nIn xdr_stream_decode_opaque_auth(), zero-length checksum.len causes\nchecksum.data to be set to NULL. This triggers a NPD when accessing\nchecksum.data in gss_krb5_verify_mic_v2(). This patch ensures that\nthe value of checksum.len is not less than XDR_UNIT.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40129",
"url": "https://www.suse.com/security/cve/CVE-2025-40129"
},
{
"category": "external",
"summary": "SUSE Bug 1253472 for CVE-2025-40129",
"url": "https://bugzilla.suse.com/1253472"
},
{
"category": "external",
"summary": "SUSE Bug 1253473 for CVE-2025-40129",
"url": "https://bugzilla.suse.com/1253473"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-19T16:46:47Z",
"details": "important"
}
],
"title": "CVE-2025-40129"
},
{
"cve": "CVE-2025-40132",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40132"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nASoC: Intel: sof_sdw: Prevent jump to NULL add_sidecar callback\n\nIn create_sdw_dailink() check that sof_end-\u003ecodec_info-\u003eadd_sidecar\nis not NULL before calling it.\n\nThe original code assumed that if include_sidecar is true, the codec\non that link has an add_sidecar callback. But there could be other\ncodecs on the same link that do not have an add_sidecar callback.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40132",
"url": "https://www.suse.com/security/cve/CVE-2025-40132"
},
{
"category": "external",
"summary": "SUSE Bug 1253330 for CVE-2025-40132",
"url": "https://bugzilla.suse.com/1253330"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-19T16:46:47Z",
"details": "moderate"
}
],
"title": "CVE-2025-40132"
},
{
"cve": "CVE-2025-40133",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40133"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nmptcp: Use __sk_dst_get() and dst_dev_rcu() in mptcp_active_enable().\n\nmptcp_active_enable() is called from subflow_finish_connect(),\nwhich is icsk-\u003eicsk_af_ops-\u003esk_rx_dst_set() and it\u0027s not always\nunder RCU.\n\nUsing sk_dst_get(sk)-\u003edev could trigger UAF.\n\nLet\u0027s use __sk_dst_get() and dst_dev_rcu().",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40133",
"url": "https://www.suse.com/security/cve/CVE-2025-40133"
},
{
"category": "external",
"summary": "SUSE Bug 1253328 for CVE-2025-40133",
"url": "https://bugzilla.suse.com/1253328"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-19T16:46:47Z",
"details": "moderate"
}
],
"title": "CVE-2025-40133"
},
{
"cve": "CVE-2025-40134",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40134"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\ndm: fix NULL pointer dereference in __dm_suspend()\n\nThere is a race condition between dm device suspend and table load that\ncan lead to null pointer dereference. The issue occurs when suspend is\ninvoked before table load completes:\n\nBUG: kernel NULL pointer dereference, address: 0000000000000054\nOops: 0000 [#1] PREEMPT SMP PTI\nCPU: 6 PID: 6798 Comm: dmsetup Not tainted 6.6.0-g7e52f5f0ca9b #62\nHardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.16.1-2.fc37 04/01/2014\nRIP: 0010:blk_mq_wait_quiesce_done+0x0/0x50\nCall Trace:\n \u003cTASK\u003e\n blk_mq_quiesce_queue+0x2c/0x50\n dm_stop_queue+0xd/0x20\n __dm_suspend+0x130/0x330\n dm_suspend+0x11a/0x180\n dev_suspend+0x27e/0x560\n ctl_ioctl+0x4cf/0x850\n dm_ctl_ioctl+0xd/0x20\n vfs_ioctl+0x1d/0x50\n __se_sys_ioctl+0x9b/0xc0\n __x64_sys_ioctl+0x19/0x30\n x64_sys_call+0x2c4a/0x4620\n do_syscall_64+0x9e/0x1b0\n\nThe issue can be triggered as below:\n\nT1 \t\t\t\t\t\tT2\ndm_suspend\t\t\t\t\ttable_load\n__dm_suspend\t\t\t\t\tdm_setup_md_queue\n\t\t\t\t\t\tdm_mq_init_request_queue\n\t\t\t\t\t\tblk_mq_init_allocated_queue\n\t\t\t\t\t\t=\u003e q-\u003emq_ops = set-\u003eops; (1)\ndm_stop_queue / dm_wait_for_completion\n=\u003e q-\u003etag_set NULL pointer!\t(2)\n\t\t\t\t\t\t=\u003e q-\u003etag_set = set; (3)\n\nFix this by checking if a valid table (map) exists before performing\nrequest-based suspend and waiting for target I/O. When map is NULL,\nskip these table-dependent suspend steps.\n\nEven when map is NULL, no I/O can reach any target because there is\nno table loaded; I/O submitted in this state will fail early in the\nDM layer. Skipping the table-dependent suspend logic in this case\nis safe and avoids NULL pointer dereferences.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40134",
"url": "https://www.suse.com/security/cve/CVE-2025-40134"
},
{
"category": "external",
"summary": "SUSE Bug 1253386 for CVE-2025-40134",
"url": "https://bugzilla.suse.com/1253386"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.7,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-19T16:46:47Z",
"details": "moderate"
}
],
"title": "CVE-2025-40134"
},
{
"cve": "CVE-2025-40135",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40135"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nipv6: use RCU in ip6_xmit()\n\nUse RCU in ip6_xmit() in order to use dst_dev_rcu() to prevent\npossible UAF.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40135",
"url": "https://www.suse.com/security/cve/CVE-2025-40135"
},
{
"category": "external",
"summary": "SUSE Bug 1253342 for CVE-2025-40135",
"url": "https://bugzilla.suse.com/1253342"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.1,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-19T16:46:47Z",
"details": "moderate"
}
],
"title": "CVE-2025-40135"
},
{
"cve": "CVE-2025-40139",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40139"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nsmc: Use __sk_dst_get() and dst_dev_rcu() in in smc_clc_prfx_set().\n\nsmc_clc_prfx_set() is called during connect() and not under RCU\nnor RTNL.\n\nUsing sk_dst_get(sk)-\u003edev could trigger UAF.\n\nLet\u0027s use __sk_dst_get() and dev_dst_rcu() under rcu_read_lock()\nafter kernel_getsockname().\n\nNote that the returned value of smc_clc_prfx_set() is not used\nin the caller.\n\nWhile at it, we change the 1st arg of smc_clc_prfx_set[46]_rcu()\nnot to touch dst there.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40139",
"url": "https://www.suse.com/security/cve/CVE-2025-40139"
},
{
"category": "external",
"summary": "SUSE Bug 1253409 for CVE-2025-40139",
"url": "https://bugzilla.suse.com/1253409"
},
{
"category": "external",
"summary": "SUSE Bug 1253411 for CVE-2025-40139",
"url": "https://bugzilla.suse.com/1253411"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-19T16:46:47Z",
"details": "important"
}
],
"title": "CVE-2025-40139"
},
{
"cve": "CVE-2025-40140",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40140"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnet: usb: Remove disruptive netif_wake_queue in rtl8150_set_multicast\n\nsyzbot reported WARNING in rtl8150_start_xmit/usb_submit_urb.\nThis is the sequence of events that leads to the warning:\n\nrtl8150_start_xmit() {\n\tnetif_stop_queue();\n\tusb_submit_urb(dev-\u003etx_urb);\n}\n\nrtl8150_set_multicast() {\n\tnetif_stop_queue();\n\tnetif_wake_queue();\t\t\u003c-- wakes up TX queue before URB is done\n}\n\nrtl8150_start_xmit() {\n\tnetif_stop_queue();\n\tusb_submit_urb(dev-\u003etx_urb);\t\u003c-- double submission\n}\n\nrtl8150_set_multicast being the ndo_set_rx_mode callback should not be\ncalling netif_stop_queue and notif_start_queue as these handle\nTX queue synchronization.\n\nThe net core function dev_set_rx_mode handles the synchronization\nfor rtl8150_set_multicast making it safe to remove these locks.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40140",
"url": "https://www.suse.com/security/cve/CVE-2025-40140"
},
{
"category": "external",
"summary": "SUSE Bug 1253349 for CVE-2025-40140",
"url": "https://bugzilla.suse.com/1253349"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.3,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-19T16:46:47Z",
"details": "low"
}
],
"title": "CVE-2025-40140"
},
{
"cve": "CVE-2025-40141",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40141"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nBluetooth: ISO: Fix possible UAF on iso_conn_free\n\nThis attempt to fix similar issue to sco_conn_free where if the\nconn-\u003esk is not set to NULL may lead to UAF on iso_conn_free.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40141",
"url": "https://www.suse.com/security/cve/CVE-2025-40141"
},
{
"category": "external",
"summary": "SUSE Bug 1253352 for CVE-2025-40141",
"url": "https://bugzilla.suse.com/1253352"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-19T16:46:47Z",
"details": "moderate"
}
],
"title": "CVE-2025-40141"
},
{
"cve": "CVE-2025-40142",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40142"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nALSA: pcm: Disable bottom softirqs as part of spin_lock_irq() on PREEMPT_RT\n\nsnd_pcm_group_lock_irq() acquires a spinlock_t and disables interrupts\nvia spin_lock_irq(). This also implicitly disables the handling of\nsoftirqs such as TIMER_SOFTIRQ.\nOn PREEMPT_RT softirqs are preemptible and spin_lock_irq() does not\ndisable them. That means a timer can be invoked during spin_lock_irq()\non the same CPU. Due to synchronisations reasons local_bh_disable() has\na per-CPU lock named softirq_ctrl.lock which synchronizes individual\nsoftirq against each other.\nsyz-bot managed to trigger a lockdep report where softirq_ctrl.lock is\nacquired in hrtimer_cancel() in addition to hrtimer_run_softirq(). This\nis a possible deadlock.\n\nThe softirq_ctrl.lock can not be made part of spin_lock_irq() as this\nwould lead to too much synchronisation against individual threads on the\nsystem. To avoid the possible deadlock, softirqs must be manually\ndisabled before the lock is acquired.\n\nDisable softirqs before the lock is acquired on PREEMPT_RT.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40142",
"url": "https://www.suse.com/security/cve/CVE-2025-40142"
},
{
"category": "external",
"summary": "SUSE Bug 1253348 for CVE-2025-40142",
"url": "https://bugzilla.suse.com/1253348"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.7,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-19T16:46:47Z",
"details": "moderate"
}
],
"title": "CVE-2025-40142"
},
{
"cve": "CVE-2025-40149",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40149"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\ntls: Use __sk_dst_get() and dst_dev_rcu() in get_netdev_for_sock().\n\nget_netdev_for_sock() is called during setsockopt(),\nso not under RCU.\n\nUsing sk_dst_get(sk)-\u003edev could trigger UAF.\n\nLet\u0027s use __sk_dst_get() and dst_dev_rcu().\n\nNote that the only -\u003endo_sk_get_lower_dev() user is\nbond_sk_get_lower_dev(), which uses RCU.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40149",
"url": "https://www.suse.com/security/cve/CVE-2025-40149"
},
{
"category": "external",
"summary": "SUSE Bug 1253355 for CVE-2025-40149",
"url": "https://bugzilla.suse.com/1253355"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-19T16:46:47Z",
"details": "moderate"
}
],
"title": "CVE-2025-40149"
},
{
"cve": "CVE-2025-40153",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40153"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nmm: hugetlb: avoid soft lockup when mprotect to large memory area\n\nWhen calling mprotect() to a large hugetlb memory area in our customer\u0027s\nworkload (~300GB hugetlb memory), soft lockup was observed:\n\nwatchdog: BUG: soft lockup - CPU#98 stuck for 23s! [t2_new_sysv:126916]\n\nCPU: 98 PID: 126916 Comm: t2_new_sysv Kdump: loaded Not tainted 6.17-rc7\nHardware name: GIGACOMPUTING R2A3-T40-AAV1/Jefferson CIO, BIOS 5.4.4.1 07/15/2025\npstate: 20400009 (nzCv daif +PAN -UAO -TCO -DIT -SSBS BTYPE=--)\npc : mte_clear_page_tags+0x14/0x24\nlr : mte_sync_tags+0x1c0/0x240\nsp : ffff80003150bb80\nx29: ffff80003150bb80 x28: ffff00739e9705a8 x27: 0000ffd2d6a00000\nx26: 0000ff8e4bc00000 x25: 00e80046cde00f45 x24: 0000000000022458\nx23: 0000000000000000 x22: 0000000000000004 x21: 000000011b380000\nx20: ffff000000000000 x19: 000000011b379f40 x18: 0000000000000000\nx17: 0000000000000000 x16: 0000000000000000 x15: 0000000000000000\nx14: 0000000000000000 x13: 0000000000000000 x12: 0000000000000000\nx11: 0000000000000000 x10: 0000000000000000 x9 : ffffc875e0aa5e2c\nx8 : 0000000000000000 x7 : 0000000000000000 x6 : 0000000000000000\nx5 : fffffc01ce7a5c00 x4 : 00000000046cde00 x3 : fffffc0000000000\nx2 : 0000000000000004 x1 : 0000000000000040 x0 : ffff0046cde7c000\n\nCall trace:\n mte_clear_page_tags+0x14/0x24\n set_huge_pte_at+0x25c/0x280\n hugetlb_change_protection+0x220/0x430\n change_protection+0x5c/0x8c\n mprotect_fixup+0x10c/0x294\n do_mprotect_pkey.constprop.0+0x2e0/0x3d4\n __arm64_sys_mprotect+0x24/0x44\n invoke_syscall+0x50/0x160\n el0_svc_common+0x48/0x144\n do_el0_svc+0x30/0xe0\n el0_svc+0x30/0xf0\n el0t_64_sync_handler+0xc4/0x148\n el0t_64_sync+0x1a4/0x1a8\n\nSoft lockup is not triggered with THP or base page because there is\ncond_resched() called for each PMD size.\n\nAlthough the soft lockup was triggered by MTE, it should be not MTE\nspecific. The other processing which takes long time in the loop may\ntrigger soft lockup too.\n\nSo add cond_resched() for hugetlb to avoid soft lockup.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40153",
"url": "https://www.suse.com/security/cve/CVE-2025-40153"
},
{
"category": "external",
"summary": "SUSE Bug 1253408 for CVE-2025-40153",
"url": "https://bugzilla.suse.com/1253408"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.3,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-19T16:46:47Z",
"details": "low"
}
],
"title": "CVE-2025-40153"
},
{
"cve": "CVE-2025-40154",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40154"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nASoC: Intel: bytcr_rt5640: Fix invalid quirk input mapping\n\nWhen an invalid value is passed via quirk option, currently\nbytcr_rt5640 driver only shows an error message but leaves as is.\nThis may lead to unepxected results like OOB access.\n\nThis patch corrects the input mapping to the certain default value if\nan invalid value is passed.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40154",
"url": "https://www.suse.com/security/cve/CVE-2025-40154"
},
{
"category": "external",
"summary": "SUSE Bug 1253431 for CVE-2025-40154",
"url": "https://bugzilla.suse.com/1253431"
},
{
"category": "external",
"summary": "SUSE Bug 1253432 for CVE-2025-40154",
"url": "https://bugzilla.suse.com/1253432"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-19T16:46:47Z",
"details": "moderate"
}
],
"title": "CVE-2025-40154"
},
{
"cve": "CVE-2025-40156",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40156"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nPM / devfreq: mtk-cci: Fix potential error pointer dereference in probe()\n\nThe drv-\u003esram_reg pointer could be set to ERR_PTR(-EPROBE_DEFER) which\nwould lead to a error pointer dereference. Use IS_ERR_OR_NULL() to check\nthat the pointer is valid.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40156",
"url": "https://www.suse.com/security/cve/CVE-2025-40156"
},
{
"category": "external",
"summary": "SUSE Bug 1253428 for CVE-2025-40156",
"url": "https://bugzilla.suse.com/1253428"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-19T16:46:47Z",
"details": "moderate"
}
],
"title": "CVE-2025-40156"
},
{
"cve": "CVE-2025-40157",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40157"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nEDAC/i10nm: Skip DIMM enumeration on a disabled memory controller\n\nWhen loading the i10nm_edac driver on some Intel Granite Rapids servers,\na call trace may appear as follows:\n\n UBSAN: shift-out-of-bounds in drivers/edac/skx_common.c:453:16\n shift exponent -66 is negative\n ...\n __ubsan_handle_shift_out_of_bounds+0x1e3/0x390\n skx_get_dimm_info.cold+0x47/0xd40 [skx_edac_common]\n i10nm_get_dimm_config+0x23e/0x390 [i10nm_edac]\n skx_register_mci+0x159/0x220 [skx_edac_common]\n i10nm_init+0xcb0/0x1ff0 [i10nm_edac]\n ...\n\nThis occurs because some BIOS may disable a memory controller if there\naren\u0027t any memory DIMMs populated on this memory controller. The DIMMMTR\nregister of this disabled memory controller contains the invalid value\n~0, resulting in the call trace above.\n\nFix this call trace by skipping DIMM enumeration on a disabled memory\ncontroller.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40157",
"url": "https://www.suse.com/security/cve/CVE-2025-40157"
},
{
"category": "external",
"summary": "SUSE Bug 1253423 for CVE-2025-40157",
"url": "https://bugzilla.suse.com/1253423"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.2,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:L/I:L/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-19T16:46:47Z",
"details": "moderate"
}
],
"title": "CVE-2025-40157"
},
{
"cve": "CVE-2025-40158",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40158"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nipv6: use RCU in ip6_output()\n\nUse RCU in ip6_output() in order to use dst_dev_rcu() to prevent\npossible UAF.\n\nWe can remove rcu_read_lock()/rcu_read_unlock() pairs\nfrom ip6_finish_output2().",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40158",
"url": "https://www.suse.com/security/cve/CVE-2025-40158"
},
{
"category": "external",
"summary": "SUSE Bug 1253402 for CVE-2025-40158",
"url": "https://bugzilla.suse.com/1253402"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-19T16:46:47Z",
"details": "moderate"
}
],
"title": "CVE-2025-40158"
},
{
"cve": "CVE-2025-40159",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40159"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nxsk: Harden userspace-supplied xdp_desc validation\n\nTurned out certain clearly invalid values passed in xdp_desc from\nuserspace can pass xp_{,un}aligned_validate_desc() and then lead\nto UBs or just invalid frames to be queued for xmit.\n\ndesc-\u003elen close to ``U32_MAX`` with a non-zero pool-\u003etx_metadata_len\ncan cause positive integer overflow and wraparound, the same way low\nenough desc-\u003eaddr with a non-zero pool-\u003etx_metadata_len can cause\nnegative integer overflow. Both scenarios can then pass the\nvalidation successfully.\nThis doesn\u0027t happen with valid XSk applications, but can be used\nto perform attacks.\n\nAlways promote desc-\u003elen to ``u64`` first to exclude positive\noverflows of it. Use explicit check_{add,sub}_overflow() when\nvalidating desc-\u003eaddr (which is ``u64`` already).\n\nbloat-o-meter reports a little growth of the code size:\n\nadd/remove: 0/0 grow/shrink: 2/1 up/down: 60/-16 (44)\nFunction old new delta\nxskq_cons_peek_desc 299 330 +31\nxsk_tx_peek_release_desc_batch 973 1002 +29\nxsk_generic_xmit 3148 3132 -16\n\nbut hopefully this doesn\u0027t hurt the performance much.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40159",
"url": "https://www.suse.com/security/cve/CVE-2025-40159"
},
{
"category": "external",
"summary": "SUSE Bug 1253403 for CVE-2025-40159",
"url": "https://bugzilla.suse.com/1253403"
},
{
"category": "external",
"summary": "SUSE Bug 1253404 for CVE-2025-40159",
"url": "https://bugzilla.suse.com/1253404"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-19T16:46:47Z",
"details": "important"
}
],
"title": "CVE-2025-40159"
},
{
"cve": "CVE-2025-40161",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40161"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nmailbox: zynqmp-ipi: Fix SGI cleanup on unbind\n\nThe driver incorrectly determines SGI vs SPI interrupts by checking IRQ\nnumber \u003c 16, which fails with dynamic IRQ allocation. During unbind,\nthis causes improper SGI cleanup leading to kernel crash.\n\nAdd explicit irq_type field to pdata for reliable identification of SGI\ninterrupts (type-2) and only clean up SGI resources when appropriate.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40161",
"url": "https://www.suse.com/security/cve/CVE-2025-40161"
},
{
"category": "external",
"summary": "SUSE Bug 1253410 for CVE-2025-40161",
"url": "https://bugzilla.suse.com/1253410"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.1,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-19T16:46:47Z",
"details": "moderate"
}
],
"title": "CVE-2025-40161"
},
{
"cve": "CVE-2025-40162",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40162"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nASoC: amd/sdw_utils: avoid NULL deref when devm_kasprintf() fails\n\ndevm_kasprintf() may return NULL on memory allocation failure,\nbut the debug message prints cpus-\u003edai_name before checking it.\nMove the dev_dbg() call after the NULL check to prevent potential\nNULL pointer dereference.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40162",
"url": "https://www.suse.com/security/cve/CVE-2025-40162"
},
{
"category": "external",
"summary": "SUSE Bug 1253422 for CVE-2025-40162",
"url": "https://bugzilla.suse.com/1253422"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-19T16:46:47Z",
"details": "moderate"
}
],
"title": "CVE-2025-40162"
},
{
"cve": "CVE-2025-40164",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40164"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nusbnet: Fix using smp_processor_id() in preemptible code warnings\n\nSyzbot reported the following warning:\n\nBUG: using smp_processor_id() in preemptible [00000000] code: dhcpcd/2879\ncaller is usbnet_skb_return+0x74/0x490 drivers/net/usb/usbnet.c:331\nCPU: 1 UID: 0 PID: 2879 Comm: dhcpcd Not tainted 6.15.0-rc4-syzkaller-00098-g615dca38c2ea #0 PREEMPT(voluntary)\nCall Trace:\n \u003cTASK\u003e\n __dump_stack lib/dump_stack.c:94 [inline]\n dump_stack_lvl+0x16c/0x1f0 lib/dump_stack.c:120\n check_preemption_disabled+0xd0/0xe0 lib/smp_processor_id.c:49\n usbnet_skb_return+0x74/0x490 drivers/net/usb/usbnet.c:331\n usbnet_resume_rx+0x4b/0x170 drivers/net/usb/usbnet.c:708\n usbnet_change_mtu+0x1be/0x220 drivers/net/usb/usbnet.c:417\n __dev_set_mtu net/core/dev.c:9443 [inline]\n netif_set_mtu_ext+0x369/0x5c0 net/core/dev.c:9496\n netif_set_mtu+0xb0/0x160 net/core/dev.c:9520\n dev_set_mtu+0xae/0x170 net/core/dev_api.c:247\n dev_ifsioc+0xa31/0x18d0 net/core/dev_ioctl.c:572\n dev_ioctl+0x223/0x10e0 net/core/dev_ioctl.c:821\n sock_do_ioctl+0x19d/0x280 net/socket.c:1204\n sock_ioctl+0x42f/0x6a0 net/socket.c:1311\n vfs_ioctl fs/ioctl.c:51 [inline]\n __do_sys_ioctl fs/ioctl.c:906 [inline]\n __se_sys_ioctl fs/ioctl.c:892 [inline]\n __x64_sys_ioctl+0x190/0x200 fs/ioctl.c:892\n do_syscall_x64 arch/x86/entry/syscall_64.c:63 [inline]\n do_syscall_64+0xcd/0x260 arch/x86/entry/syscall_64.c:94\n entry_SYSCALL_64_after_hwframe+0x77/0x7f\n\nFor historical and portability reasons, the netif_rx() is usually\nrun in the softirq or interrupt context, this commit therefore add\nlocal_bh_disable/enable() protection in the usbnet_resume_rx().",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40164",
"url": "https://www.suse.com/security/cve/CVE-2025-40164"
},
{
"category": "external",
"summary": "SUSE Bug 1253407 for CVE-2025-40164",
"url": "https://bugzilla.suse.com/1253407"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.7,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-19T16:46:47Z",
"details": "moderate"
}
],
"title": "CVE-2025-40164"
},
{
"cve": "CVE-2025-40165",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40165"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nmedia: nxp: imx8-isi: m2m: Fix streaming cleanup on release\n\nIf streamon/streamoff calls are imbalanced, such as when exiting an\napplication with Ctrl+C when streaming, the m2m usage_count will never\nreach zero and the ISI channel won\u0027t be freed. Besides from that, if the\ninput line width is more than 2K, it will trigger a WARN_ON():\n\n[ 59.222120] ------------[ cut here ]------------\n[ 59.226758] WARNING: drivers/media/platform/nxp/imx8-isi/imx8-isi-hw.c:631 at mxc_isi_channel_chain+0xa4/0x120, CPU#4: v4l2-ctl/654\n[ 59.238569] Modules linked in: ap1302\n[ 59.242231] CPU: 4 UID: 0 PID: 654 Comm: v4l2-ctl Not tainted 6.16.0-rc4-next-20250704-06511-gff0e002d480a-dirty #258 PREEMPT\n[ 59.253597] Hardware name: NXP i.MX95 15X15 board (DT)\n[ 59.258720] pstate: 80400009 (Nzcv daif +PAN -UAO -TCO -DIT -SSBS BTYPE=--)\n[ 59.265669] pc : mxc_isi_channel_chain+0xa4/0x120\n[ 59.270358] lr : mxc_isi_channel_chain+0x44/0x120\n[ 59.275047] sp : ffff8000848c3b40\n[ 59.278348] x29: ffff8000848c3b40 x28: ffff0000859b4c98 x27: ffff800081939f00\n[ 59.285472] x26: 000000000000000a x25: ffff0000859b4cb8 x24: 0000000000000001\n[ 59.292597] x23: ffff0000816f4760 x22: ffff0000816f4258 x21: ffff000084ceb780\n[ 59.299720] x20: ffff000084342ff8 x19: ffff000084340000 x18: 0000000000000000\n[ 59.306845] x17: 0000000000000000 x16: 0000000000000000 x15: 0000ffffdb369e1c\n[ 59.313969] x14: 0000000000000000 x13: 0000000000000000 x12: 0000000000000000\n[ 59.321093] x11: 0000000000000000 x10: 0000000000000000 x9 : 0000000000000000\n[ 59.328217] x8 : ffff8000848c3d48 x7 : ffff800081930b30 x6 : ffff800081930b30\n[ 59.335340] x5 : ffff0000859b6000 x4 : ffff80008193ae80 x3 : ffff800081022420\n[ 59.342464] x2 : ffff0000852f6900 x1 : 0000000000000001 x0 : ffff000084341000\n[ 59.349590] Call trace:\n[ 59.352025] mxc_isi_channel_chain+0xa4/0x120 (P)\n[ 59.356722] mxc_isi_m2m_streamon+0x160/0x20c\n[ 59.361072] v4l_streamon+0x24/0x30\n[ 59.364556] __video_do_ioctl+0x40c/0x4a0\n[ 59.368560] video_usercopy+0x2bc/0x690\n[ 59.372382] video_ioctl2+0x18/0x24\n[ 59.375857] v4l2_ioctl+0x40/0x60\n[ 59.379168] __arm64_sys_ioctl+0xac/0x104\n[ 59.383172] invoke_syscall+0x48/0x104\n[ 59.386916] el0_svc_common.constprop.0+0xc0/0xe0\n[ 59.391613] do_el0_svc+0x1c/0x28\n[ 59.394915] el0_svc+0x34/0xf4\n[ 59.397966] el0t_64_sync_handler+0xa0/0xe4\n[ 59.402143] el0t_64_sync+0x198/0x19c\n[ 59.405801] ---[ end trace 0000000000000000 ]---\n\nAddress this issue by moving the streaming preparation and cleanup to\nthe vb2 .prepare_streaming() and .unprepare_streaming() operations. This\nalso simplifies the driver by allowing direct usage of the\nv4l2_m2m_ioctl_streamon() and v4l2_m2m_ioctl_streamoff() helpers.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40165",
"url": "https://www.suse.com/security/cve/CVE-2025-40165"
},
{
"category": "external",
"summary": "SUSE Bug 1253405 for CVE-2025-40165",
"url": "https://bugzilla.suse.com/1253405"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.7,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-19T16:46:47Z",
"details": "moderate"
}
],
"title": "CVE-2025-40165"
},
{
"cve": "CVE-2025-40166",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40166"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\ndrm/xe/guc: Check GuC running state before deregistering exec queue\n\nIn normal operation, a registered exec queue is disabled and\nderegistered through the GuC, and freed only after the GuC confirms\ncompletion. However, if the driver is forced to unbind while the exec\nqueue is still running, the user may call exec_destroy() after the GuC\nhas already been stopped and CT communication disabled.\n\nIn this case, the driver cannot receive a response from the GuC,\npreventing proper cleanup of exec queue resources. Fix this by directly\nreleasing the resources when GuC is not running.\n\nHere is the failure dmesg log:\n\"\n[ 468.089581] ---[ end trace 0000000000000000 ]---\n[ 468.089608] pci 0000:03:00.0: [drm] *ERROR* GT0: GUC ID manager unclean (1/65535)\n[ 468.090558] pci 0000:03:00.0: [drm] GT0: total 65535\n[ 468.090562] pci 0000:03:00.0: [drm] GT0: used 1\n[ 468.090564] pci 0000:03:00.0: [drm] GT0: range 1..1 (1)\n[ 468.092716] ------------[ cut here ]------------\n[ 468.092719] WARNING: CPU: 14 PID: 4775 at drivers/gpu/drm/xe/xe_ttm_vram_mgr.c:298 ttm_vram_mgr_fini+0xf8/0x130 [xe]\n\"\n\nv2: use xe_uc_fw_is_running() instead of xe_guc_ct_enabled().\n As CT may go down and come back during VF migration.\n\n(cherry picked from commit 9b42321a02c50a12b2beb6ae9469606257fbecea)",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40166",
"url": "https://www.suse.com/security/cve/CVE-2025-40166"
},
{
"category": "external",
"summary": "SUSE Bug 1253433 for CVE-2025-40166",
"url": "https://bugzilla.suse.com/1253433"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-19T16:46:47Z",
"details": "moderate"
}
],
"title": "CVE-2025-40166"
},
{
"cve": "CVE-2025-40168",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40168"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nsmc: Use __sk_dst_get() and dst_dev_rcu() in smc_clc_prfx_match().\n\nsmc_clc_prfx_match() is called from smc_listen_work() and\nnot under RCU nor RTNL.\n\nUsing sk_dst_get(sk)-\u003edev could trigger UAF.\n\nLet\u0027s use __sk_dst_get() and dst_dev_rcu().\n\nNote that the returned value of smc_clc_prfx_match() is not\nused in the caller.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40168",
"url": "https://www.suse.com/security/cve/CVE-2025-40168"
},
{
"category": "external",
"summary": "SUSE Bug 1253427 for CVE-2025-40168",
"url": "https://bugzilla.suse.com/1253427"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-19T16:46:47Z",
"details": "moderate"
}
],
"title": "CVE-2025-40168"
},
{
"cve": "CVE-2025-40169",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40169"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nbpf: Reject negative offsets for ALU ops\n\nWhen verifying BPF programs, the check_alu_op() function validates\ninstructions with ALU operations. The \u0027offset\u0027 field in these\ninstructions is a signed 16-bit integer.\n\nThe existing check \u0027insn-\u003eoff \u003e 1\u0027 was intended to ensure the offset is\neither 0, or 1 for BPF_MOD/BPF_DIV. However, because \u0027insn-\u003eoff\u0027 is\nsigned, this check incorrectly accepts all negative values (e.g., -1).\n\nThis commit tightens the validation by changing the condition to\n\u0027(insn-\u003eoff != 0 \u0026\u0026 insn-\u003eoff != 1)\u0027. This ensures that any value\nother than the explicitly permitted 0 and 1 is rejected, hardening the\nverifier against malformed BPF programs.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40169",
"url": "https://www.suse.com/security/cve/CVE-2025-40169"
},
{
"category": "external",
"summary": "SUSE Bug 1253416 for CVE-2025-40169",
"url": "https://bugzilla.suse.com/1253416"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.8,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-19T16:46:47Z",
"details": "moderate"
}
],
"title": "CVE-2025-40169"
},
{
"cve": "CVE-2025-40171",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40171"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnvmet-fc: move lsop put work to nvmet_fc_ls_req_op\n\nIt\u0027s possible for more than one async command to be in flight from\n__nvmet_fc_send_ls_req. For each command, a tgtport reference is taken.\n\nIn the current code, only one put work item is queued at a time, which\nresults in a leaked reference.\n\nTo fix this, move the work item to the nvmet_fc_ls_req_op struct, which\nalready tracks all resources related to the command.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40171",
"url": "https://www.suse.com/security/cve/CVE-2025-40171"
},
{
"category": "external",
"summary": "SUSE Bug 1253412 for CVE-2025-40171",
"url": "https://bugzilla.suse.com/1253412"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-19T16:46:47Z",
"details": "moderate"
}
],
"title": "CVE-2025-40171"
},
{
"cve": "CVE-2025-40172",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40172"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\naccel/qaic: Treat remaining == 0 as error in find_and_map_user_pages()\n\nCurrently, if find_and_map_user_pages() takes a DMA xfer request from the\nuser with a length field set to 0, or in a rare case, the host receives\nQAIC_TRANS_DMA_XFER_CONT from the device where resources-\u003exferred_dma_size\nis equal to the requested transaction size, the function will return 0\nbefore allocating an sgt or setting the fields of the dma_xfer struct.\nIn that case, encode_addr_size_pairs() will try to access the sgt which\nwill lead to a general protection fault.\n\nReturn an EINVAL in case the user provides a zero-sized ALP, or the device\nrequests continuation after all of the bytes have been transferred.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40172",
"url": "https://www.suse.com/security/cve/CVE-2025-40172"
},
{
"category": "external",
"summary": "SUSE Bug 1253424 for CVE-2025-40172",
"url": "https://bugzilla.suse.com/1253424"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-19T16:46:47Z",
"details": "moderate"
}
],
"title": "CVE-2025-40172"
},
{
"cve": "CVE-2025-40173",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40173"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnet/ip6_tunnel: Prevent perpetual tunnel growth\n\nSimilarly to ipv4 tunnel, ipv6 version updates dev-\u003eneeded_headroom, too.\nWhile ipv4 tunnel headroom adjustment growth was limited in\ncommit 5ae1e9922bbd (\"net: ip_tunnel: prevent perpetual headroom growth\"),\nipv6 tunnel yet increases the headroom without any ceiling.\n\nReflect ipv4 tunnel headroom adjustment limit on ipv6 version.\n\nCredits to Francesco Ruggeri, who was originally debugging this issue\nand wrote local Arista-specific patch and a reproducer.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40173",
"url": "https://www.suse.com/security/cve/CVE-2025-40173"
},
{
"category": "external",
"summary": "SUSE Bug 1253421 for CVE-2025-40173",
"url": "https://bugzilla.suse.com/1253421"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.7,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-19T16:46:47Z",
"details": "moderate"
}
],
"title": "CVE-2025-40173"
},
{
"cve": "CVE-2025-40175",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40175"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nidpf: cleanup remaining SKBs in PTP flows\n\nWhen the driver requests Tx timestamp value, one of the first steps is\nto clone SKB using skb_get. It increases the reference counter for that\nSKB to prevent unexpected freeing by another component.\nHowever, there may be a case where the index is requested, SKB is\nassigned and never consumed by PTP flows - for example due to reset during\nrunning PTP apps.\n\nAdd a check in release timestamping function to verify if the SKB\nassigned to Tx timestamp latch was freed, and release remaining SKBs.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40175",
"url": "https://www.suse.com/security/cve/CVE-2025-40175"
},
{
"category": "external",
"summary": "SUSE Bug 1253426 for CVE-2025-40175",
"url": "https://bugzilla.suse.com/1253426"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.7,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-19T16:46:47Z",
"details": "moderate"
}
],
"title": "CVE-2025-40175"
},
{
"cve": "CVE-2025-40176",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40176"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\ntls: wait for pending async decryptions if tls_strp_msg_hold fails\n\nAsync decryption calls tls_strp_msg_hold to create a clone of the\ninput skb to hold references to the memory it uses. If we fail to\nallocate that clone, proceeding with async decryption can lead to\nvarious issues (UAF on the skb, writing into userspace memory after\nthe recv() call has returned).\n\nIn this case, wait for all pending decryption requests.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40176",
"url": "https://www.suse.com/security/cve/CVE-2025-40176"
},
{
"category": "external",
"summary": "SUSE Bug 1253425 for CVE-2025-40176",
"url": "https://bugzilla.suse.com/1253425"
},
{
"category": "external",
"summary": "SUSE Bug 1254100 for CVE-2025-40176",
"url": "https://bugzilla.suse.com/1254100"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-19T16:46:47Z",
"details": "important"
}
],
"title": "CVE-2025-40176"
},
{
"cve": "CVE-2025-40177",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40177"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\naccel/qaic: Fix bootlog initialization ordering\n\nAs soon as we queue MHI buffers to receive the bootlog from the device,\nwe could be receiving data. Therefore all the resources needed to\nprocess that data need to be setup prior to queuing the buffers.\n\nWe currently initialize some of the resources after queuing the buffers\nwhich creates a race between the probe() and any data that comes back\nfrom the device. If the uninitialized resources are accessed, we could\nsee page faults.\n\nFix the init ordering to close the race.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40177",
"url": "https://www.suse.com/security/cve/CVE-2025-40177"
},
{
"category": "external",
"summary": "SUSE Bug 1253443 for CVE-2025-40177",
"url": "https://bugzilla.suse.com/1253443"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-19T16:46:47Z",
"details": "moderate"
}
],
"title": "CVE-2025-40177"
},
{
"cve": "CVE-2025-40178",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40178"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\npid: Add a judgment for ns null in pid_nr_ns\n\n__task_pid_nr_ns\n ns = task_active_pid_ns(current);\n pid_nr_ns(rcu_dereference(*task_pid_ptr(task, type)), ns);\n if (pid \u0026\u0026 ns-\u003elevel \u003c= pid-\u003elevel) {\n\nSometimes null is returned for task_active_pid_ns. Then it will trigger kernel panic in pid_nr_ns.\n\nFor example:\n\tUnable to handle kernel NULL pointer dereference at virtual address 0000000000000058\n\tMem abort info:\n\tESR = 0x0000000096000007\n\tEC = 0x25: DABT (current EL), IL = 32 bits\n\tSET = 0, FnV = 0\n\tEA = 0, S1PTW = 0\n\tFSC = 0x07: level 3 translation fault\n\tData abort info:\n\tISV = 0, ISS = 0x00000007, ISS2 = 0x00000000\n\tCM = 0, WnR = 0, TnD = 0, TagAccess = 0\n\tGCS = 0, Overlay = 0, DirtyBit = 0, Xs = 0\n\tuser pgtable: 4k pages, 39-bit VAs, pgdp=00000002175aa000\n\t[0000000000000058] pgd=08000002175ab003, p4d=08000002175ab003, pud=08000002175ab003, pmd=08000002175be003, pte=0000000000000000\n\tpstate: 834000c5 (Nzcv daIF +PAN -UAO +TCO +DIT -SSBS BTYPE=--)\n\tpc : __task_pid_nr_ns+0x74/0xd0\n\tlr : __task_pid_nr_ns+0x24/0xd0\n\tsp : ffffffc08001bd10\n\tx29: ffffffc08001bd10 x28: ffffffd4422b2000 x27: 0000000000000001\n\tx26: ffffffd442821168 x25: ffffffd442821000 x24: 00000f89492eab31\n\tx23: 00000000000000c0 x22: ffffff806f5693c0 x21: ffffff806f5693c0\n\tx20: 0000000000000001 x19: 0000000000000000 x18: 0000000000000000\n\tx17: 00000000529c6ef0 x16: 00000000529c6ef0 x15: 00000000023a1adc\n\tx14: 0000000000000003 x13: 00000000007ef6d8 x12: 001167c391c78800\n\tx11: 00ffffffffffffff x10: 0000000000000000 x9 : 0000000000000001\n\tx8 : ffffff80816fa3c0 x7 : 0000000000000000 x6 : 49534d702d535449\n\tx5 : ffffffc080c4c2c0 x4 : ffffffd43ee128c8 x3 : ffffffd43ee124dc\n\tx2 : 0000000000000000 x1 : 0000000000000001 x0 : ffffff806f5693c0\n\tCall trace:\n\t__task_pid_nr_ns+0x74/0xd0\n\t...\n\t__handle_irq_event_percpu+0xd4/0x284\n\thandle_irq_event+0x48/0xb0\n\thandle_fasteoi_irq+0x160/0x2d8\n\tgeneric_handle_domain_irq+0x44/0x60\n\tgic_handle_irq+0x4c/0x114\n\tcall_on_irq_stack+0x3c/0x74\n\tdo_interrupt_handler+0x4c/0x84\n\tel1_interrupt+0x34/0x58\n\tel1h_64_irq_handler+0x18/0x24\n\tel1h_64_irq+0x68/0x6c\n\taccount_kernel_stack+0x60/0x144\n\texit_task_stack_account+0x1c/0x80\n\tdo_exit+0x7e4/0xaf8\n\t...\n\tget_signal+0x7bc/0x8d8\n\tdo_notify_resume+0x128/0x828\n\tel0_svc+0x6c/0x70\n\tel0t_64_sync_handler+0x68/0xbc\n\tel0t_64_sync+0x1a8/0x1ac\n\tCode: 35fffe54 911a02a8 f9400108 b4000128 (b9405a69)\n\t---[ end trace 0000000000000000 ]---\n\tKernel panic - not syncing: Oops: Fatal exception in interrupt",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40178",
"url": "https://www.suse.com/security/cve/CVE-2025-40178"
},
{
"category": "external",
"summary": "SUSE Bug 1253463 for CVE-2025-40178",
"url": "https://bugzilla.suse.com/1253463"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-19T16:46:47Z",
"details": "moderate"
}
],
"title": "CVE-2025-40178"
},
{
"cve": "CVE-2025-40180",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40180"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nmailbox: zynqmp-ipi: Fix out-of-bounds access in mailbox cleanup loop\n\nThe cleanup loop was starting at the wrong array index, causing\nout-of-bounds access.\nStart the loop at the correct index for zero-indexed arrays to prevent\naccessing memory beyond the allocated array bounds.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40180",
"url": "https://www.suse.com/security/cve/CVE-2025-40180"
},
{
"category": "external",
"summary": "SUSE Bug 1253440 for CVE-2025-40180",
"url": "https://bugzilla.suse.com/1253440"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-19T16:46:47Z",
"details": "moderate"
}
],
"title": "CVE-2025-40180"
},
{
"cve": "CVE-2025-40183",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40183"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nbpf: Fix metadata_dst leak __bpf_redirect_neigh_v{4,6}\n\nCilium has a BPF egress gateway feature which forces outgoing K8s Pod\ntraffic to pass through dedicated egress gateways which then SNAT the\ntraffic in order to interact with stable IPs outside the cluster.\n\nThe traffic is directed to the gateway via vxlan tunnel in collect md\nmode. A recent BPF change utilized the bpf_redirect_neigh() helper to\nforward packets after the arrival and decap on vxlan, which turned out\nover time that the kmalloc-256 slab usage in kernel was ever-increasing.\n\nThe issue was that vxlan allocates the metadata_dst object and attaches\nit through a fake dst entry to the skb. The latter was never released\nthough given bpf_redirect_neigh() was merely setting the new dst entry\nvia skb_dst_set() without dropping an existing one first.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40183",
"url": "https://www.suse.com/security/cve/CVE-2025-40183"
},
{
"category": "external",
"summary": "SUSE Bug 1253441 for CVE-2025-40183",
"url": "https://bugzilla.suse.com/1253441"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-19T16:46:47Z",
"details": "moderate"
}
],
"title": "CVE-2025-40183"
},
{
"cve": "CVE-2025-40185",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40185"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nice: ice_adapter: release xa entry on adapter allocation failure\n\nWhen ice_adapter_new() fails, the reserved XArray entry created by\nxa_insert() is not released. This causes subsequent insertions at\nthe same index to return -EBUSY, potentially leading to\nNULL pointer dereferences.\n\nReorder the operations as suggested by Przemek Kitszel:\n1. Check if adapter already exists (xa_load)\n2. Reserve the XArray slot (xa_reserve)\n3. Allocate the adapter (ice_adapter_new)\n4. Store the adapter (xa_store)",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40185",
"url": "https://www.suse.com/security/cve/CVE-2025-40185"
},
{
"category": "external",
"summary": "SUSE Bug 1253394 for CVE-2025-40185",
"url": "https://bugzilla.suse.com/1253394"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-19T16:46:47Z",
"details": "moderate"
}
],
"title": "CVE-2025-40185"
},
{
"cve": "CVE-2025-40186",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40186"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\ntcp: Don\u0027t call reqsk_fastopen_remove() in tcp_conn_request().\n\nsyzbot reported the splat below in tcp_conn_request(). [0]\n\nIf a listener is close()d while a TFO socket is being processed in\ntcp_conn_request(), inet_csk_reqsk_queue_add() does not set reqsk-\u003esk\nand calls inet_child_forget(), which calls tcp_disconnect() for the\nTFO socket.\n\nAfter the cited commit, tcp_disconnect() calls reqsk_fastopen_remove(),\nwhere reqsk_put() is called due to !reqsk-\u003esk.\n\nThen, reqsk_fastopen_remove() in tcp_conn_request() decrements the\nlast req-\u003ersk_refcnt and frees reqsk, and __reqsk_free() at the\ndrop_and_free label causes the refcount underflow for the listener\nand double-free of the reqsk.\n\nLet\u0027s remove reqsk_fastopen_remove() in tcp_conn_request().\n\nNote that other callers make sure tp-\u003efastopen_rsk is not NULL.\n\n[0]:\nrefcount_t: underflow; use-after-free.\nWARNING: CPU: 12 PID: 5563 at lib/refcount.c:28 refcount_warn_saturate (lib/refcount.c:28)\nModules linked in:\nCPU: 12 UID: 0 PID: 5563 Comm: syz-executor Not tainted syzkaller #0 PREEMPT(full)\nHardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025\nRIP: 0010:refcount_warn_saturate (lib/refcount.c:28)\nCode: ab e8 8e b4 98 ff 0f 0b c3 cc cc cc cc cc 80 3d a4 e4 d6 01 00 75 9c c6 05 9b e4 d6 01 01 48 c7 c7 e8 df fb ab e8 6a b4 98 ff \u003c0f\u003e 0b e9 03 5b 76 00 cc 80 3d 7d e4 d6 01 00 0f 85 74 ff ff ff c6\nRSP: 0018:ffffa79fc0304a98 EFLAGS: 00010246\nRAX: d83af4db1c6b3900 RBX: ffff9f65c7a69020 RCX: d83af4db1c6b3900\nRDX: 0000000000000000 RSI: 00000000ffff7fff RDI: ffffffffac78a280\nRBP: 000000009d781b60 R08: 0000000000007fff R09: ffffffffac6ca280\nR10: 0000000000017ffd R11: 0000000000000004 R12: ffff9f65c7b4f100\nR13: ffff9f65c7d23c00 R14: ffff9f65c7d26000 R15: ffff9f65c7a64ef8\nFS: 00007f9f962176c0(0000) GS:ffff9f65fcf00000(0000) knlGS:0000000000000000\nCS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033\nCR2: 0000200000000180 CR3: 000000000dbbe006 CR4: 0000000000372ef0\nCall Trace:\n \u003cIRQ\u003e\n tcp_conn_request (./include/linux/refcount.h:400 ./include/linux/refcount.h:432 ./include/linux/refcount.h:450 ./include/net/sock.h:1965 ./include/net/request_sock.h:131 net/ipv4/tcp_input.c:7301)\n tcp_rcv_state_process (net/ipv4/tcp_input.c:6708)\n tcp_v6_do_rcv (net/ipv6/tcp_ipv6.c:1670)\n tcp_v6_rcv (net/ipv6/tcp_ipv6.c:1906)\n ip6_protocol_deliver_rcu (net/ipv6/ip6_input.c:438)\n ip6_input (net/ipv6/ip6_input.c:500)\n ipv6_rcv (net/ipv6/ip6_input.c:311)\n __netif_receive_skb (net/core/dev.c:6104)\n process_backlog (net/core/dev.c:6456)\n __napi_poll (net/core/dev.c:7506)\n net_rx_action (net/core/dev.c:7569 net/core/dev.c:7696)\n handle_softirqs (kernel/softirq.c:579)\n do_softirq (kernel/softirq.c:480)\n \u003c/IRQ\u003e",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40186",
"url": "https://www.suse.com/security/cve/CVE-2025-40186"
},
{
"category": "external",
"summary": "SUSE Bug 1253438 for CVE-2025-40186",
"url": "https://bugzilla.suse.com/1253438"
},
{
"category": "external",
"summary": "SUSE Bug 1253439 for CVE-2025-40186",
"url": "https://bugzilla.suse.com/1253439"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-19T16:46:47Z",
"details": "important"
}
],
"title": "CVE-2025-40186"
},
{
"cve": "CVE-2025-40187",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40187"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnet/sctp: fix a null dereference in sctp_disposition sctp_sf_do_5_1D_ce()\n\nIf new_asoc-\u003epeer.adaptation_ind=0 and sctp_ulpevent_make_authkey=0\nand sctp_ulpevent_make_authkey() returns 0, then the variable\nai_ev remains zero and the zero will be dereferenced\nin the sctp_ulpevent_free() function.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40187",
"url": "https://www.suse.com/security/cve/CVE-2025-40187"
},
{
"category": "external",
"summary": "SUSE Bug 1253647 for CVE-2025-40187",
"url": "https://bugzilla.suse.com/1253647"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.1,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-19T16:46:47Z",
"details": "moderate"
}
],
"title": "CVE-2025-40187"
},
{
"cve": "CVE-2025-40188",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40188"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\npwm: berlin: Fix wrong register in suspend/resume\n\nThe \u0027enable\u0027 register should be BERLIN_PWM_EN rather than\nBERLIN_PWM_ENABLE, otherwise, the driver accesses wrong address, there\nwill be cpu exception then kernel panic during suspend/resume.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40188",
"url": "https://www.suse.com/security/cve/CVE-2025-40188"
},
{
"category": "external",
"summary": "SUSE Bug 1253449 for CVE-2025-40188",
"url": "https://bugzilla.suse.com/1253449"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-19T16:46:47Z",
"details": "moderate"
}
],
"title": "CVE-2025-40188"
},
{
"cve": "CVE-2025-40192",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40192"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nRevert \"ipmi: fix msg stack when IPMI is disconnected\"\n\nThis reverts commit c608966f3f9c2dca596967501d00753282b395fc.\n\nThis patch has a subtle bug that can cause the IPMI driver to go into an\ninfinite loop if the BMC misbehaves in a certain way. Apparently\ncertain BMCs do misbehave this way because several reports have come in\nrecently about this.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40192",
"url": "https://www.suse.com/security/cve/CVE-2025-40192"
},
{
"category": "external",
"summary": "SUSE Bug 1253622 for CVE-2025-40192",
"url": "https://bugzilla.suse.com/1253622"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-19T16:46:47Z",
"details": "moderate"
}
],
"title": "CVE-2025-40192"
},
{
"cve": "CVE-2025-40194",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40194"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\ncpufreq: intel_pstate: Fix object lifecycle issue in update_qos_request()\n\nThe cpufreq_cpu_put() call in update_qos_request() takes place too early\nbecause the latter subsequently calls freq_qos_update_request() that\nindirectly accesses the policy object in question through the QoS request\nobject passed to it.\n\nFortunately, update_qos_request() is called under intel_pstate_driver_lock,\nso this issue does not matter for changing the intel_pstate operation\nmode, but it theoretically can cause a crash to occur on CPU device hot\nremoval (which currently can only happen in virt, but it is formally\nsupported nevertheless).\n\nAddress this issue by modifying update_qos_request() to drop the\nreference to the policy later.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40194",
"url": "https://www.suse.com/security/cve/CVE-2025-40194"
},
{
"category": "external",
"summary": "SUSE Bug 1253445 for CVE-2025-40194",
"url": "https://bugzilla.suse.com/1253445"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.7,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-19T16:46:47Z",
"details": "moderate"
}
],
"title": "CVE-2025-40194"
},
{
"cve": "CVE-2025-40196",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40196"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nfs: quota: create dedicated workqueue for quota_release_work\n\nThere is a kernel panic due to WARN_ONCE when panic_on_warn is set.\n\nThis issue occurs when writeback is triggered due to sync call for an\nopened file(ie, writeback reason is WB_REASON_SYNC). When f2fs balance\nis needed at sync path, flush for quota_release_work is triggered.\nBy default quota_release_work is queued to \"events_unbound\" queue which\ndoes not have WQ_MEM_RECLAIM flag. During f2fs balance \"writeback\"\nworkqueue tries to flush quota_release_work causing kernel panic due to\nMEM_RECLAIM flag mismatch errors.\n\nThis patch creates dedicated workqueue with WQ_MEM_RECLAIM flag\nfor work quota_release_work.\n\n------------[ cut here ]------------\nWARNING: CPU: 4 PID: 14867 at kernel/workqueue.c:3721 check_flush_dependency+0x13c/0x148\nCall trace:\n check_flush_dependency+0x13c/0x148\n __flush_work+0xd0/0x398\n flush_delayed_work+0x44/0x5c\n dquot_writeback_dquots+0x54/0x318\n f2fs_do_quota_sync+0xb8/0x1a8\n f2fs_write_checkpoint+0x3cc/0x99c\n f2fs_gc+0x190/0x750\n f2fs_balance_fs+0x110/0x168\n f2fs_write_single_data_page+0x474/0x7dc\n f2fs_write_data_pages+0x7d0/0xd0c\n do_writepages+0xe0/0x2f4\n __writeback_single_inode+0x44/0x4ac\n writeback_sb_inodes+0x30c/0x538\n wb_writeback+0xf4/0x440\n wb_workfn+0x128/0x5d4\n process_scheduled_works+0x1c4/0x45c\n worker_thread+0x32c/0x3e8\n kthread+0x11c/0x1b0\n ret_from_fork+0x10/0x20\nKernel panic - not syncing: kernel: panic_on_warn set ...",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40196",
"url": "https://www.suse.com/security/cve/CVE-2025-40196"
},
{
"category": "external",
"summary": "SUSE Bug 1253624 for CVE-2025-40196",
"url": "https://bugzilla.suse.com/1253624"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.3,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-19T16:46:47Z",
"details": "low"
}
],
"title": "CVE-2025-40196"
},
{
"cve": "CVE-2025-40197",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40197"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nmedia: mc: Clear minor number before put device\n\nThe device minor should not be cleared after the device is released.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40197",
"url": "https://www.suse.com/security/cve/CVE-2025-40197"
},
{
"category": "external",
"summary": "SUSE Bug 1253450 for CVE-2025-40197",
"url": "https://bugzilla.suse.com/1253450"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-19T16:46:47Z",
"details": "moderate"
}
],
"title": "CVE-2025-40197"
},
{
"cve": "CVE-2025-40198",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40198"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\next4: avoid potential buffer over-read in parse_apply_sb_mount_options()\n\nUnlike other strings in the ext4 superblock, we rely on tune2fs to\nmake sure s_mount_opts is NUL terminated. Harden\nparse_apply_sb_mount_options() by treating s_mount_opts as a potential\n__nonstring.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40198",
"url": "https://www.suse.com/security/cve/CVE-2025-40198"
},
{
"category": "external",
"summary": "SUSE Bug 1253453 for CVE-2025-40198",
"url": "https://bugzilla.suse.com/1253453"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-19T16:46:47Z",
"details": "moderate"
}
],
"title": "CVE-2025-40198"
},
{
"cve": "CVE-2025-40200",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40200"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nSquashfs: reject negative file sizes in squashfs_read_inode()\n\nSyskaller reports a \"WARNING in ovl_copy_up_file\" in overlayfs.\n\nThis warning is ultimately caused because the underlying Squashfs file\nsystem returns a file with a negative file size.\n\nThis commit checks for a negative file size and returns EINVAL.\n\n[phillip@squashfs.org.uk: only need to check 64 bit quantity]",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40200",
"url": "https://www.suse.com/security/cve/CVE-2025-40200"
},
{
"category": "external",
"summary": "SUSE Bug 1253448 for CVE-2025-40200",
"url": "https://bugzilla.suse.com/1253448"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-19T16:46:47Z",
"details": "moderate"
}
],
"title": "CVE-2025-40200"
},
{
"cve": "CVE-2025-40201",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40201"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nkernel/sys.c: fix the racy usage of task_lock(tsk-\u003egroup_leader) in sys_prlimit64() paths\n\nThe usage of task_lock(tsk-\u003egroup_leader) in sys_prlimit64()-\u003edo_prlimit()\npath is very broken.\n\nsys_prlimit64() does get_task_struct(tsk) but this only protects task_struct\nitself. If tsk != current and tsk is not a leader, this process can exit/exec\nand task_lock(tsk-\u003egroup_leader) may use the already freed task_struct.\n\nAnother problem is that sys_prlimit64() can race with mt-exec which changes\n-\u003egroup_leader. In this case do_prlimit() may take the wrong lock, or (worse)\n-\u003egroup_leader may change between task_lock() and task_unlock().\n\nChange sys_prlimit64() to take tasklist_lock when necessary. This is not\nnice, but I don\u0027t see a better fix for -stable.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40201",
"url": "https://www.suse.com/security/cve/CVE-2025-40201"
},
{
"category": "external",
"summary": "SUSE Bug 1253455 for CVE-2025-40201",
"url": "https://bugzilla.suse.com/1253455"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-19T16:46:47Z",
"details": "moderate"
}
],
"title": "CVE-2025-40201"
},
{
"cve": "CVE-2025-40202",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40202"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nipmi: Rework user message limit handling\n\nThe limit on the number of user messages had a number of issues,\nimproper counting in some cases and a use after free.\n\nRestructure how this is all done to handle more in the receive message\nallocation routine, so all refcouting and user message limit counts\nare done in that routine. It\u0027s a lot cleaner and safer.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40202",
"url": "https://www.suse.com/security/cve/CVE-2025-40202"
},
{
"category": "external",
"summary": "SUSE Bug 1253451 for CVE-2025-40202",
"url": "https://bugzilla.suse.com/1253451"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-19T16:46:47Z",
"details": "moderate"
}
],
"title": "CVE-2025-40202"
},
{
"cve": "CVE-2025-40203",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40203"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nlistmount: don\u0027t call path_put() under namespace semaphore\n\nMassage listmount() and make sure we don\u0027t call path_put() under the\nnamespace semaphore. If we put the last reference we\u0027re fscked.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40203",
"url": "https://www.suse.com/security/cve/CVE-2025-40203"
},
{
"category": "external",
"summary": "SUSE Bug 1253457 for CVE-2025-40203",
"url": "https://bugzilla.suse.com/1253457"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-19T16:46:47Z",
"details": "moderate"
}
],
"title": "CVE-2025-40203"
},
{
"cve": "CVE-2025-40204",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40204"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nsctp: Fix MAC comparison to be constant-time\n\nTo prevent timing attacks, MACs need to be compared in constant time.\nUse the appropriate helper function for this.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40204",
"url": "https://www.suse.com/security/cve/CVE-2025-40204"
},
{
"category": "external",
"summary": "SUSE Bug 1253436 for CVE-2025-40204",
"url": "https://bugzilla.suse.com/1253436"
},
{
"category": "external",
"summary": "SUSE Bug 1253437 for CVE-2025-40204",
"url": "https://bugzilla.suse.com/1253437"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-19T16:46:47Z",
"details": "important"
}
],
"title": "CVE-2025-40204"
},
{
"cve": "CVE-2025-40205",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40205"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nbtrfs: avoid potential out-of-bounds in btrfs_encode_fh()\n\nThe function btrfs_encode_fh() does not properly account for the three\ncases it handles.\n\nBefore writing to the file handle (fh), the function only returns to the\nuser BTRFS_FID_SIZE_NON_CONNECTABLE (5 dwords, 20 bytes) or\nBTRFS_FID_SIZE_CONNECTABLE (8 dwords, 32 bytes).\n\nHowever, when a parent exists and the root ID of the parent and the\ninode are different, the function writes BTRFS_FID_SIZE_CONNECTABLE_ROOT\n(10 dwords, 40 bytes).\n\nIf *max_len is not large enough, this write goes out of bounds because\nBTRFS_FID_SIZE_CONNECTABLE_ROOT is greater than\nBTRFS_FID_SIZE_CONNECTABLE originally returned.\n\nThis results in an 8-byte out-of-bounds write at\nfid-\u003eparent_root_objectid = parent_root_id.\n\nA previous attempt to fix this issue was made but was lost.\n\nhttps://lore.kernel.org/all/4CADAEEC020000780001B32C@vpn.id2.novell.com/\n\nAlthough this issue does not seem to be easily triggerable, it is a\npotential memory corruption bug that should be fixed. This patch\nresolves the issue by ensuring the function returns the appropriate size\nfor all three cases and validates that *max_len is large enough before\nwriting any data.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40205",
"url": "https://www.suse.com/security/cve/CVE-2025-40205"
},
{
"category": "external",
"summary": "SUSE Bug 1253456 for CVE-2025-40205",
"url": "https://bugzilla.suse.com/1253456"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-19T16:46:47Z",
"details": "moderate"
}
],
"title": "CVE-2025-40205"
},
{
"cve": "CVE-2025-40206",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40206"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnetfilter: nft_objref: validate objref and objrefmap expressions\n\nReferencing a synproxy stateful object from OUTPUT hook causes kernel\ncrash due to infinite recursive calls:\n\nBUG: TASK stack guard page was hit at 000000008bda5b8c (stack is 000000003ab1c4a5..00000000494d8b12)\n[...]\nCall Trace:\n __find_rr_leaf+0x99/0x230\n fib6_table_lookup+0x13b/0x2d0\n ip6_pol_route+0xa4/0x400\n fib6_rule_lookup+0x156/0x240\n ip6_route_output_flags+0xc6/0x150\n __nf_ip6_route+0x23/0x50\n synproxy_send_tcp_ipv6+0x106/0x200\n synproxy_send_client_synack_ipv6+0x1aa/0x1f0\n nft_synproxy_do_eval+0x263/0x310\n nft_do_chain+0x5a8/0x5f0 [nf_tables\n nft_do_chain_inet+0x98/0x110\n nf_hook_slow+0x43/0xc0\n __ip6_local_out+0xf0/0x170\n ip6_local_out+0x17/0x70\n synproxy_send_tcp_ipv6+0x1a2/0x200\n synproxy_send_client_synack_ipv6+0x1aa/0x1f0\n[...]\n\nImplement objref and objrefmap expression validate functions.\n\nCurrently, only NFT_OBJECT_SYNPROXY object type requires validation.\nThis will also handle a jump to a chain using a synproxy object from the\nOUTPUT hook.\n\nNow when trying to reference a synproxy object in the OUTPUT hook, nft\nwill produce the following error:\n\nsynproxy_crash.nft: Error: Could not process rule: Operation not supported\n synproxy name mysynproxy\n ^^^^^^^^^^^^^^^^^^^^^^^^",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40206",
"url": "https://www.suse.com/security/cve/CVE-2025-40206"
},
{
"category": "external",
"summary": "SUSE Bug 1253393 for CVE-2025-40206",
"url": "https://bugzilla.suse.com/1253393"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.1,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-19T16:46:47Z",
"details": "moderate"
}
],
"title": "CVE-2025-40206"
},
{
"cve": "CVE-2025-40207",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40207"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nmedia: v4l2-subdev: Fix alloc failure check in v4l2_subdev_call_state_try()\n\nv4l2_subdev_call_state_try() macro allocates a subdev state with\n__v4l2_subdev_state_alloc(), but does not check the returned value. If\n__v4l2_subdev_state_alloc fails, it returns an ERR_PTR, and that would\ncause v4l2_subdev_call_state_try() to crash.\n\nAdd proper error handling to v4l2_subdev_call_state_try().",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40207",
"url": "https://www.suse.com/security/cve/CVE-2025-40207"
},
{
"category": "external",
"summary": "SUSE Bug 1253395 for CVE-2025-40207",
"url": "https://bugzilla.suse.com/1253395"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-19T16:46:47Z",
"details": "moderate"
}
],
"title": "CVE-2025-40207"
}
]
}
SUSE-SU-2025:4521-1
Vulnerability from csaf_suse - Published: 2025-12-24 12:42 - Updated: 2025-12-24 12:42Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Security update for the Linux Kernel",
"title": "Title of the patch"
},
{
"category": "description",
"text": "The SUSE Linux Enterprise 15 SP6 RT kernel was updated to receive various security bugfixes.\n\n\nThe following security bugs were fixed:\n\n- CVE-2022-50253: bpf: make sure skb-\u003elen != 0 when redirecting to a tunneling device (bsc#1249912).\n- CVE-2023-53676: scsi: target: iscsi: Fix buffer overflow in lio_target_nacl_info_show() (bsc#1251786).\n- CVE-2025-21710: tcp: correct handling of extreme memory squeeze (bsc#1237888).\n- CVE-2025-37916: pds_core: remove write-after-free of client_id (bsc#1243474).\n- CVE-2025-38359: s390/mm: Fix in_atomic() handling in do_secure_storage_access() (bsc#1247076).\n- CVE-2025-38361: drm/amd/display: Check dce_hwseq before dereferencing it (bsc#1247079).\n- CVE-2025-39788: scsi: ufs: exynos: Fix programming of HCI_UTRL_NEXUS_TYPE (bsc#1249547).\n- CVE-2025-39805: net: macb: fix unregister_netdev call order in macb_remove() (bsc#1249982).\n- CVE-2025-39819: fs/smb: Fix inconsistent refcnt update (bsc#1250176).\n- CVE-2025-39859: ptp: ocp: fix use-after-free bugs causing by ptp_ocp_watchdog (bsc#1250252).\n- CVE-2025-39944: octeontx2-pf: Fix use-after-free bugs in otx2_sync_tstamp() (bsc#1251120).\n- CVE-2025-39980: nexthop: Forbid FDB status change while nexthop is in a group (bsc#1252063).\n- CVE-2025-40001: scsi: mvsas: Fix use-after-free bugs in mvs_work_queue (bsc#1252303).\n- CVE-2025-40021: tracing: dynevent: Add a missing lockdown check on dynevent (bsc#1252681).\n- CVE-2025-40027: net/9p: fix double req put in p9_fd_cancelled (bsc#1252763).\n- CVE-2025-40030: pinctrl: check the return value of pinmux_ops::get_function_name() (bsc#1252773).\n- CVE-2025-40038: KVM: SVM: Skip fastpath emulation on VM-Exit if next RIP isn\u0027t valid (bsc#1252817).\n- CVE-2025-40040: mm/ksm: fix flag-dropping behavior in ksm_madvise (bsc#1252780).\n- CVE-2025-40048: uio_hv_generic: Let userspace take care of interrupt mask (bsc#1252862).\n- CVE-2025-40055: ocfs2: fix double free in user_cluster_connect() (bsc#1252821).\n- CVE-2025-40059: coresight: Fix incorrect handling for return value of devm_kzalloc (bsc#1252809).\n- CVE-2025-40064: smc: Fix use-after-free in __pnet_find_base_ndev() (bsc#1252845).\n- CVE-2025-40070: pps: fix warning in pps_register_cdev when register device fail (bsc#1252836).\n- CVE-2025-40074: ipv4: start using dst_dev_rcu() (bsc#1252794).\n- CVE-2025-40075: tcp_metrics: use dst_dev_net_rcu() (bsc#1252795).\n- CVE-2025-40083: net/sched: sch_qfq: Fix null-deref in agg_dequeue (bsc#1252912).\n- CVE-2025-40098: ALSA: hda: cs35l41: Fix NULL pointer dereference in cs35l41_get_acpi_mute_state() (bsc#1252917).\n- CVE-2025-40105: vfs: Don\u0027t leak disconnected dentries on umount (bsc#1252928).\n- CVE-2025-40139: smc: Use __sk_dst_get() and dst_dev_rcu() in in smc_clc_prfx_set() (bsc#1253409).\n- CVE-2025-40149: tls: Use __sk_dst_get() and dst_dev_rcu() in get_netdev_for_sock() (bsc#1253355).\n- CVE-2025-40159: xsk: Harden userspace-supplied xdp_desc validation (bsc#1253403).\n- CVE-2025-40168: smc: Use __sk_dst_get() and dst_dev_rcu() in smc_clc_prfx_match() (bsc#1253427).\n- CVE-2025-40169: bpf: Reject negative offsets for ALU ops (bsc#1253416).\n- CVE-2025-40173: net/ip6_tunnel: Prevent perpetual tunnel growth (bsc#1253421).\n- CVE-2025-40176: tls: wait for pending async decryptions if tls_strp_msg_hold fails (bsc#1253425).\n- CVE-2025-40204: sctp: Fix MAC comparison to be constant-time (bsc#1253436).\n\nThe following non-security bugs were fixed:\n\n- ACPI: CPPC: Check _CPC validity for only the online CPUs (git-fixes).\n- ACPI: CPPC: Limit perf ctrs in PCC check only to online CPUs (git-fixes).\n- ACPI: CPPC: Perform fast check switch only for online CPUs (git-fixes).\n- ACPI: PRM: Skip handlers with NULL handler_address or NULL VA (stable-fixes).\n- ACPI: SBS: Fix present test in acpi_battery_read() (git-fixes).\n- ACPI: property: Return present device nodes only on fwnode interface (stable-fixes).\n- ACPI: scan: Add Intel CVS ACPI HIDs to acpi_ignore_dep_ids (stable-fixes).\n- ACPICA: Update dsmethod.c to get rid of unused variable warning (stable-fixes).\n- ACPICA: dispatcher: Use acpi_ds_clear_operands() in acpi_ds_call_control_method() (stable-fixes).\n- ALSA: hda: Fix missing pointer check in hda_component_manager_init function (git-fixes).\n- ALSA: serial-generic: remove shared static buffer (stable-fixes).\n- ALSA: usb-audio: Add validation of UAC2/UAC3 effect units (stable-fixes).\n- ALSA: usb-audio: Fix NULL pointer dereference in snd_usb_mixer_controls_badd (git-fixes).\n- ALSA: usb-audio: Fix potential overflow of PCM transfer buffer (stable-fixes).\n- ALSA: usb-audio: add mono main switch to Presonus S1824c (stable-fixes).\n- ALSA: usb-audio: apply quirk for MOONDROP Quark2 (stable-fixes).\n- ALSA: usb-audio: do not log messages meant for 1810c when initializing 1824c (git-fixes).\n- ALSA: usb-audio: fix uac2 clock source at terminal parser (git-fixes).\n- ASoC: codecs: va-macro: fix resource leak in probe error path (git-fixes).\n- ASoC: cs4271: Fix regulator leak on probe failure (git-fixes).\n- ASoC: max98090/91: fixed max98091 ALSA widget powering up/down (stable-fixes).\n- ASoC: meson: aiu-encoder-i2s: fix bit clock polarity (stable-fixes).\n- ASoC: qcom: sc8280xp: explicitly set S16LE format in sc8280xp_be_hw_params_fixup() (stable-fixes).\n- ASoC: stm32: sai: manage context in set_sysclk callback (stable-fixes).\n- ASoC: tlv320aic3x: Fix class-D initialization for tlv320aic3007 (stable-fixes).\n- Bluetooth: 6lowpan: Do not hold spin lock over sleeping functions (git-fixes).\n- Bluetooth: 6lowpan: add missing l2cap_chan_lock() (git-fixes).\n- Bluetooth: 6lowpan: fix BDADDR_LE vs ADDR_LE_DEV address type confusion (git-fixes).\n- Bluetooth: 6lowpan: reset link-local header on ipv6 recv path (git-fixes).\n- Bluetooth: L2CAP: export l2cap_chan_hold for modules (stable-fixes).\n- Bluetooth: MGMT: cancel mesh send timer when hdev removed (git-fixes).\n- Bluetooth: SCO: Fix UAF on sco_conn_free (stable-fixes).\n- Bluetooth: bcsp: receive data only if registered (stable-fixes).\n- Bluetooth: btrtl: Fix memory leak in rtlbt_parse_firmware_v2() (git-fixes).\n- Bluetooth: btusb: Check for unexpected bytes when defragmenting HCI frames (stable-fixes).\n- Bluetooth: btusb: reorder cleanup in btusb_disconnect to avoid UAF (git-fixes).\n- Bluetooth: hci_event: validate skb length for unknown CC opcode (git-fixes).\n- Documentation: ACPI: i2c-muxes: fix I2C device references (git-fixes).\n- Drivers: hv: vmbus: Add utility function for querying ring size (git-fixes).\n- HID: amd_sfh: Stop sensor before starting (git-fixes).\n- HID: hid-ntrig: Prevent memory leak in ntrig_report_version() (git-fixes).\n- HID: quirks: avoid Cooler Master MM712 dongle wakeup bug (stable-fixes).\n- HID: quirks: work around VID/PID conflict for 0x4c4a/0x4155 (git-fixes).\n- HID: uclogic: Fix potential memory leak in error path (git-fixes).\n- Input: atmel_mxt_ts - allow reset GPIO to sleep (stable-fixes).\n- Input: imx_sc_key - fix memory corruption on unload (git-fixes).\n- Input: pegasus-notetaker - fix potential out-of-bounds access (git-fixes).\n- KVM: Pass new routing entries and irqfd when updating IRTEs (git-fixes).\n- KVM: SVM: Delete IRTE link from previous vCPU before setting new IRTE (git-fixes).\n- KVM: SVM: Delete IRTE link from previous vCPU irrespective of new routing (git-fixes).\n- KVM: SVM: Emulate PERF_CNTR_GLOBAL_STATUS_SET for PerfMonV2 (git-fixes).\n- KVM: SVM: Mark VMCB_LBR dirty when MSR_IA32_DEBUGCTLMSR is updated (git-fixes).\n- KVM: SVM: Re-load current, not host, TSC_AUX on #VMEXIT from SEV-ES guest (git-fixes).\n- KVM: SVM: Track per-vCPU IRTEs using kvm_kernel_irqfd structure (git-fixes).\n- KVM: SVM: WARN if an invalid posted interrupt IRTE entry is added (git-fixes).\n- KVM: VMX: Allow guest to set DEBUGCTL.RTM_DEBUG if RTM is supported (git-fixes).\n- KVM: VMX: Apply MMIO Stale Data mitigation if KVM maps MMIO into the guest (git-fixes).\n- KVM: VMX: Fix check for valid GVA on an EPT violation (git-fixes).\n- KVM: VMX: Preserve host\u0027s DEBUGCTLMSR_FREEZE_IN_SMM while running the guest (git-fixes).\n- KVM: VMX: Wrap all accesses to IA32_DEBUGCTL with getter/setter APIs (git-fixes).\n- KVM: nVMX: Check vmcs12-\u003eguest_ia32_debugctl on nested VM-Enter (git-fixes).\n- KVM: x86/mmu: Locally cache whether a PFN is host MMIO when making a SPTE (git-fixes).\n- KVM: x86: Add helper to retrieve current value of user return MSR (git-fixes).\n- KVM: x86: Convert vcpu_run()\u0027s immediate exit param into a generic bitmap (git-fixes).\n- KVM: x86: Do not treat ENTER and LEAVE as branches, because they are not (git-fixes).\n- KVM: x86: Drop kvm_x86_ops.set_dr6() in favor of a new KVM_RUN flag (git-fixes).\n- NFS4: Fix state renewals missing after boot (git-fixes).\n- NFS: check if suid/sgid was cleared after a write as needed (git-fixes).\n- NFSD: Never cache a COMPOUND when the SEQUENCE operation fails (git-fixes).\n- NFSD: Skip close replay processing if XDR encoding fails (git-fixes).\n- NFSD: free copynotify stateid in nfs4_free_ol_stateid() (git-fixes).\n- NFSv4.1: fix mount hang after CREATE_SESSION failure (git-fixes).\n- NFSv4: handle ERR_GRACE on delegation recalls (git-fixes).\n- PCI/P2PDMA: Fix incorrect pointer usage in devm_kfree() call (stable-fixes).\n- PCI/PM: Skip resuming to D0 if device is disconnected (stable-fixes).\n- PCI: Disable MSI on RDC PCI to PCIe bridges (stable-fixes).\n- PCI: cadence: Check for the existence of cdns_pcie::ops before using it (stable-fixes).\n- PCI: dwc: Verify the single eDMA IRQ in dw_pcie_edma_irq_verify() (stable-fixes).\n- PCI: j721e: Fix incorrect error message in probe() (git-fixes).\n- PCI: rcar-host: Convert struct rcar_msi mask_lock into raw spinlock (git-fixes).\n- PCI: tegra194: Reset BARs when running in PCIe endpoint mode (git-fixes).\n- RDMA/bnxt_re: Do not fail destroy QP and cleanup debugfs earlier (git-fixes).\n- RDMA/bnxt_re: Fix a potential memory leak in destroy_gsi_sqp (git-fixes).\n- RDMA/hns: Fix recv CQ and QP cache affinity (git-fixes).\n- RDMA/hns: Fix the modification of max_send_sge (git-fixes).\n- RDMA/hns: Fix wrong WQE data when QP wraps around (git-fixes).\n- RDMA/irdma: Fix SD index calculation (git-fixes).\n- RDMA/irdma: Set irdma_cq cq_num field during CQ create (git-fixes).\n- Revert \u0027drm/tegra: dsi: Clear enable register if powered by bootloader\u0027 (git-fixes).\n- Revert \u0027wifi: ath10k: avoid unnecessary wait for service ready message\u0027 (git-fixes).\n- accel/habanalabs/gaudi2: fix BMON disable configuration (stable-fixes).\n- accel/habanalabs/gaudi2: read preboot status after recovering from dirty state (stable-fixes).\n- accel/habanalabs: return ENOMEM if less than requested pages were pinned (stable-fixes).\n- accel/habanalabs: support mapping cb with vmalloc-backed coherent memory (stable-fixes).\n- acpi,srat: Fix incorrect device handle check for Generic Initiator (git-fixes).\n- amd/amdkfd: resolve a race in amdgpu_amdkfd_device_fini_sw (stable-fixes).\n- block: avoid possible overflow for chunk_sectors check in blk_stack_limits() (git-fixes).\n- block: fix kobject double initialization in add_disk (git-fixes).\n- btrfs: abort transaction on failure to add link to inode (git-fixes).\n- btrfs: avoid page_lockend underflow in btrfs_punch_hole_lock_range() (git-fix).\n- btrfs: avoid using fixed char array size for tree names (git-fix).\n- btrfs: do not update last_log_commit when logging inode due to a new name (git-fixes).\n- btrfs: fix COW handling in run_delalloc_nocow() (git-fix).\n- btrfs: fix inode leak on failure to add link to inode (git-fixes).\n- btrfs: make btrfs_clear_delalloc_extent() free delalloc reserve (git-fix).\n- btrfs: mark dirty extent range for out of bound prealloc extents (git-fixes).\n- btrfs: qgroup: correctly model root qgroup rsv in convert (git-fix).\n- btrfs: rename err to ret in btrfs_link() (git-fixes).\n- btrfs: run btrfs_error_commit_super() early (git-fix).\n- btrfs: scrub: put bio after errors in scrub_raid56_parity_stripe() (git-fixes).\n- btrfs: send: fix duplicated rmdir operations when using extrefs (git-fixes).\n- btrfs: set inode flag BTRFS_INODE_COPY_EVERYTHING when logging new name (git-fixes).\n- btrfs: simplify error handling logic for btrfs_link() (git-fixes).\n- btrfs: tree-checker: add dev extent item checks (git-fix).\n- btrfs: tree-checker: add type and sequence check for inline backrefs (git-fix).\n- btrfs: tree-checker: fix the wrong output of data backref objectid (git-fix).\n- btrfs: tree-checker: reject BTRFS_FT_UNKNOWN dir type (git-fix).\n- btrfs: tree-checker: validate dref root and objectid (git-fix).\n- btrfs: use smp_mb__after_atomic() when forcing COW in create_pending_snapshot() (git-fixes).\n- char: misc: Does not request module for miscdevice with dynamic minor (stable-fixes).\n- char: misc: Make misc_register() reentry for miscdevice who wants dynamic minor (stable-fixes).\n- char: misc: restrict the dynamic range to exclude reserved minors (stable-fixes).\n- cramfs: Verify inode mode when loading from disk (git-fixes).\n- crypto: aspeed - fix double free caused by devm (git-fixes).\n- crypto: aspeed-acry - Convert to platform remove callback returning void (stable-fixes).\n- crypto: hisilicon/qm - Fix device reference leak in qm_get_qos_value (git-fixes).\n- crypto: iaa - Do not clobber req-\u003ebase.data (git-fixes).\n- crypto: qat - use kcalloc() in qat_uclo_map_objs_from_mof() (stable-fixes).\n- dmaengine: dw-edma: Set status for callback_result (stable-fixes).\n- dmaengine: mv_xor: match alloc_wc and free_wc (stable-fixes).\n- drm/amd/display: Add AVI infoframe copy in copy_stream_update_to_stream (stable-fixes).\n- drm/amd/display: Disable VRR on DCE 6 (stable-fixes).\n- drm/amd/display: Fix DVI-D/HDMI adapters (stable-fixes).\n- drm/amd/display: Fix NULL deref in debugfs odm_combine_segments (git-fixes).\n- drm/amd/display: Fix black screen with HDMI outputs (git-fixes).\n- drm/amd/display: Increase AUX Intra-Hop Done Max Wait Duration (stable-fixes).\n- drm/amd/display: add more cyan skillfish devices (stable-fixes).\n- drm/amd/display: ensure committing streams is seamless (stable-fixes).\n- drm/amd/display: update dpp/disp clock from smu clock table (stable-fixes).\n- drm/amd/pm: Disable MCLK switching on SI at high pixel clocks (stable-fixes).\n- drm/amd/pm: Use cached metrics data on aldebaran (stable-fixes).\n- drm/amd/pm: Use cached metrics data on arcturus (stable-fixes).\n- drm/amd: Avoid evicting resources at S5 (stable-fixes).\n- drm/amd: Fix suspend failure with secure display TA (git-fixes).\n- drm/amd: add more cyan skillfish PCI ids (stable-fixes).\n- drm/amdgpu/jpeg: Hold pg_lock before jpeg poweroff (stable-fixes).\n- drm/amdgpu: Allow kfd CRIU with no buffer objects (stable-fixes).\n- drm/amdgpu: Fix NULL pointer dereference in VRAM logic for APU devices (stable-fixes).\n- drm/amdgpu: Use memdup_array_user in amdgpu_cs_wait_fences_ioctl (stable-fixes).\n- drm/amdgpu: add support for cyan skillfish gpu_info (stable-fixes).\n- drm/amdgpu: do not enable SMU on cyan skillfish (stable-fixes).\n- drm/amdgpu: reject gang submissions under SRIOV (stable-fixes).\n- drm/amdkfd: Handle lack of READ permissions in SVM mapping (stable-fixes).\n- drm/amdkfd: Tie UNMAP_LATENCY to queue_preemption (stable-fixes).\n- drm/amdkfd: fix vram allocation failure for a special case (stable-fixes).\n- drm/amdkfd: return -ENOTTY for unsupported IOCTLs (stable-fixes).\n- drm/bridge: cdns-dsi: Do not fail on MIPI_DSI_MODE_VIDEO_BURST (stable-fixes).\n- drm/bridge: cdns-dsi: Fix REG_WAKEUP_TIME value (stable-fixes).\n- drm/bridge: display-connector: do not set OP_DETECT for DisplayPorts (stable-fixes).\n- drm/i915: Avoid lock inversion when pinning to GGTT on CHV/BXT+VTD (git-fixes).\n- drm/i915: Fix conversion between clock ticks and nanoseconds (git-fixes).\n- drm/msm/dsi/phy: Toggle back buffer resync after preparing PLL (stable-fixes).\n- drm/msm/dsi/phy_7nm: Fix missing initial VCO rate (stable-fixes).\n- drm/msm: make sure to not queue up recovery more than once (stable-fixes).\n- drm/nouveau: replace snprintf() with scnprintf() in nvkm_snprintbf() (stable-fixes).\n- drm/sched: Fix deadlock in drm_sched_entity_kill_jobs_cb (git-fixes).\n- drm/tegra: Add call to put_pid() (git-fixes).\n- drm/tegra: dc: Fix reference leak in tegra_dc_couple() (git-fixes).\n- drm/tidss: Set crtc modesetting parameters with adjusted mode (stable-fixes).\n- drm/tidss: Use the crtc_* timings when programming the HW (stable-fixes).\n- drm/vmwgfx: Validate command header size against SVGA_CMD_MAX_DATASIZE (git-fixes).\n- exfat: limit log print for IO error (git-fixes).\n- extcon: adc-jack: Cleanup wakeup source only if it was enabled (git-fixes).\n- extcon: adc-jack: Fix wakeup source leaks on device unbind (stable-fixes).\n- fbcon: Set fb_display[i]-\u003emode to NULL when the mode is released (stable-fixes).\n- fbdev: Add bounds checking in bit_putcs to fix vmalloc-out-of-bounds (stable-fixes).\n- fbdev: bitblit: bound-check glyph index in bit_putcs* (stable-fixes).\n- fbdev: pvr2fb: Fix leftover reference to ONCHIP_NR_DMA_CHANNELS (stable-fixes).\n- hwmon: (asus-ec-sensors) increase timeout for locking ACPI mutex (stable-fixes).\n- hwmon: (dell-smm) Add support for Dell OptiPlex 7040 (stable-fixes).\n- hwmon: (k10temp) Add device ID for Strix Halo (stable-fixes).\n- hwmon: (k10temp) Add thermal support for AMD Family 1Ah-based models (stable-fixes).\n- hwmon: (sbtsi_temp) AMD CPU extended temperature range support (stable-fixes).\n- hwmon: sy7636a: add alias (stable-fixes).\n- iio: adc: imx93_adc: load calibrated values even calibration failed (stable-fixes).\n- iio: adc: spear_adc: mask SPEAR_ADC_STATUS channel and avg sample before setting register (stable-fixes).\n- ima: do not clear IMA_DIGSIG flag when setting or removing non-IMA xattr (stable-fixes).\n- iommu/amd: Return an error if vCPU affinity is set for non-vCPU IRTE (git-fixes).\n- isdn: mISDN: hfcsusb: fix memory leak in hfcsusb_probe() (git-fixes).\n- jfs: Verify inode mode when loading from disk (git-fixes).\n- jfs: fix uninitialized waitqueue in transaction manager (git-fixes).\n- kABI fix for KVM: VMX: Apply MMIO Stale Data mitigation if KVM maps MMIO into the guest (git-fixes).\n- kabi/severities: drop xfer_to_guest_mode_handle_work.\n- lib/crypto: curve25519-hacl64: Fix older clang KASAN workaround for GCC (git-fixes).\n- md/raid1: fix data lost for writemostly rdev (git-fixes).\n- md: fix mssing blktrace bio split events (git-fixes).\n- media: adv7180: Add missing lock in suspend callback (stable-fixes).\n- media: adv7180: Do not write format to device in set_fmt (stable-fixes).\n- media: adv7180: Only validate format in querystd (stable-fixes).\n- media: amphion: Delete v4l2_fh synchronously in .release() (stable-fixes).\n- media: fix uninitialized symbol warnings (stable-fixes).\n- media: i2c: Kconfig: Ensure a dependency on HAVE_CLK for VIDEO_CAMERA_SENSOR (stable-fixes).\n- media: i2c: og01a1b: Specify monochrome media bus format instead of Bayer (stable-fixes).\n- media: imon: make send_packet() more robust (stable-fixes).\n- media: ov08x40: Fix the horizontal flip control (stable-fixes).\n- media: redrat3: use int type to store negative error codes (stable-fixes).\n- media: uvcvideo: Use heuristic to find stream entity (git-fixes).\n- memstick: Add timeout to prevent indefinite waiting (stable-fixes).\n- mfd: da9063: Split chip variant reading in two bus transactions (stable-fixes).\n- mfd: madera: Work around false-positive -Wininitialized warning (stable-fixes).\n- mfd: stmpe-i2c: Add missing MODULE_LICENSE (stable-fixes).\n- mfd: stmpe: Remove IRQ domain upon removal (stable-fixes).\n- minixfs: Verify inode mode when loading from disk (git-fixes).\n- mm/mm_init: fix hash table order logging in alloc_large_system_hash() (git-fixes).\n- mm/secretmem: fix use-after-free race in fault handler (git-fixes).\n- mmc: host: renesas_sdhi: Fix the actual clock (stable-fixes).\n- mmc: sdhci-msm: Enable tuning for SDR50 mode for SD card (stable-fixes).\n- mmc: sdhci-of-dwcmshc: Change DLL_STRBIN_TAPNUM_DEFAULT to 0x4 (git-fixes).\n- mtd: onenand: Pass correct pointer to IRQ handler (git-fixes).\n- mtd: rawnand: cadence: fix DMA device NULL pointer dereference (git-fixes).\n- mtdchar: fix integer overflow in read/write ioctls (git-fixes).\n- net/mana: fix warning in the writer of client oob (git-fixes).\n- net/smc: Remove validation of reserved bits in CLC Decline message (bsc#1253779).\n- net: nfc: nci: Increase NCI_DATA_TIMEOUT to 3000 ms (stable-fixes).\n- net: phy: clear link parameters on admin link down (stable-fixes).\n- net: phy: fixed_phy: let fixed_phy_unregister free the phy_device (stable-fixes).\n- net: phy: marvell: Fix 88e1510 downshift counter errata (stable-fixes).\n- net: tcp: send zero-window ACK when no memory (bsc#1253779).\n- net: usb: qmi_wwan: initialize MAC header offset in qmimux_rx_fixup (git-fixes).\n- nfs4_setup_readdir(): insufficient locking for -\u003ed_parent-\u003ed_inode dereferencing (git-fixes).\n- nfsd: do not defer requests during idmap lookup in v4 compound decode (bsc#1232223).\n- nfsd: fix return error codes for nfsd_map_name_to_id (bsc#1232223).\n- nouveau/firmware: Add missing kfree() of nvkm_falcon_fw::boot (git-fixes).\n- perf script: add --addr2line option (bsc#1247509).\n- phy: cadence: cdns-dphy: Enable lower resolutions in dphy (stable-fixes).\n- phy: renesas: r8a779f0-ether-serdes: add new step added to latest datasheet (stable-fixes).\n- phy: rockchip: phy-rockchip-inno-csidphy: allow writes to grf register 0 (stable-fixes).\n- pinctrl: s32cc: fix uninitialized memory in s32_pinctrl_desc (git-fixes).\n- pinctrl: s32cc: initialize gpio_pin_config::list after kmalloc() (git-fixes).\n- pinctrl: single: fix bias pull up/down handling in pin_config_set (stable-fixes).\n- platform/x86/intel/speed_select_if: Convert PCIBIOS_* return codes to errnos (git-fixes).\n- power: supply: qcom_battmgr: add OOI chemistry (stable-fixes).\n- power: supply: qcom_battmgr: handle charging state change notifications (stable-fixes).\n- power: supply: sbs-charger: Support multiple devices (stable-fixes).\n- regulator: fixed: fix GPIO descriptor leak on register failure (git-fixes).\n- rtc: rx8025: fix incorrect register reference (git-fixes).\n- s390/mm,fault: simplify kfence fault handling (bsc#1247076).\n- scsi: Fix sas_user_scan() to handle wildcard and multi-channel scans (git-fixes).\n- scsi: aacraid: Stop using PCI_IRQ_AFFINITY (git-fixes).\n- scsi: core: sysfs: Correct sysfs attributes access rights (git-fixes).\n- scsi: hpsa: Fix potential memory leak in hpsa_big_passthru_ioctl() (git-fixes).\n- scsi: libfc: Prevent integer overflow in fc_fcp_recv_data() (git-fixes).\n- scsi: mpi3mr: Correctly handle ATA device errors (git-fixes).\n- scsi: mpi3mr: Drop unnecessary volatile from __iomem pointers (git-fixes).\n- scsi: mpt3sas: Correctly handle ATA device errors (git-fixes).\n- scsi: mpt3sas: Fix crash in transport port remove by using ioc_info() (git-fixes).\n- scsi: pm80xx: Fix array-index-out-of-of-bounds on rmmod (git-fixes).\n- scsi: storvsc: Prefer returning channel with the same CPU as on the I/O issuing CPU (bsc#1252267).\n- selftests/bpf: Close fd in error path in drop_on_reuseport (git-fixes).\n- selftests/bpf: Close obj in error path in xdp_adjust_tail (git-fixes).\n- selftests/bpf: Fix missing ARRAY_SIZE() definition in bench.c (git-fixes).\n- selftests/bpf: Fix missing BUILD_BUG_ON() declaration (git-fixes).\n- selftests/bpf: Fix missing UINT_MAX definitions in benchmarks (git-fixes).\n- selftests/bpf: Fix string read in strncmp benchmark (git-fixes).\n- selftests/bpf: Mitigate sockmap_ktls disconnect_after_delete failure (git-fixes).\n- selftests/bpf: Use pid_t consistently in test_progs.c (git-fixes).\n- selftests/bpf: fix signedness bug in redir_partial() (git-fixes).\n- serial: 8250_exar: add support for Advantech 2 port card with Device ID 0x0018 (git-fixes).\n- serial: 8250_mtk: Enable baud clock and manage in runtime PM (git-fixes).\n- soc/tegra: fuse: Add Tegra114 nvmem cells and fuse lookups (stable-fixes).\n- soc: aspeed: socinfo: Add AST27xx silicon IDs (stable-fixes).\n- soc: qcom: smem: Fix endian-unaware access of num_entries (stable-fixes).\n- spi: Try to get ACPI GPIO IRQ earlier (git-fixes).\n- spi: loopback-test: Do not use %pK through printk (stable-fixes).\n- spi: rpc-if: Add resume support for RZ/G3E (stable-fixes).\n- strparser: Fix signed/unsigned mismatch bug (git-fixes).\n- tcp_bpf: Call sk_msg_free() when tcp_bpf_send_verdict() fails to allocate psock-\u003ecork (bsc#1250705).\n- thunderbolt: Use is_pciehp instead of is_hotplug_bridge (stable-fixes).\n- tools/cpupower: Fix incorrect size in cpuidle_state_disable() (stable-fixes).\n- tools/cpupower: fix error return value in cpupower_write_sysfs() (stable-fixes).\n- tools/power x86_energy_perf_policy: Enhance HWP enable (stable-fixes).\n- tools/power x86_energy_perf_policy: Fix incorrect fopen mode usage (stable-fixes).\n- tools/power x86_energy_perf_policy: Prefer driver HWP limits (stable-fixes).\n- tools: lib: thermal: do not preserve owner in install (stable-fixes).\n- tools: lib: thermal: use pkg-config to locate libnl3 (stable-fixes).\n- uio_hv_generic: Query the ringbuffer size for device (git-fixes).\n- usb/core/quirks: Add Huawei ME906S to wakeup quirk (git-fixes).\n- usb: cdns3: gadget: Use-after-free during failed initialization and exit of cdnsp gadget (stable-fixes).\n- usb: gadget: f_fs: Fix epfile null pointer access after ep enable (stable-fixes).\n- usb: gadget: f_hid: Fix zero length packet transfer (stable-fixes).\n- usb: gadget: f_ncm: Fix MAC assignment NCM ethernet (stable-fixes).\n- usb: mon: Increase BUFF_MAX to 64 MiB to support multi-MB URBs (stable-fixes).\n- usb: xhci: plat: Facilitate using autosuspend for xhci plat devices (stable-fixes).\n- video: backlight: lp855x_bl: Set correct EPROM start for LP8556 (stable-fixes).\n- watchdog: s3c2410_wdt: Fix max_timeout being calculated larger (stable-fixes).\n- wifi: ath10k: Fix connection after GTK rekeying (stable-fixes).\n- wifi: ath11k: zero init info-\u003estatus in wmi_process_mgmt_tx_comp() (git-fixes).\n- wifi: ath12k: Increase DP_REO_CMD_RING_SIZE to 256 (stable-fixes).\n- wifi: mac80211: Fix HE capabilities element check (stable-fixes).\n- wifi: mac80211: reject address change while connecting (git-fixes).\n- wifi: mac80211: skip rate verification for not captured PSDUs (git-fixes).\n- wifi: mac80211_hwsim: Limit destroy_on_close radio removal to netgroup (git-fixes).\n- wifi: mt76: mt7921: Add 160MHz beamformee capability for mt7922 device (stable-fixes).\n- wifi: mt76: mt7996: Temporarily disable EPCS (stable-fixes).\n- wifi: mwl8k: inject DSSS Parameter Set element into beacons if missing (git-fixes).\n- wifi: rtw88: sdio: use indirect IO for device registers before power-on (stable-fixes).\n- wifi: zd1211rw: fix potential memory leak in __zd_usb_enable_rx() (git-fixes).\n- x86/CPU/AMD: Add RDSEED fix for Zen5 (git-fixes).\n- x86/CPU/AMD: Add additional fixed RDSEED microcode revisions (git-fixes).\n- x86/CPU/AMD: Add missing terminator for zen5_rdseed_microcode (git-fixes).\n- x86/CPU/AMD: Do the common init on future Zens too (git-fixes).\n- x86/amd_nb: Add new PCI IDs for AMD family 0x1a (stable-fixes).\n- x86/bugs: Fix reporting of LFENCE retpoline (git-fixes).\n- x86/bugs: Report correct retbleed mitigation status (git-fixes).\n- x86/vmscape: Add old Intel CPUs to affected list (git-fixes).\n- xhci: dbc: Allow users to modify DbC poll interval via sysfs (stable-fixes).\n- xhci: dbc: Avoid event polling busyloop if pending rx transfers are inactive (git-fixes).\n- xhci: dbc: Improve performance by removing delay in transfer event polling (stable-fixes).\n- xhci: dbc: fix bogus 1024 byte prefix if ttyDBC read races with stall event (git-fixes).\n- xhci: dbc: poll at different rate depending on data transfer activity (stable-fixes).\n",
"title": "Description of the patch"
},
{
"category": "details",
"text": "SUSE-2025-4521,SUSE-SLE-Module-Live-Patching-15-SP6-2025-4521,SUSE-SLE-Module-RT-15-SP6-2025-4521,openSUSE-SLE-15.6-2025-4521",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2025_4521-1.json"
},
{
"category": "self",
"summary": "URL for SUSE-SU-2025:4521-1",
"url": "https://www.suse.com/support/update/announcement/2025/suse-su-20254521-1/"
},
{
"category": "self",
"summary": "E-Mail link for SUSE-SU-2025:4521-1",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-December/023651.html"
},
{
"category": "self",
"summary": "SUSE Bug 1232223",
"url": "https://bugzilla.suse.com/1232223"
},
{
"category": "self",
"summary": "SUSE Bug 1237888",
"url": "https://bugzilla.suse.com/1237888"
},
{
"category": "self",
"summary": "SUSE Bug 1243474",
"url": "https://bugzilla.suse.com/1243474"
},
{
"category": "self",
"summary": "SUSE Bug 1245193",
"url": "https://bugzilla.suse.com/1245193"
},
{
"category": "self",
"summary": "SUSE Bug 1247076",
"url": "https://bugzilla.suse.com/1247076"
},
{
"category": "self",
"summary": "SUSE Bug 1247079",
"url": "https://bugzilla.suse.com/1247079"
},
{
"category": "self",
"summary": "SUSE Bug 1247500",
"url": "https://bugzilla.suse.com/1247500"
},
{
"category": "self",
"summary": "SUSE Bug 1247509",
"url": "https://bugzilla.suse.com/1247509"
},
{
"category": "self",
"summary": "SUSE Bug 1249547",
"url": "https://bugzilla.suse.com/1249547"
},
{
"category": "self",
"summary": "SUSE Bug 1249912",
"url": "https://bugzilla.suse.com/1249912"
},
{
"category": "self",
"summary": "SUSE Bug 1249982",
"url": "https://bugzilla.suse.com/1249982"
},
{
"category": "self",
"summary": "SUSE Bug 1250176",
"url": "https://bugzilla.suse.com/1250176"
},
{
"category": "self",
"summary": "SUSE Bug 1250237",
"url": "https://bugzilla.suse.com/1250237"
},
{
"category": "self",
"summary": "SUSE Bug 1250252",
"url": "https://bugzilla.suse.com/1250252"
},
{
"category": "self",
"summary": "SUSE Bug 1250705",
"url": "https://bugzilla.suse.com/1250705"
},
{
"category": "self",
"summary": "SUSE Bug 1251120",
"url": "https://bugzilla.suse.com/1251120"
},
{
"category": "self",
"summary": "SUSE Bug 1251786",
"url": "https://bugzilla.suse.com/1251786"
},
{
"category": "self",
"summary": "SUSE Bug 1252063",
"url": "https://bugzilla.suse.com/1252063"
},
{
"category": "self",
"summary": "SUSE Bug 1252267",
"url": "https://bugzilla.suse.com/1252267"
},
{
"category": "self",
"summary": "SUSE Bug 1252303",
"url": "https://bugzilla.suse.com/1252303"
},
{
"category": "self",
"summary": "SUSE Bug 1252353",
"url": "https://bugzilla.suse.com/1252353"
},
{
"category": "self",
"summary": "SUSE Bug 1252681",
"url": "https://bugzilla.suse.com/1252681"
},
{
"category": "self",
"summary": "SUSE Bug 1252763",
"url": "https://bugzilla.suse.com/1252763"
},
{
"category": "self",
"summary": "SUSE Bug 1252773",
"url": "https://bugzilla.suse.com/1252773"
},
{
"category": "self",
"summary": "SUSE Bug 1252780",
"url": "https://bugzilla.suse.com/1252780"
},
{
"category": "self",
"summary": "SUSE Bug 1252794",
"url": "https://bugzilla.suse.com/1252794"
},
{
"category": "self",
"summary": "SUSE Bug 1252795",
"url": "https://bugzilla.suse.com/1252795"
},
{
"category": "self",
"summary": "SUSE Bug 1252809",
"url": "https://bugzilla.suse.com/1252809"
},
{
"category": "self",
"summary": "SUSE Bug 1252817",
"url": "https://bugzilla.suse.com/1252817"
},
{
"category": "self",
"summary": "SUSE Bug 1252821",
"url": "https://bugzilla.suse.com/1252821"
},
{
"category": "self",
"summary": "SUSE Bug 1252836",
"url": "https://bugzilla.suse.com/1252836"
},
{
"category": "self",
"summary": "SUSE Bug 1252845",
"url": "https://bugzilla.suse.com/1252845"
},
{
"category": "self",
"summary": "SUSE Bug 1252862",
"url": "https://bugzilla.suse.com/1252862"
},
{
"category": "self",
"summary": "SUSE Bug 1252912",
"url": "https://bugzilla.suse.com/1252912"
},
{
"category": "self",
"summary": "SUSE Bug 1252917",
"url": "https://bugzilla.suse.com/1252917"
},
{
"category": "self",
"summary": "SUSE Bug 1252928",
"url": "https://bugzilla.suse.com/1252928"
},
{
"category": "self",
"summary": "SUSE Bug 1253018",
"url": "https://bugzilla.suse.com/1253018"
},
{
"category": "self",
"summary": "SUSE Bug 1253176",
"url": "https://bugzilla.suse.com/1253176"
},
{
"category": "self",
"summary": "SUSE Bug 1253275",
"url": "https://bugzilla.suse.com/1253275"
},
{
"category": "self",
"summary": "SUSE Bug 1253318",
"url": "https://bugzilla.suse.com/1253318"
},
{
"category": "self",
"summary": "SUSE Bug 1253324",
"url": "https://bugzilla.suse.com/1253324"
},
{
"category": "self",
"summary": "SUSE Bug 1253349",
"url": "https://bugzilla.suse.com/1253349"
},
{
"category": "self",
"summary": "SUSE Bug 1253352",
"url": "https://bugzilla.suse.com/1253352"
},
{
"category": "self",
"summary": "SUSE Bug 1253355",
"url": "https://bugzilla.suse.com/1253355"
},
{
"category": "self",
"summary": "SUSE Bug 1253360",
"url": "https://bugzilla.suse.com/1253360"
},
{
"category": "self",
"summary": "SUSE Bug 1253362",
"url": "https://bugzilla.suse.com/1253362"
},
{
"category": "self",
"summary": "SUSE Bug 1253363",
"url": "https://bugzilla.suse.com/1253363"
},
{
"category": "self",
"summary": "SUSE Bug 1253367",
"url": "https://bugzilla.suse.com/1253367"
},
{
"category": "self",
"summary": "SUSE Bug 1253369",
"url": "https://bugzilla.suse.com/1253369"
},
{
"category": "self",
"summary": "SUSE Bug 1253393",
"url": "https://bugzilla.suse.com/1253393"
},
{
"category": "self",
"summary": "SUSE Bug 1253395",
"url": "https://bugzilla.suse.com/1253395"
},
{
"category": "self",
"summary": "SUSE Bug 1253403",
"url": "https://bugzilla.suse.com/1253403"
},
{
"category": "self",
"summary": "SUSE Bug 1253407",
"url": "https://bugzilla.suse.com/1253407"
},
{
"category": "self",
"summary": "SUSE Bug 1253409",
"url": "https://bugzilla.suse.com/1253409"
},
{
"category": "self",
"summary": "SUSE Bug 1253412",
"url": "https://bugzilla.suse.com/1253412"
},
{
"category": "self",
"summary": "SUSE Bug 1253416",
"url": "https://bugzilla.suse.com/1253416"
},
{
"category": "self",
"summary": "SUSE Bug 1253421",
"url": "https://bugzilla.suse.com/1253421"
},
{
"category": "self",
"summary": "SUSE Bug 1253423",
"url": "https://bugzilla.suse.com/1253423"
},
{
"category": "self",
"summary": "SUSE Bug 1253424",
"url": "https://bugzilla.suse.com/1253424"
},
{
"category": "self",
"summary": "SUSE Bug 1253425",
"url": "https://bugzilla.suse.com/1253425"
},
{
"category": "self",
"summary": "SUSE Bug 1253427",
"url": "https://bugzilla.suse.com/1253427"
},
{
"category": "self",
"summary": "SUSE Bug 1253428",
"url": "https://bugzilla.suse.com/1253428"
},
{
"category": "self",
"summary": "SUSE Bug 1253431",
"url": "https://bugzilla.suse.com/1253431"
},
{
"category": "self",
"summary": "SUSE Bug 1253436",
"url": "https://bugzilla.suse.com/1253436"
},
{
"category": "self",
"summary": "SUSE Bug 1253438",
"url": "https://bugzilla.suse.com/1253438"
},
{
"category": "self",
"summary": "SUSE Bug 1253440",
"url": "https://bugzilla.suse.com/1253440"
},
{
"category": "self",
"summary": "SUSE Bug 1253441",
"url": "https://bugzilla.suse.com/1253441"
},
{
"category": "self",
"summary": "SUSE Bug 1253445",
"url": "https://bugzilla.suse.com/1253445"
},
{
"category": "self",
"summary": "SUSE Bug 1253448",
"url": "https://bugzilla.suse.com/1253448"
},
{
"category": "self",
"summary": "SUSE Bug 1253449",
"url": "https://bugzilla.suse.com/1253449"
},
{
"category": "self",
"summary": "SUSE Bug 1253453",
"url": "https://bugzilla.suse.com/1253453"
},
{
"category": "self",
"summary": "SUSE Bug 1253456",
"url": "https://bugzilla.suse.com/1253456"
},
{
"category": "self",
"summary": "SUSE Bug 1253472",
"url": "https://bugzilla.suse.com/1253472"
},
{
"category": "self",
"summary": "SUSE Bug 1253779",
"url": "https://bugzilla.suse.com/1253779"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-50253 page",
"url": "https://www.suse.com/security/cve/CVE-2022-50253/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2023-53676 page",
"url": "https://www.suse.com/security/cve/CVE-2023-53676/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-21710 page",
"url": "https://www.suse.com/security/cve/CVE-2025-21710/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-37916 page",
"url": "https://www.suse.com/security/cve/CVE-2025-37916/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-38359 page",
"url": "https://www.suse.com/security/cve/CVE-2025-38359/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-38361 page",
"url": "https://www.suse.com/security/cve/CVE-2025-38361/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-39788 page",
"url": "https://www.suse.com/security/cve/CVE-2025-39788/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-39805 page",
"url": "https://www.suse.com/security/cve/CVE-2025-39805/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-39819 page",
"url": "https://www.suse.com/security/cve/CVE-2025-39819/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-39859 page",
"url": "https://www.suse.com/security/cve/CVE-2025-39859/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-39944 page",
"url": "https://www.suse.com/security/cve/CVE-2025-39944/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-39980 page",
"url": "https://www.suse.com/security/cve/CVE-2025-39980/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40001 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40001/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40021 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40021/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40027 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40027/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40030 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40030/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40038 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40038/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40040 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40040/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40048 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40048/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40055 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40055/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40059 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40059/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40064 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40064/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40070 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40070/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40074 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40074/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40075 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40075/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40083 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40083/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40098 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40098/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40105 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40105/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40107 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40107/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40109 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40109/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40110 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40110/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40111 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40111/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40115 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40115/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40116 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40116/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40118 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40118/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40120 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40120/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40121 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40121/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40127 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40127/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40129 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40129/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40139 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40139/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40140 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40140/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40141 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40141/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40149 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40149/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40154 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40154/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40156 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40156/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40157 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40157/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40159 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40159/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40164 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40164/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40168 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40168/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40169 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40169/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40171 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40171/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40172 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40172/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40173 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40173/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40176 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40176/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40180 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40180/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40183 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40183/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40186 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40186/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40188 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40188/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40194 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40194/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40198 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40198/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40200 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40200/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40204 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40204/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40205 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40205/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40206 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40206/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40207 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40207/"
}
],
"title": "Security update for the Linux Kernel",
"tracking": {
"current_release_date": "2025-12-24T12:42:49Z",
"generator": {
"date": "2025-12-24T12:42:49Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "SUSE-SU-2025:4521-1",
"initial_release_date": "2025-12-24T12:42:49Z",
"revision_history": [
{
"date": "2025-12-24T12:42:49Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "kernel-devel-rt-6.4.0-150600.10.61.1.noarch",
"product": {
"name": "kernel-devel-rt-6.4.0-150600.10.61.1.noarch",
"product_id": "kernel-devel-rt-6.4.0-150600.10.61.1.noarch"
}
},
{
"category": "product_version",
"name": "kernel-source-rt-6.4.0-150600.10.61.1.noarch",
"product": {
"name": "kernel-source-rt-6.4.0-150600.10.61.1.noarch",
"product_id": "kernel-source-rt-6.4.0-150600.10.61.1.noarch"
}
}
],
"category": "architecture",
"name": "noarch"
},
{
"branches": [
{
"category": "product_version",
"name": "cluster-md-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"product": {
"name": "cluster-md-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"product_id": "cluster-md-kmp-rt-6.4.0-150600.10.61.1.x86_64"
}
},
{
"category": "product_version",
"name": "dlm-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"product": {
"name": "dlm-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"product_id": "dlm-kmp-rt-6.4.0-150600.10.61.1.x86_64"
}
},
{
"category": "product_version",
"name": "gfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"product": {
"name": "gfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"product_id": "gfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-livepatch-6_4_0-150600_10_61-rt-1-150600.1.3.1.x86_64",
"product": {
"name": "kernel-livepatch-6_4_0-150600_10_61-rt-1-150600.1.3.1.x86_64",
"product_id": "kernel-livepatch-6_4_0-150600_10_61-rt-1-150600.1.3.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-rt-6.4.0-150600.10.61.1.x86_64",
"product": {
"name": "kernel-rt-6.4.0-150600.10.61.1.x86_64",
"product_id": "kernel-rt-6.4.0-150600.10.61.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-rt-devel-6.4.0-150600.10.61.1.x86_64",
"product": {
"name": "kernel-rt-devel-6.4.0-150600.10.61.1.x86_64",
"product_id": "kernel-rt-devel-6.4.0-150600.10.61.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-rt-extra-6.4.0-150600.10.61.1.x86_64",
"product": {
"name": "kernel-rt-extra-6.4.0-150600.10.61.1.x86_64",
"product_id": "kernel-rt-extra-6.4.0-150600.10.61.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-rt-livepatch-6.4.0-150600.10.61.1.x86_64",
"product": {
"name": "kernel-rt-livepatch-6.4.0-150600.10.61.1.x86_64",
"product_id": "kernel-rt-livepatch-6.4.0-150600.10.61.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-rt-livepatch-devel-6.4.0-150600.10.61.1.x86_64",
"product": {
"name": "kernel-rt-livepatch-devel-6.4.0-150600.10.61.1.x86_64",
"product_id": "kernel-rt-livepatch-devel-6.4.0-150600.10.61.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-rt-optional-6.4.0-150600.10.61.1.x86_64",
"product": {
"name": "kernel-rt-optional-6.4.0-150600.10.61.1.x86_64",
"product_id": "kernel-rt-optional-6.4.0-150600.10.61.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-rt-vdso-6.4.0-150600.10.61.1.x86_64",
"product": {
"name": "kernel-rt-vdso-6.4.0-150600.10.61.1.x86_64",
"product_id": "kernel-rt-vdso-6.4.0-150600.10.61.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-rt_debug-6.4.0-150600.10.61.1.x86_64",
"product": {
"name": "kernel-rt_debug-6.4.0-150600.10.61.1.x86_64",
"product_id": "kernel-rt_debug-6.4.0-150600.10.61.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-rt_debug-devel-6.4.0-150600.10.61.1.x86_64",
"product": {
"name": "kernel-rt_debug-devel-6.4.0-150600.10.61.1.x86_64",
"product_id": "kernel-rt_debug-devel-6.4.0-150600.10.61.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-rt_debug-vdso-6.4.0-150600.10.61.1.x86_64",
"product": {
"name": "kernel-rt_debug-vdso-6.4.0-150600.10.61.1.x86_64",
"product_id": "kernel-rt_debug-vdso-6.4.0-150600.10.61.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-syms-rt-6.4.0-150600.10.61.1.x86_64",
"product": {
"name": "kernel-syms-rt-6.4.0-150600.10.61.1.x86_64",
"product_id": "kernel-syms-rt-6.4.0-150600.10.61.1.x86_64"
}
},
{
"category": "product_version",
"name": "kselftests-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"product": {
"name": "kselftests-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"product_id": "kselftests-kmp-rt-6.4.0-150600.10.61.1.x86_64"
}
},
{
"category": "product_version",
"name": "ocfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"product": {
"name": "ocfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"product_id": "ocfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64"
}
},
{
"category": "product_version",
"name": "reiserfs-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"product": {
"name": "reiserfs-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"product_id": "reiserfs-kmp-rt-6.4.0-150600.10.61.1.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "SUSE Linux Enterprise Live Patching 15 SP6",
"product": {
"name": "SUSE Linux Enterprise Live Patching 15 SP6",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP6",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-module-live-patching:15:sp6"
}
}
},
{
"category": "product_name",
"name": "SUSE Real Time Module 15 SP6",
"product": {
"name": "SUSE Real Time Module 15 SP6",
"product_id": "SUSE Real Time Module 15 SP6",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-module-rt:15:sp6"
}
}
},
{
"category": "product_name",
"name": "openSUSE Leap 15.6",
"product": {
"name": "openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6",
"product_identification_helper": {
"cpe": "cpe:/o:opensuse:leap:15.6"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-6_4_0-150600_10_61-rt-1-150600.1.3.1.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP6",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_10_61-rt-1-150600.1.3.1.x86_64"
},
"product_reference": "kernel-livepatch-6_4_0-150600_10_61-rt-1-150600.1.3.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cluster-md-kmp-rt-6.4.0-150600.10.61.1.x86_64 as component of SUSE Real Time Module 15 SP6",
"product_id": "SUSE Real Time Module 15 SP6:cluster-md-kmp-rt-6.4.0-150600.10.61.1.x86_64"
},
"product_reference": "cluster-md-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"relates_to_product_reference": "SUSE Real Time Module 15 SP6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dlm-kmp-rt-6.4.0-150600.10.61.1.x86_64 as component of SUSE Real Time Module 15 SP6",
"product_id": "SUSE Real Time Module 15 SP6:dlm-kmp-rt-6.4.0-150600.10.61.1.x86_64"
},
"product_reference": "dlm-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"relates_to_product_reference": "SUSE Real Time Module 15 SP6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64 as component of SUSE Real Time Module 15 SP6",
"product_id": "SUSE Real Time Module 15 SP6:gfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64"
},
"product_reference": "gfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"relates_to_product_reference": "SUSE Real Time Module 15 SP6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-rt-6.4.0-150600.10.61.1.noarch as component of SUSE Real Time Module 15 SP6",
"product_id": "SUSE Real Time Module 15 SP6:kernel-devel-rt-6.4.0-150600.10.61.1.noarch"
},
"product_reference": "kernel-devel-rt-6.4.0-150600.10.61.1.noarch",
"relates_to_product_reference": "SUSE Real Time Module 15 SP6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-6.4.0-150600.10.61.1.x86_64 as component of SUSE Real Time Module 15 SP6",
"product_id": "SUSE Real Time Module 15 SP6:kernel-rt-6.4.0-150600.10.61.1.x86_64"
},
"product_reference": "kernel-rt-6.4.0-150600.10.61.1.x86_64",
"relates_to_product_reference": "SUSE Real Time Module 15 SP6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-devel-6.4.0-150600.10.61.1.x86_64 as component of SUSE Real Time Module 15 SP6",
"product_id": "SUSE Real Time Module 15 SP6:kernel-rt-devel-6.4.0-150600.10.61.1.x86_64"
},
"product_reference": "kernel-rt-devel-6.4.0-150600.10.61.1.x86_64",
"relates_to_product_reference": "SUSE Real Time Module 15 SP6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt_debug-6.4.0-150600.10.61.1.x86_64 as component of SUSE Real Time Module 15 SP6",
"product_id": "SUSE Real Time Module 15 SP6:kernel-rt_debug-6.4.0-150600.10.61.1.x86_64"
},
"product_reference": "kernel-rt_debug-6.4.0-150600.10.61.1.x86_64",
"relates_to_product_reference": "SUSE Real Time Module 15 SP6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt_debug-devel-6.4.0-150600.10.61.1.x86_64 as component of SUSE Real Time Module 15 SP6",
"product_id": "SUSE Real Time Module 15 SP6:kernel-rt_debug-devel-6.4.0-150600.10.61.1.x86_64"
},
"product_reference": "kernel-rt_debug-devel-6.4.0-150600.10.61.1.x86_64",
"relates_to_product_reference": "SUSE Real Time Module 15 SP6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-source-rt-6.4.0-150600.10.61.1.noarch as component of SUSE Real Time Module 15 SP6",
"product_id": "SUSE Real Time Module 15 SP6:kernel-source-rt-6.4.0-150600.10.61.1.noarch"
},
"product_reference": "kernel-source-rt-6.4.0-150600.10.61.1.noarch",
"relates_to_product_reference": "SUSE Real Time Module 15 SP6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-rt-6.4.0-150600.10.61.1.x86_64 as component of SUSE Real Time Module 15 SP6",
"product_id": "SUSE Real Time Module 15 SP6:kernel-syms-rt-6.4.0-150600.10.61.1.x86_64"
},
"product_reference": "kernel-syms-rt-6.4.0-150600.10.61.1.x86_64",
"relates_to_product_reference": "SUSE Real Time Module 15 SP6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ocfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64 as component of SUSE Real Time Module 15 SP6",
"product_id": "SUSE Real Time Module 15 SP6:ocfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64"
},
"product_reference": "ocfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"relates_to_product_reference": "SUSE Real Time Module 15 SP6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cluster-md-kmp-rt-6.4.0-150600.10.61.1.x86_64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:cluster-md-kmp-rt-6.4.0-150600.10.61.1.x86_64"
},
"product_reference": "cluster-md-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dlm-kmp-rt-6.4.0-150600.10.61.1.x86_64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:dlm-kmp-rt-6.4.0-150600.10.61.1.x86_64"
},
"product_reference": "dlm-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:gfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64"
},
"product_reference": "gfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-rt-6.4.0-150600.10.61.1.noarch as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:kernel-devel-rt-6.4.0-150600.10.61.1.noarch"
},
"product_reference": "kernel-devel-rt-6.4.0-150600.10.61.1.noarch",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-6.4.0-150600.10.61.1.x86_64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:kernel-rt-6.4.0-150600.10.61.1.x86_64"
},
"product_reference": "kernel-rt-6.4.0-150600.10.61.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-devel-6.4.0-150600.10.61.1.x86_64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:kernel-rt-devel-6.4.0-150600.10.61.1.x86_64"
},
"product_reference": "kernel-rt-devel-6.4.0-150600.10.61.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-extra-6.4.0-150600.10.61.1.x86_64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:kernel-rt-extra-6.4.0-150600.10.61.1.x86_64"
},
"product_reference": "kernel-rt-extra-6.4.0-150600.10.61.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-livepatch-devel-6.4.0-150600.10.61.1.x86_64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:kernel-rt-livepatch-devel-6.4.0-150600.10.61.1.x86_64"
},
"product_reference": "kernel-rt-livepatch-devel-6.4.0-150600.10.61.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-optional-6.4.0-150600.10.61.1.x86_64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:kernel-rt-optional-6.4.0-150600.10.61.1.x86_64"
},
"product_reference": "kernel-rt-optional-6.4.0-150600.10.61.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-vdso-6.4.0-150600.10.61.1.x86_64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:kernel-rt-vdso-6.4.0-150600.10.61.1.x86_64"
},
"product_reference": "kernel-rt-vdso-6.4.0-150600.10.61.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt_debug-6.4.0-150600.10.61.1.x86_64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:kernel-rt_debug-6.4.0-150600.10.61.1.x86_64"
},
"product_reference": "kernel-rt_debug-6.4.0-150600.10.61.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt_debug-devel-6.4.0-150600.10.61.1.x86_64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:kernel-rt_debug-devel-6.4.0-150600.10.61.1.x86_64"
},
"product_reference": "kernel-rt_debug-devel-6.4.0-150600.10.61.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt_debug-vdso-6.4.0-150600.10.61.1.x86_64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:kernel-rt_debug-vdso-6.4.0-150600.10.61.1.x86_64"
},
"product_reference": "kernel-rt_debug-vdso-6.4.0-150600.10.61.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-source-rt-6.4.0-150600.10.61.1.noarch as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:kernel-source-rt-6.4.0-150600.10.61.1.noarch"
},
"product_reference": "kernel-source-rt-6.4.0-150600.10.61.1.noarch",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-rt-6.4.0-150600.10.61.1.x86_64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:kernel-syms-rt-6.4.0-150600.10.61.1.x86_64"
},
"product_reference": "kernel-syms-rt-6.4.0-150600.10.61.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kselftests-kmp-rt-6.4.0-150600.10.61.1.x86_64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:kselftests-kmp-rt-6.4.0-150600.10.61.1.x86_64"
},
"product_reference": "kselftests-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ocfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:ocfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64"
},
"product_reference": "ocfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "reiserfs-kmp-rt-6.4.0-150600.10.61.1.x86_64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:reiserfs-kmp-rt-6.4.0-150600.10.61.1.x86_64"
},
"product_reference": "reiserfs-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.6"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2022-50253",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-50253"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nbpf: make sure skb-\u003elen != 0 when redirecting to a tunneling device\n\nsyzkaller managed to trigger another case where skb-\u003elen == 0\nwhen we enter __dev_queue_xmit:\n\nWARNING: CPU: 0 PID: 2470 at include/linux/skbuff.h:2576 skb_assert_len include/linux/skbuff.h:2576 [inline]\nWARNING: CPU: 0 PID: 2470 at include/linux/skbuff.h:2576 __dev_queue_xmit+0x2069/0x35e0 net/core/dev.c:4295\n\nCall Trace:\n dev_queue_xmit+0x17/0x20 net/core/dev.c:4406\n __bpf_tx_skb net/core/filter.c:2115 [inline]\n __bpf_redirect_no_mac net/core/filter.c:2140 [inline]\n __bpf_redirect+0x5fb/0xda0 net/core/filter.c:2163\n ____bpf_clone_redirect net/core/filter.c:2447 [inline]\n bpf_clone_redirect+0x247/0x390 net/core/filter.c:2419\n bpf_prog_48159a89cb4a9a16+0x59/0x5e\n bpf_dispatcher_nop_func include/linux/bpf.h:897 [inline]\n __bpf_prog_run include/linux/filter.h:596 [inline]\n bpf_prog_run include/linux/filter.h:603 [inline]\n bpf_test_run+0x46c/0x890 net/bpf/test_run.c:402\n bpf_prog_test_run_skb+0xbdc/0x14c0 net/bpf/test_run.c:1170\n bpf_prog_test_run+0x345/0x3c0 kernel/bpf/syscall.c:3648\n __sys_bpf+0x43a/0x6c0 kernel/bpf/syscall.c:5005\n __do_sys_bpf kernel/bpf/syscall.c:5091 [inline]\n __se_sys_bpf kernel/bpf/syscall.c:5089 [inline]\n __x64_sys_bpf+0x7c/0x90 kernel/bpf/syscall.c:5089\n do_syscall_64+0x54/0x70 arch/x86/entry/common.c:48\n entry_SYSCALL_64_after_hwframe+0x61/0xc6\n\nThe reproducer doesn\u0027t really reproduce outside of syzkaller\nenvironment, so I\u0027m taking a guess here. It looks like we\ndo generate correct ETH_HLEN-sized packet, but we redirect\nthe packet to the tunneling device. Before we do so, we\n__skb_pull l2 header and arrive again at skb-\u003elen == 0.\nDoesn\u0027t seem like we can do anything better than having\nan explicit check after __skb_pull?",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_10_61-rt-1-150600.1.3.1.x86_64",
"SUSE Real Time Module 15 SP6:cluster-md-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:dlm-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:gfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-devel-rt-6.4.0-150600.10.61.1.noarch",
"SUSE Real Time Module 15 SP6:kernel-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-rt-devel-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-rt_debug-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-rt_debug-devel-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-source-rt-6.4.0-150600.10.61.1.noarch",
"SUSE Real Time Module 15 SP6:kernel-syms-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:ocfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:gfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-rt-6.4.0-150600.10.61.1.noarch",
"openSUSE Leap 15.6:kernel-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-devel-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-extra-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-livepatch-devel-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-optional-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-vdso-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt_debug-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt_debug-devel-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt_debug-vdso-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-source-rt-6.4.0-150600.10.61.1.noarch",
"openSUSE Leap 15.6:kernel-syms-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kselftests-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-rt-6.4.0-150600.10.61.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-50253",
"url": "https://www.suse.com/security/cve/CVE-2022-50253"
},
{
"category": "external",
"summary": "SUSE Bug 1249912 for CVE-2022-50253",
"url": "https://bugzilla.suse.com/1249912"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_10_61-rt-1-150600.1.3.1.x86_64",
"SUSE Real Time Module 15 SP6:cluster-md-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:dlm-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:gfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-devel-rt-6.4.0-150600.10.61.1.noarch",
"SUSE Real Time Module 15 SP6:kernel-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-rt-devel-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-rt_debug-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-rt_debug-devel-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-source-rt-6.4.0-150600.10.61.1.noarch",
"SUSE Real Time Module 15 SP6:kernel-syms-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:ocfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:gfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-rt-6.4.0-150600.10.61.1.noarch",
"openSUSE Leap 15.6:kernel-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-devel-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-extra-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-livepatch-devel-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-optional-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-vdso-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt_debug-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt_debug-devel-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt_debug-vdso-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-source-rt-6.4.0-150600.10.61.1.noarch",
"openSUSE Leap 15.6:kernel-syms-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kselftests-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-rt-6.4.0-150600.10.61.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_10_61-rt-1-150600.1.3.1.x86_64",
"SUSE Real Time Module 15 SP6:cluster-md-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:dlm-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:gfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-devel-rt-6.4.0-150600.10.61.1.noarch",
"SUSE Real Time Module 15 SP6:kernel-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-rt-devel-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-rt_debug-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-rt_debug-devel-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-source-rt-6.4.0-150600.10.61.1.noarch",
"SUSE Real Time Module 15 SP6:kernel-syms-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:ocfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:gfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-rt-6.4.0-150600.10.61.1.noarch",
"openSUSE Leap 15.6:kernel-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-devel-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-extra-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-livepatch-devel-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-optional-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-vdso-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt_debug-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt_debug-devel-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt_debug-vdso-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-source-rt-6.4.0-150600.10.61.1.noarch",
"openSUSE Leap 15.6:kernel-syms-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kselftests-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-rt-6.4.0-150600.10.61.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-24T12:42:49Z",
"details": "moderate"
}
],
"title": "CVE-2022-50253"
},
{
"cve": "CVE-2023-53676",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2023-53676"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nscsi: target: iscsi: Fix buffer overflow in lio_target_nacl_info_show()\n\nThe function lio_target_nacl_info_show() uses sprintf() in a loop to print\ndetails for every iSCSI connection in a session without checking for the\nbuffer length. With enough iSCSI connections it\u0027s possible to overflow the\nbuffer provided by configfs and corrupt the memory.\n\nThis patch replaces sprintf() with sysfs_emit_at() that checks for buffer\nboundries.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_10_61-rt-1-150600.1.3.1.x86_64",
"SUSE Real Time Module 15 SP6:cluster-md-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:dlm-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:gfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-devel-rt-6.4.0-150600.10.61.1.noarch",
"SUSE Real Time Module 15 SP6:kernel-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-rt-devel-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-rt_debug-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-rt_debug-devel-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-source-rt-6.4.0-150600.10.61.1.noarch",
"SUSE Real Time Module 15 SP6:kernel-syms-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:ocfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:gfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-rt-6.4.0-150600.10.61.1.noarch",
"openSUSE Leap 15.6:kernel-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-devel-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-extra-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-livepatch-devel-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-optional-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-vdso-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt_debug-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt_debug-devel-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt_debug-vdso-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-source-rt-6.4.0-150600.10.61.1.noarch",
"openSUSE Leap 15.6:kernel-syms-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kselftests-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-rt-6.4.0-150600.10.61.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2023-53676",
"url": "https://www.suse.com/security/cve/CVE-2023-53676"
},
{
"category": "external",
"summary": "SUSE Bug 1251786 for CVE-2023-53676",
"url": "https://bugzilla.suse.com/1251786"
},
{
"category": "external",
"summary": "SUSE Bug 1251787 for CVE-2023-53676",
"url": "https://bugzilla.suse.com/1251787"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_10_61-rt-1-150600.1.3.1.x86_64",
"SUSE Real Time Module 15 SP6:cluster-md-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:dlm-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:gfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-devel-rt-6.4.0-150600.10.61.1.noarch",
"SUSE Real Time Module 15 SP6:kernel-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-rt-devel-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-rt_debug-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-rt_debug-devel-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-source-rt-6.4.0-150600.10.61.1.noarch",
"SUSE Real Time Module 15 SP6:kernel-syms-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:ocfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:gfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-rt-6.4.0-150600.10.61.1.noarch",
"openSUSE Leap 15.6:kernel-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-devel-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-extra-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-livepatch-devel-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-optional-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-vdso-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt_debug-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt_debug-devel-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt_debug-vdso-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-source-rt-6.4.0-150600.10.61.1.noarch",
"openSUSE Leap 15.6:kernel-syms-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kselftests-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-rt-6.4.0-150600.10.61.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_10_61-rt-1-150600.1.3.1.x86_64",
"SUSE Real Time Module 15 SP6:cluster-md-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:dlm-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:gfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-devel-rt-6.4.0-150600.10.61.1.noarch",
"SUSE Real Time Module 15 SP6:kernel-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-rt-devel-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-rt_debug-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-rt_debug-devel-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-source-rt-6.4.0-150600.10.61.1.noarch",
"SUSE Real Time Module 15 SP6:kernel-syms-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:ocfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:gfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-rt-6.4.0-150600.10.61.1.noarch",
"openSUSE Leap 15.6:kernel-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-devel-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-extra-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-livepatch-devel-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-optional-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-vdso-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt_debug-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt_debug-devel-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt_debug-vdso-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-source-rt-6.4.0-150600.10.61.1.noarch",
"openSUSE Leap 15.6:kernel-syms-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kselftests-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-rt-6.4.0-150600.10.61.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-24T12:42:49Z",
"details": "important"
}
],
"title": "CVE-2023-53676"
},
{
"cve": "CVE-2025-21710",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-21710"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\ntcp: correct handling of extreme memory squeeze\n\nTesting with iperf3 using the \"pasta\" protocol splicer has revealed\na problem in the way tcp handles window advertising in extreme memory\nsqueeze situations.\n\nUnder memory pressure, a socket endpoint may temporarily advertise\na zero-sized window, but this is not stored as part of the socket data.\nThe reasoning behind this is that it is considered a temporary setting\nwhich shouldn\u0027t influence any further calculations.\n\nHowever, if we happen to stall at an unfortunate value of the current\nwindow size, the algorithm selecting a new value will consistently fail\nto advertise a non-zero window once we have freed up enough memory.\nThis means that this side\u0027s notion of the current window size is\ndifferent from the one last advertised to the peer, causing the latter\nto not send any data to resolve the sitution.\n\nThe problem occurs on the iperf3 server side, and the socket in question\nis a completely regular socket with the default settings for the\nfedora40 kernel. We do not use SO_PEEK or SO_RCVBUF on the socket.\n\nThe following excerpt of a logging session, with own comments added,\nshows more in detail what is happening:\n\n// tcp_v4_rcv(-\u003e)\n// tcp_rcv_established(-\u003e)\n[5201\u003c-\u003e39222]: ==== Activating log @ net/ipv4/tcp_input.c/tcp_data_queue()/5257 ====\n[5201\u003c-\u003e39222]: tcp_data_queue(-\u003e)\n[5201\u003c-\u003e39222]: DROPPING skb [265600160..265665640], reason: SKB_DROP_REASON_PROTO_MEM\n [rcv_nxt 265600160, rcv_wnd 262144, snt_ack 265469200, win_now 131184]\n [copied_seq 259909392-\u003e260034360 (124968), unread 5565800, qlen 85, ofoq 0]\n [OFO queue: gap: 65480, len: 0]\n[5201\u003c-\u003e39222]: tcp_data_queue(\u003c-)\n[5201\u003c-\u003e39222]: __tcp_transmit_skb(-\u003e)\n [tp-\u003ercv_wup: 265469200, tp-\u003ercv_wnd: 262144, tp-\u003ercv_nxt 265600160]\n[5201\u003c-\u003e39222]: tcp_select_window(-\u003e)\n[5201\u003c-\u003e39222]: (inet_csk(sk)-\u003eicsk_ack.pending \u0026 ICSK_ACK_NOMEM) ? --\u003e TRUE\n [tp-\u003ercv_wup: 265469200, tp-\u003ercv_wnd: 262144, tp-\u003ercv_nxt 265600160]\n returning 0\n[5201\u003c-\u003e39222]: tcp_select_window(\u003c-)\n[5201\u003c-\u003e39222]: ADVERTISING WIN 0, ACK_SEQ: 265600160\n[5201\u003c-\u003e39222]: [__tcp_transmit_skb(\u003c-)\n[5201\u003c-\u003e39222]: tcp_rcv_established(\u003c-)\n[5201\u003c-\u003e39222]: tcp_v4_rcv(\u003c-)\n\n// Receive queue is at 85 buffers and we are out of memory.\n// We drop the incoming buffer, although it is in sequence, and decide\n// to send an advertisement with a window of zero.\n// We don\u0027t update tp-\u003ercv_wnd and tp-\u003ercv_wup accordingly, which means\n// we unconditionally shrink the window.\n\n[5201\u003c-\u003e39222]: tcp_recvmsg_locked(-\u003e)\n[5201\u003c-\u003e39222]: __tcp_cleanup_rbuf(-\u003e) tp-\u003ercv_wup: 265469200, tp-\u003ercv_wnd: 262144, tp-\u003ercv_nxt 265600160\n[5201\u003c-\u003e39222]: [new_win = 0, win_now = 131184, 2 * win_now = 262368]\n[5201\u003c-\u003e39222]: [new_win \u003e= (2 * win_now) ? --\u003e time_to_ack = 0]\n[5201\u003c-\u003e39222]: NOT calling tcp_send_ack()\n [tp-\u003ercv_wup: 265469200, tp-\u003ercv_wnd: 262144, tp-\u003ercv_nxt 265600160]\n[5201\u003c-\u003e39222]: __tcp_cleanup_rbuf(\u003c-)\n [rcv_nxt 265600160, rcv_wnd 262144, snt_ack 265469200, win_now 131184]\n [copied_seq 260040464-\u003e260040464 (0), unread 5559696, qlen 85, ofoq 0]\n returning 6104 bytes\n[5201\u003c-\u003e39222]: tcp_recvmsg_locked(\u003c-)\n\n// After each read, the algorithm for calculating the new receive\n// window in __tcp_cleanup_rbuf() finds it is too small to advertise\n// or to update tp-\u003ercv_wnd.\n// Meanwhile, the peer thinks the window is zero, and will not send\n// any more data to trigger an update from the interrupt mode side.\n\n[5201\u003c-\u003e39222]: tcp_recvmsg_locked(-\u003e)\n[5201\u003c-\u003e39222]: __tcp_cleanup_rbuf(-\u003e) tp-\u003ercv_wup: 265469200, tp-\u003ercv_wnd: 262144, tp-\u003ercv_nxt 265600160\n[5201\u003c-\u003e39222]: [new_win = 262144, win_now = 131184, 2 * win_n\n---truncated---",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_10_61-rt-1-150600.1.3.1.x86_64",
"SUSE Real Time Module 15 SP6:cluster-md-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:dlm-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:gfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-devel-rt-6.4.0-150600.10.61.1.noarch",
"SUSE Real Time Module 15 SP6:kernel-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-rt-devel-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-rt_debug-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-rt_debug-devel-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-source-rt-6.4.0-150600.10.61.1.noarch",
"SUSE Real Time Module 15 SP6:kernel-syms-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:ocfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:gfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-rt-6.4.0-150600.10.61.1.noarch",
"openSUSE Leap 15.6:kernel-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-devel-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-extra-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-livepatch-devel-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-optional-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-vdso-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt_debug-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt_debug-devel-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt_debug-vdso-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-source-rt-6.4.0-150600.10.61.1.noarch",
"openSUSE Leap 15.6:kernel-syms-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kselftests-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-rt-6.4.0-150600.10.61.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-21710",
"url": "https://www.suse.com/security/cve/CVE-2025-21710"
},
{
"category": "external",
"summary": "SUSE Bug 1237888 for CVE-2025-21710",
"url": "https://bugzilla.suse.com/1237888"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_10_61-rt-1-150600.1.3.1.x86_64",
"SUSE Real Time Module 15 SP6:cluster-md-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:dlm-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:gfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-devel-rt-6.4.0-150600.10.61.1.noarch",
"SUSE Real Time Module 15 SP6:kernel-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-rt-devel-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-rt_debug-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-rt_debug-devel-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-source-rt-6.4.0-150600.10.61.1.noarch",
"SUSE Real Time Module 15 SP6:kernel-syms-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:ocfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:gfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-rt-6.4.0-150600.10.61.1.noarch",
"openSUSE Leap 15.6:kernel-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-devel-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-extra-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-livepatch-devel-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-optional-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-vdso-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt_debug-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt_debug-devel-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt_debug-vdso-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-source-rt-6.4.0-150600.10.61.1.noarch",
"openSUSE Leap 15.6:kernel-syms-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kselftests-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-rt-6.4.0-150600.10.61.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_10_61-rt-1-150600.1.3.1.x86_64",
"SUSE Real Time Module 15 SP6:cluster-md-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:dlm-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:gfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-devel-rt-6.4.0-150600.10.61.1.noarch",
"SUSE Real Time Module 15 SP6:kernel-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-rt-devel-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-rt_debug-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-rt_debug-devel-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-source-rt-6.4.0-150600.10.61.1.noarch",
"SUSE Real Time Module 15 SP6:kernel-syms-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:ocfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:gfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-rt-6.4.0-150600.10.61.1.noarch",
"openSUSE Leap 15.6:kernel-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-devel-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-extra-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-livepatch-devel-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-optional-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-vdso-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt_debug-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt_debug-devel-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt_debug-vdso-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-source-rt-6.4.0-150600.10.61.1.noarch",
"openSUSE Leap 15.6:kernel-syms-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kselftests-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-rt-6.4.0-150600.10.61.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-24T12:42:49Z",
"details": "moderate"
}
],
"title": "CVE-2025-21710"
},
{
"cve": "CVE-2025-37916",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-37916"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\npds_core: remove write-after-free of client_id\n\nA use-after-free error popped up in stress testing:\n\n[Mon Apr 21 21:21:33 2025] BUG: KFENCE: use-after-free write in pdsc_auxbus_dev_del+0xef/0x160 [pds_core]\n[Mon Apr 21 21:21:33 2025] Use-after-free write at 0x000000007013ecd1 (in kfence-#47):\n[Mon Apr 21 21:21:33 2025] pdsc_auxbus_dev_del+0xef/0x160 [pds_core]\n[Mon Apr 21 21:21:33 2025] pdsc_remove+0xc0/0x1b0 [pds_core]\n[Mon Apr 21 21:21:33 2025] pci_device_remove+0x24/0x70\n[Mon Apr 21 21:21:33 2025] device_release_driver_internal+0x11f/0x180\n[Mon Apr 21 21:21:33 2025] driver_detach+0x45/0x80\n[Mon Apr 21 21:21:33 2025] bus_remove_driver+0x83/0xe0\n[Mon Apr 21 21:21:33 2025] pci_unregister_driver+0x1a/0x80\n\nThe actual device uninit usually happens on a separate thread\nscheduled after this code runs, but there is no guarantee of order\nof thread execution, so this could be a problem. There\u0027s no\nactual need to clear the client_id at this point, so simply\nremove the offending code.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_10_61-rt-1-150600.1.3.1.x86_64",
"SUSE Real Time Module 15 SP6:cluster-md-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:dlm-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:gfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-devel-rt-6.4.0-150600.10.61.1.noarch",
"SUSE Real Time Module 15 SP6:kernel-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-rt-devel-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-rt_debug-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-rt_debug-devel-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-source-rt-6.4.0-150600.10.61.1.noarch",
"SUSE Real Time Module 15 SP6:kernel-syms-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:ocfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:gfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-rt-6.4.0-150600.10.61.1.noarch",
"openSUSE Leap 15.6:kernel-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-devel-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-extra-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-livepatch-devel-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-optional-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-vdso-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt_debug-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt_debug-devel-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt_debug-vdso-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-source-rt-6.4.0-150600.10.61.1.noarch",
"openSUSE Leap 15.6:kernel-syms-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kselftests-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-rt-6.4.0-150600.10.61.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-37916",
"url": "https://www.suse.com/security/cve/CVE-2025-37916"
},
{
"category": "external",
"summary": "SUSE Bug 1243474 for CVE-2025-37916",
"url": "https://bugzilla.suse.com/1243474"
},
{
"category": "external",
"summary": "SUSE Bug 1243535 for CVE-2025-37916",
"url": "https://bugzilla.suse.com/1243535"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_10_61-rt-1-150600.1.3.1.x86_64",
"SUSE Real Time Module 15 SP6:cluster-md-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:dlm-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:gfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-devel-rt-6.4.0-150600.10.61.1.noarch",
"SUSE Real Time Module 15 SP6:kernel-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-rt-devel-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-rt_debug-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-rt_debug-devel-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-source-rt-6.4.0-150600.10.61.1.noarch",
"SUSE Real Time Module 15 SP6:kernel-syms-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:ocfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:gfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-rt-6.4.0-150600.10.61.1.noarch",
"openSUSE Leap 15.6:kernel-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-devel-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-extra-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-livepatch-devel-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-optional-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-vdso-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt_debug-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt_debug-devel-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt_debug-vdso-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-source-rt-6.4.0-150600.10.61.1.noarch",
"openSUSE Leap 15.6:kernel-syms-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kselftests-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-rt-6.4.0-150600.10.61.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_10_61-rt-1-150600.1.3.1.x86_64",
"SUSE Real Time Module 15 SP6:cluster-md-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:dlm-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:gfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-devel-rt-6.4.0-150600.10.61.1.noarch",
"SUSE Real Time Module 15 SP6:kernel-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-rt-devel-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-rt_debug-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-rt_debug-devel-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-source-rt-6.4.0-150600.10.61.1.noarch",
"SUSE Real Time Module 15 SP6:kernel-syms-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:ocfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:gfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-rt-6.4.0-150600.10.61.1.noarch",
"openSUSE Leap 15.6:kernel-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-devel-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-extra-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-livepatch-devel-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-optional-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-vdso-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt_debug-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt_debug-devel-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt_debug-vdso-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-source-rt-6.4.0-150600.10.61.1.noarch",
"openSUSE Leap 15.6:kernel-syms-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kselftests-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-rt-6.4.0-150600.10.61.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-24T12:42:49Z",
"details": "moderate"
}
],
"title": "CVE-2025-37916"
},
{
"cve": "CVE-2025-38359",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-38359"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\ns390/mm: Fix in_atomic() handling in do_secure_storage_access()\n\nKernel user spaces accesses to not exported pages in atomic context\nincorrectly try to resolve the page fault.\nWith debug options enabled call traces like this can be seen:\n\nBUG: sleeping function called from invalid context at kernel/locking/rwsem.c:1523\nin_atomic(): 1, irqs_disabled(): 0, non_block: 0, pid: 419074, name: qemu-system-s39\npreempt_count: 1, expected: 0\nRCU nest depth: 0, expected: 0\nINFO: lockdep is turned off.\nPreemption disabled at:\n[\u003c00000383ea47cfa2\u003e] copy_page_from_iter_atomic+0xa2/0x8a0\nCPU: 12 UID: 0 PID: 419074 Comm: qemu-system-s39\nTainted: G W 6.16.0-20250531.rc0.git0.69b3a602feac.63.fc42.s390x+debug #1 PREEMPT\nTainted: [W]=WARN\nHardware name: IBM 3931 A01 703 (LPAR)\nCall Trace:\n [\u003c00000383e990d282\u003e] dump_stack_lvl+0xa2/0xe8\n [\u003c00000383e99bf152\u003e] __might_resched+0x292/0x2d0\n [\u003c00000383eaa7c374\u003e] down_read+0x34/0x2d0\n [\u003c00000383e99432f8\u003e] do_secure_storage_access+0x108/0x360\n [\u003c00000383eaa724b0\u003e] __do_pgm_check+0x130/0x220\n [\u003c00000383eaa842e4\u003e] pgm_check_handler+0x114/0x160\n [\u003c00000383ea47d028\u003e] copy_page_from_iter_atomic+0x128/0x8a0\n([\u003c00000383ea47d016\u003e] copy_page_from_iter_atomic+0x116/0x8a0)\n [\u003c00000383e9c45eae\u003e] generic_perform_write+0x16e/0x310\n [\u003c00000383e9eb87f4\u003e] ext4_buffered_write_iter+0x84/0x160\n [\u003c00000383e9da0de4\u003e] vfs_write+0x1c4/0x460\n [\u003c00000383e9da123c\u003e] ksys_write+0x7c/0x100\n [\u003c00000383eaa7284e\u003e] __do_syscall+0x15e/0x280\n [\u003c00000383eaa8417e\u003e] system_call+0x6e/0x90\nINFO: lockdep is turned off.\n\nIt is not allowed to take the mmap_lock while in atomic context. Therefore\nhandle such a secure storage access fault as if the accessed page is not\nmapped: the uaccess function will return -EFAULT, and the caller has to\ndeal with this. Usually this means that the access is retried in process\ncontext, which allows to resolve the page fault (or in this case export the\npage).",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_10_61-rt-1-150600.1.3.1.x86_64",
"SUSE Real Time Module 15 SP6:cluster-md-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:dlm-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:gfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-devel-rt-6.4.0-150600.10.61.1.noarch",
"SUSE Real Time Module 15 SP6:kernel-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-rt-devel-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-rt_debug-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-rt_debug-devel-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-source-rt-6.4.0-150600.10.61.1.noarch",
"SUSE Real Time Module 15 SP6:kernel-syms-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:ocfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:gfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-rt-6.4.0-150600.10.61.1.noarch",
"openSUSE Leap 15.6:kernel-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-devel-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-extra-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-livepatch-devel-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-optional-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-vdso-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt_debug-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt_debug-devel-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt_debug-vdso-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-source-rt-6.4.0-150600.10.61.1.noarch",
"openSUSE Leap 15.6:kernel-syms-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kselftests-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-rt-6.4.0-150600.10.61.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-38359",
"url": "https://www.suse.com/security/cve/CVE-2025-38359"
},
{
"category": "external",
"summary": "SUSE Bug 1247076 for CVE-2025-38359",
"url": "https://bugzilla.suse.com/1247076"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_10_61-rt-1-150600.1.3.1.x86_64",
"SUSE Real Time Module 15 SP6:cluster-md-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:dlm-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:gfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-devel-rt-6.4.0-150600.10.61.1.noarch",
"SUSE Real Time Module 15 SP6:kernel-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-rt-devel-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-rt_debug-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-rt_debug-devel-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-source-rt-6.4.0-150600.10.61.1.noarch",
"SUSE Real Time Module 15 SP6:kernel-syms-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:ocfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:gfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-rt-6.4.0-150600.10.61.1.noarch",
"openSUSE Leap 15.6:kernel-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-devel-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-extra-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-livepatch-devel-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-optional-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-vdso-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt_debug-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt_debug-devel-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt_debug-vdso-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-source-rt-6.4.0-150600.10.61.1.noarch",
"openSUSE Leap 15.6:kernel-syms-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kselftests-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-rt-6.4.0-150600.10.61.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_10_61-rt-1-150600.1.3.1.x86_64",
"SUSE Real Time Module 15 SP6:cluster-md-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:dlm-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:gfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-devel-rt-6.4.0-150600.10.61.1.noarch",
"SUSE Real Time Module 15 SP6:kernel-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-rt-devel-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-rt_debug-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-rt_debug-devel-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-source-rt-6.4.0-150600.10.61.1.noarch",
"SUSE Real Time Module 15 SP6:kernel-syms-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:ocfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:gfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-rt-6.4.0-150600.10.61.1.noarch",
"openSUSE Leap 15.6:kernel-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-devel-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-extra-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-livepatch-devel-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-optional-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-vdso-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt_debug-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt_debug-devel-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt_debug-vdso-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-source-rt-6.4.0-150600.10.61.1.noarch",
"openSUSE Leap 15.6:kernel-syms-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kselftests-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-rt-6.4.0-150600.10.61.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-24T12:42:49Z",
"details": "moderate"
}
],
"title": "CVE-2025-38359"
},
{
"cve": "CVE-2025-38361",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-38361"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\ndrm/amd/display: Check dce_hwseq before dereferencing it\n\n[WHAT]\n\nhws was checked for null earlier in dce110_blank_stream, indicating hws\ncan be null, and should be checked whenever it is used.\n\n(cherry picked from commit 79db43611ff61280b6de58ce1305e0b2ecf675ad)",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_10_61-rt-1-150600.1.3.1.x86_64",
"SUSE Real Time Module 15 SP6:cluster-md-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:dlm-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:gfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-devel-rt-6.4.0-150600.10.61.1.noarch",
"SUSE Real Time Module 15 SP6:kernel-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-rt-devel-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-rt_debug-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-rt_debug-devel-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-source-rt-6.4.0-150600.10.61.1.noarch",
"SUSE Real Time Module 15 SP6:kernel-syms-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:ocfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:gfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-rt-6.4.0-150600.10.61.1.noarch",
"openSUSE Leap 15.6:kernel-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-devel-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-extra-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-livepatch-devel-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-optional-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-vdso-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt_debug-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt_debug-devel-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt_debug-vdso-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-source-rt-6.4.0-150600.10.61.1.noarch",
"openSUSE Leap 15.6:kernel-syms-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kselftests-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-rt-6.4.0-150600.10.61.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-38361",
"url": "https://www.suse.com/security/cve/CVE-2025-38361"
},
{
"category": "external",
"summary": "SUSE Bug 1247079 for CVE-2025-38361",
"url": "https://bugzilla.suse.com/1247079"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_10_61-rt-1-150600.1.3.1.x86_64",
"SUSE Real Time Module 15 SP6:cluster-md-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:dlm-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:gfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-devel-rt-6.4.0-150600.10.61.1.noarch",
"SUSE Real Time Module 15 SP6:kernel-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-rt-devel-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-rt_debug-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-rt_debug-devel-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-source-rt-6.4.0-150600.10.61.1.noarch",
"SUSE Real Time Module 15 SP6:kernel-syms-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:ocfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:gfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-rt-6.4.0-150600.10.61.1.noarch",
"openSUSE Leap 15.6:kernel-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-devel-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-extra-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-livepatch-devel-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-optional-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-vdso-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt_debug-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt_debug-devel-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt_debug-vdso-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-source-rt-6.4.0-150600.10.61.1.noarch",
"openSUSE Leap 15.6:kernel-syms-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kselftests-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-rt-6.4.0-150600.10.61.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_10_61-rt-1-150600.1.3.1.x86_64",
"SUSE Real Time Module 15 SP6:cluster-md-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:dlm-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:gfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-devel-rt-6.4.0-150600.10.61.1.noarch",
"SUSE Real Time Module 15 SP6:kernel-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-rt-devel-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-rt_debug-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-rt_debug-devel-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-source-rt-6.4.0-150600.10.61.1.noarch",
"SUSE Real Time Module 15 SP6:kernel-syms-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:ocfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:gfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-rt-6.4.0-150600.10.61.1.noarch",
"openSUSE Leap 15.6:kernel-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-devel-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-extra-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-livepatch-devel-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-optional-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-vdso-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt_debug-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt_debug-devel-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt_debug-vdso-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-source-rt-6.4.0-150600.10.61.1.noarch",
"openSUSE Leap 15.6:kernel-syms-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kselftests-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-rt-6.4.0-150600.10.61.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-24T12:42:49Z",
"details": "moderate"
}
],
"title": "CVE-2025-38361"
},
{
"cve": "CVE-2025-39788",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-39788"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nscsi: ufs: exynos: Fix programming of HCI_UTRL_NEXUS_TYPE\n\nOn Google gs101, the number of UTP transfer request slots (nutrs) is 32,\nand in this case the driver ends up programming the UTRL_NEXUS_TYPE\nincorrectly as 0.\n\nThis is because the left hand side of the shift is 1, which is of type\nint, i.e. 31 bits wide. Shifting by more than that width results in\nundefined behaviour.\n\nFix this by switching to the BIT() macro, which applies correct type\ncasting as required. This ensures the correct value is written to\nUTRL_NEXUS_TYPE (0xffffffff on gs101), and it also fixes a UBSAN shift\nwarning:\n\n UBSAN: shift-out-of-bounds in drivers/ufs/host/ufs-exynos.c:1113:21\n shift exponent 32 is too large for 32-bit type \u0027int\u0027\n\nFor consistency, apply the same change to the nutmrs / UTMRL_NEXUS_TYPE\nwrite.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_10_61-rt-1-150600.1.3.1.x86_64",
"SUSE Real Time Module 15 SP6:cluster-md-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:dlm-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:gfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-devel-rt-6.4.0-150600.10.61.1.noarch",
"SUSE Real Time Module 15 SP6:kernel-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-rt-devel-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-rt_debug-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-rt_debug-devel-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-source-rt-6.4.0-150600.10.61.1.noarch",
"SUSE Real Time Module 15 SP6:kernel-syms-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:ocfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:gfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-rt-6.4.0-150600.10.61.1.noarch",
"openSUSE Leap 15.6:kernel-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-devel-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-extra-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-livepatch-devel-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-optional-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-vdso-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt_debug-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt_debug-devel-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt_debug-vdso-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-source-rt-6.4.0-150600.10.61.1.noarch",
"openSUSE Leap 15.6:kernel-syms-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kselftests-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-rt-6.4.0-150600.10.61.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-39788",
"url": "https://www.suse.com/security/cve/CVE-2025-39788"
},
{
"category": "external",
"summary": "SUSE Bug 1249547 for CVE-2025-39788",
"url": "https://bugzilla.suse.com/1249547"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_10_61-rt-1-150600.1.3.1.x86_64",
"SUSE Real Time Module 15 SP6:cluster-md-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:dlm-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:gfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-devel-rt-6.4.0-150600.10.61.1.noarch",
"SUSE Real Time Module 15 SP6:kernel-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-rt-devel-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-rt_debug-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-rt_debug-devel-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-source-rt-6.4.0-150600.10.61.1.noarch",
"SUSE Real Time Module 15 SP6:kernel-syms-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:ocfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:gfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-rt-6.4.0-150600.10.61.1.noarch",
"openSUSE Leap 15.6:kernel-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-devel-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-extra-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-livepatch-devel-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-optional-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-vdso-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt_debug-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt_debug-devel-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt_debug-vdso-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-source-rt-6.4.0-150600.10.61.1.noarch",
"openSUSE Leap 15.6:kernel-syms-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kselftests-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-rt-6.4.0-150600.10.61.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_10_61-rt-1-150600.1.3.1.x86_64",
"SUSE Real Time Module 15 SP6:cluster-md-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:dlm-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:gfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-devel-rt-6.4.0-150600.10.61.1.noarch",
"SUSE Real Time Module 15 SP6:kernel-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-rt-devel-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-rt_debug-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-rt_debug-devel-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-source-rt-6.4.0-150600.10.61.1.noarch",
"SUSE Real Time Module 15 SP6:kernel-syms-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:ocfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:gfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-rt-6.4.0-150600.10.61.1.noarch",
"openSUSE Leap 15.6:kernel-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-devel-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-extra-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-livepatch-devel-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-optional-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-vdso-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt_debug-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt_debug-devel-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt_debug-vdso-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-source-rt-6.4.0-150600.10.61.1.noarch",
"openSUSE Leap 15.6:kernel-syms-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kselftests-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-rt-6.4.0-150600.10.61.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-24T12:42:49Z",
"details": "moderate"
}
],
"title": "CVE-2025-39788"
},
{
"cve": "CVE-2025-39805",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-39805"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnet: macb: fix unregister_netdev call order in macb_remove()\n\nWhen removing a macb device, the driver calls phy_exit() before\nunregister_netdev(). This leads to a WARN from kernfs:\n\n ------------[ cut here ]------------\n kernfs: can not remove \u0027attached_dev\u0027, no directory\n WARNING: CPU: 1 PID: 27146 at fs/kernfs/dir.c:1683\n Call trace:\n kernfs_remove_by_name_ns+0xd8/0xf0\n sysfs_remove_link+0x24/0x58\n phy_detach+0x5c/0x168\n phy_disconnect+0x4c/0x70\n phylink_disconnect_phy+0x6c/0xc0 [phylink]\n macb_close+0x6c/0x170 [macb]\n ...\n macb_remove+0x60/0x168 [macb]\n platform_remove+0x5c/0x80\n ...\n\nThe warning happens because the PHY is being exited while the netdev\nis still registered. The correct order is to unregister the netdev\nbefore shutting down the PHY and cleaning up the MDIO bus.\n\nFix this by moving unregister_netdev() ahead of phy_exit() in\nmacb_remove().",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_10_61-rt-1-150600.1.3.1.x86_64",
"SUSE Real Time Module 15 SP6:cluster-md-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:dlm-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:gfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-devel-rt-6.4.0-150600.10.61.1.noarch",
"SUSE Real Time Module 15 SP6:kernel-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-rt-devel-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-rt_debug-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-rt_debug-devel-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-source-rt-6.4.0-150600.10.61.1.noarch",
"SUSE Real Time Module 15 SP6:kernel-syms-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:ocfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:gfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-rt-6.4.0-150600.10.61.1.noarch",
"openSUSE Leap 15.6:kernel-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-devel-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-extra-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-livepatch-devel-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-optional-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-vdso-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt_debug-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt_debug-devel-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt_debug-vdso-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-source-rt-6.4.0-150600.10.61.1.noarch",
"openSUSE Leap 15.6:kernel-syms-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kselftests-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-rt-6.4.0-150600.10.61.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-39805",
"url": "https://www.suse.com/security/cve/CVE-2025-39805"
},
{
"category": "external",
"summary": "SUSE Bug 1249982 for CVE-2025-39805",
"url": "https://bugzilla.suse.com/1249982"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_10_61-rt-1-150600.1.3.1.x86_64",
"SUSE Real Time Module 15 SP6:cluster-md-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:dlm-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:gfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-devel-rt-6.4.0-150600.10.61.1.noarch",
"SUSE Real Time Module 15 SP6:kernel-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-rt-devel-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-rt_debug-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-rt_debug-devel-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-source-rt-6.4.0-150600.10.61.1.noarch",
"SUSE Real Time Module 15 SP6:kernel-syms-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:ocfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:gfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-rt-6.4.0-150600.10.61.1.noarch",
"openSUSE Leap 15.6:kernel-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-devel-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-extra-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-livepatch-devel-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-optional-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-vdso-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt_debug-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt_debug-devel-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt_debug-vdso-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-source-rt-6.4.0-150600.10.61.1.noarch",
"openSUSE Leap 15.6:kernel-syms-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kselftests-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-rt-6.4.0-150600.10.61.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_10_61-rt-1-150600.1.3.1.x86_64",
"SUSE Real Time Module 15 SP6:cluster-md-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:dlm-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:gfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-devel-rt-6.4.0-150600.10.61.1.noarch",
"SUSE Real Time Module 15 SP6:kernel-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-rt-devel-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-rt_debug-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-rt_debug-devel-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-source-rt-6.4.0-150600.10.61.1.noarch",
"SUSE Real Time Module 15 SP6:kernel-syms-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:ocfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:gfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-rt-6.4.0-150600.10.61.1.noarch",
"openSUSE Leap 15.6:kernel-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-devel-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-extra-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-livepatch-devel-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-optional-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-vdso-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt_debug-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt_debug-devel-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt_debug-vdso-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-source-rt-6.4.0-150600.10.61.1.noarch",
"openSUSE Leap 15.6:kernel-syms-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kselftests-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-rt-6.4.0-150600.10.61.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-24T12:42:49Z",
"details": "moderate"
}
],
"title": "CVE-2025-39805"
},
{
"cve": "CVE-2025-39819",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-39819"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nfs/smb: Fix inconsistent refcnt update\n\nA possible inconsistent update of refcount was identified in `smb2_compound_op`.\nSuch inconsistent update could lead to possible resource leaks.\n\nWhy it is a possible bug:\n1. In the comment section of the function, it clearly states that the\nreference to `cfile` should be dropped after calling this function.\n2. Every control flow path would check and drop the reference to\n`cfile`, except the patched one.\n3. Existing callers would not handle refcount update of `cfile` if\n-ENOMEM is returned.\n\nTo fix the bug, an extra goto label \"out\" is added, to make sure that the\ncleanup logic would always be respected. As the problem is caused by the\nallocation failure of `vars`, the cleanup logic between label \"finished\"\nand \"out\" can be safely ignored. According to the definition of function\n`is_replayable_error`, the error code of \"-ENOMEM\" is not recoverable.\nTherefore, the replay logic also gets ignored.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_10_61-rt-1-150600.1.3.1.x86_64",
"SUSE Real Time Module 15 SP6:cluster-md-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:dlm-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:gfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-devel-rt-6.4.0-150600.10.61.1.noarch",
"SUSE Real Time Module 15 SP6:kernel-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-rt-devel-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-rt_debug-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-rt_debug-devel-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-source-rt-6.4.0-150600.10.61.1.noarch",
"SUSE Real Time Module 15 SP6:kernel-syms-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:ocfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:gfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-rt-6.4.0-150600.10.61.1.noarch",
"openSUSE Leap 15.6:kernel-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-devel-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-extra-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-livepatch-devel-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-optional-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-vdso-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt_debug-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt_debug-devel-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt_debug-vdso-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-source-rt-6.4.0-150600.10.61.1.noarch",
"openSUSE Leap 15.6:kernel-syms-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kselftests-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-rt-6.4.0-150600.10.61.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-39819",
"url": "https://www.suse.com/security/cve/CVE-2025-39819"
},
{
"category": "external",
"summary": "SUSE Bug 1250176 for CVE-2025-39819",
"url": "https://bugzilla.suse.com/1250176"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_10_61-rt-1-150600.1.3.1.x86_64",
"SUSE Real Time Module 15 SP6:cluster-md-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:dlm-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:gfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-devel-rt-6.4.0-150600.10.61.1.noarch",
"SUSE Real Time Module 15 SP6:kernel-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-rt-devel-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-rt_debug-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-rt_debug-devel-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-source-rt-6.4.0-150600.10.61.1.noarch",
"SUSE Real Time Module 15 SP6:kernel-syms-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:ocfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:gfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-rt-6.4.0-150600.10.61.1.noarch",
"openSUSE Leap 15.6:kernel-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-devel-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-extra-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-livepatch-devel-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-optional-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-vdso-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt_debug-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt_debug-devel-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt_debug-vdso-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-source-rt-6.4.0-150600.10.61.1.noarch",
"openSUSE Leap 15.6:kernel-syms-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kselftests-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-rt-6.4.0-150600.10.61.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_10_61-rt-1-150600.1.3.1.x86_64",
"SUSE Real Time Module 15 SP6:cluster-md-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:dlm-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:gfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-devel-rt-6.4.0-150600.10.61.1.noarch",
"SUSE Real Time Module 15 SP6:kernel-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-rt-devel-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-rt_debug-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-rt_debug-devel-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-source-rt-6.4.0-150600.10.61.1.noarch",
"SUSE Real Time Module 15 SP6:kernel-syms-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:ocfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:gfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-rt-6.4.0-150600.10.61.1.noarch",
"openSUSE Leap 15.6:kernel-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-devel-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-extra-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-livepatch-devel-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-optional-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-vdso-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt_debug-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt_debug-devel-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt_debug-vdso-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-source-rt-6.4.0-150600.10.61.1.noarch",
"openSUSE Leap 15.6:kernel-syms-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kselftests-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-rt-6.4.0-150600.10.61.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-24T12:42:49Z",
"details": "moderate"
}
],
"title": "CVE-2025-39819"
},
{
"cve": "CVE-2025-39859",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-39859"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nptp: ocp: fix use-after-free bugs causing by ptp_ocp_watchdog\n\nThe ptp_ocp_detach() only shuts down the watchdog timer if it is\npending. However, if the timer handler is already running, the\ntimer_delete_sync() is not called. This leads to race conditions\nwhere the devlink that contains the ptp_ocp is deallocated while\nthe timer handler is still accessing it, resulting in use-after-free\nbugs. The following details one of the race scenarios.\n\n(thread 1) | (thread 2)\nptp_ocp_remove() |\n ptp_ocp_detach() | ptp_ocp_watchdog()\n if (timer_pending(\u0026bp-\u003ewatchdog))| bp = timer_container_of()\n timer_delete_sync() |\n |\n devlink_free(devlink) //free |\n | bp-\u003e //use\n\nResolve this by unconditionally calling timer_delete_sync() to ensure\nthe timer is reliably deactivated, preventing any access after free.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_10_61-rt-1-150600.1.3.1.x86_64",
"SUSE Real Time Module 15 SP6:cluster-md-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:dlm-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:gfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-devel-rt-6.4.0-150600.10.61.1.noarch",
"SUSE Real Time Module 15 SP6:kernel-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-rt-devel-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-rt_debug-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-rt_debug-devel-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-source-rt-6.4.0-150600.10.61.1.noarch",
"SUSE Real Time Module 15 SP6:kernel-syms-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:ocfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:gfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-rt-6.4.0-150600.10.61.1.noarch",
"openSUSE Leap 15.6:kernel-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-devel-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-extra-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-livepatch-devel-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-optional-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-vdso-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt_debug-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt_debug-devel-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt_debug-vdso-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-source-rt-6.4.0-150600.10.61.1.noarch",
"openSUSE Leap 15.6:kernel-syms-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kselftests-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-rt-6.4.0-150600.10.61.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-39859",
"url": "https://www.suse.com/security/cve/CVE-2025-39859"
},
{
"category": "external",
"summary": "SUSE Bug 1250252 for CVE-2025-39859",
"url": "https://bugzilla.suse.com/1250252"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_10_61-rt-1-150600.1.3.1.x86_64",
"SUSE Real Time Module 15 SP6:cluster-md-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:dlm-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:gfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-devel-rt-6.4.0-150600.10.61.1.noarch",
"SUSE Real Time Module 15 SP6:kernel-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-rt-devel-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-rt_debug-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-rt_debug-devel-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-source-rt-6.4.0-150600.10.61.1.noarch",
"SUSE Real Time Module 15 SP6:kernel-syms-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:ocfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:gfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-rt-6.4.0-150600.10.61.1.noarch",
"openSUSE Leap 15.6:kernel-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-devel-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-extra-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-livepatch-devel-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-optional-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-vdso-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt_debug-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt_debug-devel-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt_debug-vdso-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-source-rt-6.4.0-150600.10.61.1.noarch",
"openSUSE Leap 15.6:kernel-syms-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kselftests-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-rt-6.4.0-150600.10.61.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_10_61-rt-1-150600.1.3.1.x86_64",
"SUSE Real Time Module 15 SP6:cluster-md-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:dlm-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:gfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-devel-rt-6.4.0-150600.10.61.1.noarch",
"SUSE Real Time Module 15 SP6:kernel-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-rt-devel-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-rt_debug-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-rt_debug-devel-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-source-rt-6.4.0-150600.10.61.1.noarch",
"SUSE Real Time Module 15 SP6:kernel-syms-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:ocfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:gfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-rt-6.4.0-150600.10.61.1.noarch",
"openSUSE Leap 15.6:kernel-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-devel-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-extra-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-livepatch-devel-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-optional-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-vdso-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt_debug-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt_debug-devel-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt_debug-vdso-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-source-rt-6.4.0-150600.10.61.1.noarch",
"openSUSE Leap 15.6:kernel-syms-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kselftests-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-rt-6.4.0-150600.10.61.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-24T12:42:49Z",
"details": "moderate"
}
],
"title": "CVE-2025-39859"
},
{
"cve": "CVE-2025-39944",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-39944"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nocteontx2-pf: Fix use-after-free bugs in otx2_sync_tstamp()\n\nThe original code relies on cancel_delayed_work() in otx2_ptp_destroy(),\nwhich does not ensure that the delayed work item synctstamp_work has fully\ncompleted if it was already running. This leads to use-after-free scenarios\nwhere otx2_ptp is deallocated by otx2_ptp_destroy(), while synctstamp_work\nremains active and attempts to dereference otx2_ptp in otx2_sync_tstamp().\nFurthermore, the synctstamp_work is cyclic, the likelihood of triggering\nthe bug is nonnegligible.\n\nA typical race condition is illustrated below:\n\nCPU 0 (cleanup) | CPU 1 (delayed work callback)\notx2_remove() |\n otx2_ptp_destroy() | otx2_sync_tstamp()\n cancel_delayed_work() |\n kfree(ptp) |\n | ptp = container_of(...); //UAF\n | ptp-\u003e //UAF\n\nThis is confirmed by a KASAN report:\n\nBUG: KASAN: slab-use-after-free in __run_timer_base.part.0+0x7d7/0x8c0\nWrite of size 8 at addr ffff88800aa09a18 by task bash/136\n...\nCall Trace:\n \u003cIRQ\u003e\n dump_stack_lvl+0x55/0x70\n print_report+0xcf/0x610\n ? __run_timer_base.part.0+0x7d7/0x8c0\n kasan_report+0xb8/0xf0\n ? __run_timer_base.part.0+0x7d7/0x8c0\n __run_timer_base.part.0+0x7d7/0x8c0\n ? __pfx___run_timer_base.part.0+0x10/0x10\n ? __pfx_read_tsc+0x10/0x10\n ? ktime_get+0x60/0x140\n ? lapic_next_event+0x11/0x20\n ? clockevents_program_event+0x1d4/0x2a0\n run_timer_softirq+0xd1/0x190\n handle_softirqs+0x16a/0x550\n irq_exit_rcu+0xaf/0xe0\n sysvec_apic_timer_interrupt+0x70/0x80\n \u003c/IRQ\u003e\n...\nAllocated by task 1:\n kasan_save_stack+0x24/0x50\n kasan_save_track+0x14/0x30\n __kasan_kmalloc+0x7f/0x90\n otx2_ptp_init+0xb1/0x860\n otx2_probe+0x4eb/0xc30\n local_pci_probe+0xdc/0x190\n pci_device_probe+0x2fe/0x470\n really_probe+0x1ca/0x5c0\n __driver_probe_device+0x248/0x310\n driver_probe_device+0x44/0x120\n __driver_attach+0xd2/0x310\n bus_for_each_dev+0xed/0x170\n bus_add_driver+0x208/0x500\n driver_register+0x132/0x460\n do_one_initcall+0x89/0x300\n kernel_init_freeable+0x40d/0x720\n kernel_init+0x1a/0x150\n ret_from_fork+0x10c/0x1a0\n ret_from_fork_asm+0x1a/0x30\n\nFreed by task 136:\n kasan_save_stack+0x24/0x50\n kasan_save_track+0x14/0x30\n kasan_save_free_info+0x3a/0x60\n __kasan_slab_free+0x3f/0x50\n kfree+0x137/0x370\n otx2_ptp_destroy+0x38/0x80\n otx2_remove+0x10d/0x4c0\n pci_device_remove+0xa6/0x1d0\n device_release_driver_internal+0xf8/0x210\n pci_stop_bus_device+0x105/0x150\n pci_stop_and_remove_bus_device_locked+0x15/0x30\n remove_store+0xcc/0xe0\n kernfs_fop_write_iter+0x2c3/0x440\n vfs_write+0x871/0xd70\n ksys_write+0xee/0x1c0\n do_syscall_64+0xac/0x280\n entry_SYSCALL_64_after_hwframe+0x77/0x7f\n...\n\nReplace cancel_delayed_work() with cancel_delayed_work_sync() to ensure\nthat the delayed work item is properly canceled before the otx2_ptp is\ndeallocated.\n\nThis bug was initially identified through static analysis. To reproduce\nand test it, I simulated the OcteonTX2 PCI device in QEMU and introduced\nartificial delays within the otx2_sync_tstamp() function to increase the\nlikelihood of triggering the bug.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_10_61-rt-1-150600.1.3.1.x86_64",
"SUSE Real Time Module 15 SP6:cluster-md-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:dlm-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:gfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-devel-rt-6.4.0-150600.10.61.1.noarch",
"SUSE Real Time Module 15 SP6:kernel-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-rt-devel-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-rt_debug-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-rt_debug-devel-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-source-rt-6.4.0-150600.10.61.1.noarch",
"SUSE Real Time Module 15 SP6:kernel-syms-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:ocfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:gfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-rt-6.4.0-150600.10.61.1.noarch",
"openSUSE Leap 15.6:kernel-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-devel-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-extra-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-livepatch-devel-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-optional-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-vdso-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt_debug-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt_debug-devel-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt_debug-vdso-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-source-rt-6.4.0-150600.10.61.1.noarch",
"openSUSE Leap 15.6:kernel-syms-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kselftests-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-rt-6.4.0-150600.10.61.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-39944",
"url": "https://www.suse.com/security/cve/CVE-2025-39944"
},
{
"category": "external",
"summary": "SUSE Bug 1251120 for CVE-2025-39944",
"url": "https://bugzilla.suse.com/1251120"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_10_61-rt-1-150600.1.3.1.x86_64",
"SUSE Real Time Module 15 SP6:cluster-md-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:dlm-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:gfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-devel-rt-6.4.0-150600.10.61.1.noarch",
"SUSE Real Time Module 15 SP6:kernel-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-rt-devel-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-rt_debug-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-rt_debug-devel-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-source-rt-6.4.0-150600.10.61.1.noarch",
"SUSE Real Time Module 15 SP6:kernel-syms-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:ocfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:gfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-rt-6.4.0-150600.10.61.1.noarch",
"openSUSE Leap 15.6:kernel-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-devel-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-extra-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-livepatch-devel-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-optional-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-vdso-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt_debug-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt_debug-devel-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt_debug-vdso-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-source-rt-6.4.0-150600.10.61.1.noarch",
"openSUSE Leap 15.6:kernel-syms-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kselftests-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-rt-6.4.0-150600.10.61.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_10_61-rt-1-150600.1.3.1.x86_64",
"SUSE Real Time Module 15 SP6:cluster-md-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:dlm-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:gfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-devel-rt-6.4.0-150600.10.61.1.noarch",
"SUSE Real Time Module 15 SP6:kernel-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-rt-devel-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-rt_debug-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-rt_debug-devel-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-source-rt-6.4.0-150600.10.61.1.noarch",
"SUSE Real Time Module 15 SP6:kernel-syms-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:ocfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:gfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-rt-6.4.0-150600.10.61.1.noarch",
"openSUSE Leap 15.6:kernel-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-devel-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-extra-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-livepatch-devel-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-optional-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-vdso-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt_debug-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt_debug-devel-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt_debug-vdso-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-source-rt-6.4.0-150600.10.61.1.noarch",
"openSUSE Leap 15.6:kernel-syms-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kselftests-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-rt-6.4.0-150600.10.61.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-24T12:42:49Z",
"details": "moderate"
}
],
"title": "CVE-2025-39944"
},
{
"cve": "CVE-2025-39980",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-39980"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnexthop: Forbid FDB status change while nexthop is in a group\n\nThe kernel forbids the creation of non-FDB nexthop groups with FDB\nnexthops:\n\n # ip nexthop add id 1 via 192.0.2.1 fdb\n # ip nexthop add id 2 group 1\n Error: Non FDB nexthop group cannot have fdb nexthops.\n\nAnd vice versa:\n\n # ip nexthop add id 3 via 192.0.2.2 dev dummy1\n # ip nexthop add id 4 group 3 fdb\n Error: FDB nexthop group can only have fdb nexthops.\n\nHowever, as long as no routes are pointing to a non-FDB nexthop group,\nthe kernel allows changing the type of a nexthop from FDB to non-FDB and\nvice versa:\n\n # ip nexthop add id 5 via 192.0.2.2 dev dummy1\n # ip nexthop add id 6 group 5\n # ip nexthop replace id 5 via 192.0.2.2 fdb\n # echo $?\n 0\n\nThis configuration is invalid and can result in a NPD [1] since FDB\nnexthops are not associated with a nexthop device:\n\n # ip route add 198.51.100.1/32 nhid 6\n # ping 198.51.100.1\n\nFix by preventing nexthop FDB status change while the nexthop is in a\ngroup:\n\n # ip nexthop add id 7 via 192.0.2.2 dev dummy1\n # ip nexthop add id 8 group 7\n # ip nexthop replace id 7 via 192.0.2.2 fdb\n Error: Cannot change nexthop FDB status while in a group.\n\n[1]\nBUG: kernel NULL pointer dereference, address: 00000000000003c0\n[...]\nOops: Oops: 0000 [#1] SMP\nCPU: 6 UID: 0 PID: 367 Comm: ping Not tainted 6.17.0-rc6-virtme-gb65678cacc03 #1 PREEMPT(voluntary)\nHardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.17.0-4.fc41 04/01/2014\nRIP: 0010:fib_lookup_good_nhc+0x1e/0x80\n[...]\nCall Trace:\n \u003cTASK\u003e\n fib_table_lookup+0x541/0x650\n ip_route_output_key_hash_rcu+0x2ea/0x970\n ip_route_output_key_hash+0x55/0x80\n __ip4_datagram_connect+0x250/0x330\n udp_connect+0x2b/0x60\n __sys_connect+0x9c/0xd0\n __x64_sys_connect+0x18/0x20\n do_syscall_64+0xa4/0x2a0\n entry_SYSCALL_64_after_hwframe+0x4b/0x53",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_10_61-rt-1-150600.1.3.1.x86_64",
"SUSE Real Time Module 15 SP6:cluster-md-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:dlm-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:gfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-devel-rt-6.4.0-150600.10.61.1.noarch",
"SUSE Real Time Module 15 SP6:kernel-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-rt-devel-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-rt_debug-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-rt_debug-devel-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-source-rt-6.4.0-150600.10.61.1.noarch",
"SUSE Real Time Module 15 SP6:kernel-syms-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:ocfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:gfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-rt-6.4.0-150600.10.61.1.noarch",
"openSUSE Leap 15.6:kernel-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-devel-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-extra-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-livepatch-devel-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-optional-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-vdso-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt_debug-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt_debug-devel-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt_debug-vdso-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-source-rt-6.4.0-150600.10.61.1.noarch",
"openSUSE Leap 15.6:kernel-syms-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kselftests-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-rt-6.4.0-150600.10.61.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-39980",
"url": "https://www.suse.com/security/cve/CVE-2025-39980"
},
{
"category": "external",
"summary": "SUSE Bug 1252063 for CVE-2025-39980",
"url": "https://bugzilla.suse.com/1252063"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_10_61-rt-1-150600.1.3.1.x86_64",
"SUSE Real Time Module 15 SP6:cluster-md-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:dlm-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:gfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-devel-rt-6.4.0-150600.10.61.1.noarch",
"SUSE Real Time Module 15 SP6:kernel-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-rt-devel-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-rt_debug-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-rt_debug-devel-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-source-rt-6.4.0-150600.10.61.1.noarch",
"SUSE Real Time Module 15 SP6:kernel-syms-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:ocfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:gfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-rt-6.4.0-150600.10.61.1.noarch",
"openSUSE Leap 15.6:kernel-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-devel-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-extra-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-livepatch-devel-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-optional-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-vdso-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt_debug-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt_debug-devel-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt_debug-vdso-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-source-rt-6.4.0-150600.10.61.1.noarch",
"openSUSE Leap 15.6:kernel-syms-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kselftests-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-rt-6.4.0-150600.10.61.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_10_61-rt-1-150600.1.3.1.x86_64",
"SUSE Real Time Module 15 SP6:cluster-md-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:dlm-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:gfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-devel-rt-6.4.0-150600.10.61.1.noarch",
"SUSE Real Time Module 15 SP6:kernel-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-rt-devel-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-rt_debug-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-rt_debug-devel-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-source-rt-6.4.0-150600.10.61.1.noarch",
"SUSE Real Time Module 15 SP6:kernel-syms-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:ocfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:gfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-rt-6.4.0-150600.10.61.1.noarch",
"openSUSE Leap 15.6:kernel-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-devel-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-extra-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-livepatch-devel-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-optional-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-vdso-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt_debug-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt_debug-devel-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt_debug-vdso-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-source-rt-6.4.0-150600.10.61.1.noarch",
"openSUSE Leap 15.6:kernel-syms-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kselftests-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-rt-6.4.0-150600.10.61.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-24T12:42:49Z",
"details": "moderate"
}
],
"title": "CVE-2025-39980"
},
{
"cve": "CVE-2025-40001",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40001"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nscsi: mvsas: Fix use-after-free bugs in mvs_work_queue\n\nDuring the detaching of Marvell\u0027s SAS/SATA controller, the original code\ncalls cancel_delayed_work() in mvs_free() to cancel the delayed work\nitem mwq-\u003ework_q. However, if mwq-\u003ework_q is already running, the\ncancel_delayed_work() may fail to cancel it. This can lead to\nuse-after-free scenarios where mvs_free() frees the mvs_info while\nmvs_work_queue() is still executing and attempts to access the\nalready-freed mvs_info.\n\nA typical race condition is illustrated below:\n\nCPU 0 (remove) | CPU 1 (delayed work callback)\nmvs_pci_remove() |\n mvs_free() | mvs_work_queue()\n cancel_delayed_work() |\n kfree(mvi) |\n | mvi-\u003e // UAF\n\nReplace cancel_delayed_work() with cancel_delayed_work_sync() to ensure\nthat the delayed work item is properly canceled and any executing\ndelayed work item completes before the mvs_info is deallocated.\n\nThis bug was found by static analysis.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_10_61-rt-1-150600.1.3.1.x86_64",
"SUSE Real Time Module 15 SP6:cluster-md-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:dlm-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:gfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-devel-rt-6.4.0-150600.10.61.1.noarch",
"SUSE Real Time Module 15 SP6:kernel-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-rt-devel-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-rt_debug-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-rt_debug-devel-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-source-rt-6.4.0-150600.10.61.1.noarch",
"SUSE Real Time Module 15 SP6:kernel-syms-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:ocfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:gfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-rt-6.4.0-150600.10.61.1.noarch",
"openSUSE Leap 15.6:kernel-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-devel-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-extra-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-livepatch-devel-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-optional-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-vdso-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt_debug-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt_debug-devel-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt_debug-vdso-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-source-rt-6.4.0-150600.10.61.1.noarch",
"openSUSE Leap 15.6:kernel-syms-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kselftests-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-rt-6.4.0-150600.10.61.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40001",
"url": "https://www.suse.com/security/cve/CVE-2025-40001"
},
{
"category": "external",
"summary": "SUSE Bug 1252303 for CVE-2025-40001",
"url": "https://bugzilla.suse.com/1252303"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_10_61-rt-1-150600.1.3.1.x86_64",
"SUSE Real Time Module 15 SP6:cluster-md-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:dlm-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:gfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-devel-rt-6.4.0-150600.10.61.1.noarch",
"SUSE Real Time Module 15 SP6:kernel-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-rt-devel-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-rt_debug-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-rt_debug-devel-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-source-rt-6.4.0-150600.10.61.1.noarch",
"SUSE Real Time Module 15 SP6:kernel-syms-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:ocfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:gfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-rt-6.4.0-150600.10.61.1.noarch",
"openSUSE Leap 15.6:kernel-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-devel-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-extra-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-livepatch-devel-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-optional-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-vdso-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt_debug-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt_debug-devel-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt_debug-vdso-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-source-rt-6.4.0-150600.10.61.1.noarch",
"openSUSE Leap 15.6:kernel-syms-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kselftests-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-rt-6.4.0-150600.10.61.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.8,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_10_61-rt-1-150600.1.3.1.x86_64",
"SUSE Real Time Module 15 SP6:cluster-md-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:dlm-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:gfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-devel-rt-6.4.0-150600.10.61.1.noarch",
"SUSE Real Time Module 15 SP6:kernel-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-rt-devel-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-rt_debug-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-rt_debug-devel-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-source-rt-6.4.0-150600.10.61.1.noarch",
"SUSE Real Time Module 15 SP6:kernel-syms-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:ocfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:gfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-rt-6.4.0-150600.10.61.1.noarch",
"openSUSE Leap 15.6:kernel-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-devel-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-extra-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-livepatch-devel-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-optional-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-vdso-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt_debug-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt_debug-devel-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt_debug-vdso-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-source-rt-6.4.0-150600.10.61.1.noarch",
"openSUSE Leap 15.6:kernel-syms-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kselftests-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-rt-6.4.0-150600.10.61.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-24T12:42:49Z",
"details": "moderate"
}
],
"title": "CVE-2025-40001"
},
{
"cve": "CVE-2025-40021",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40021"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\ntracing: dynevent: Add a missing lockdown check on dynevent\n\nSince dynamic_events interface on tracefs is compatible with\nkprobe_events and uprobe_events, it should also check the lockdown\nstatus and reject if it is set.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_10_61-rt-1-150600.1.3.1.x86_64",
"SUSE Real Time Module 15 SP6:cluster-md-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:dlm-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:gfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-devel-rt-6.4.0-150600.10.61.1.noarch",
"SUSE Real Time Module 15 SP6:kernel-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-rt-devel-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-rt_debug-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-rt_debug-devel-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-source-rt-6.4.0-150600.10.61.1.noarch",
"SUSE Real Time Module 15 SP6:kernel-syms-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:ocfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:gfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-rt-6.4.0-150600.10.61.1.noarch",
"openSUSE Leap 15.6:kernel-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-devel-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-extra-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-livepatch-devel-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-optional-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-vdso-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt_debug-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt_debug-devel-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt_debug-vdso-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-source-rt-6.4.0-150600.10.61.1.noarch",
"openSUSE Leap 15.6:kernel-syms-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kselftests-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-rt-6.4.0-150600.10.61.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40021",
"url": "https://www.suse.com/security/cve/CVE-2025-40021"
},
{
"category": "external",
"summary": "SUSE Bug 1252681 for CVE-2025-40021",
"url": "https://bugzilla.suse.com/1252681"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_10_61-rt-1-150600.1.3.1.x86_64",
"SUSE Real Time Module 15 SP6:cluster-md-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:dlm-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:gfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-devel-rt-6.4.0-150600.10.61.1.noarch",
"SUSE Real Time Module 15 SP6:kernel-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-rt-devel-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-rt_debug-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-rt_debug-devel-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-source-rt-6.4.0-150600.10.61.1.noarch",
"SUSE Real Time Module 15 SP6:kernel-syms-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:ocfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:gfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-rt-6.4.0-150600.10.61.1.noarch",
"openSUSE Leap 15.6:kernel-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-devel-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-extra-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-livepatch-devel-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-optional-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-vdso-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt_debug-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt_debug-devel-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt_debug-vdso-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-source-rt-6.4.0-150600.10.61.1.noarch",
"openSUSE Leap 15.6:kernel-syms-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kselftests-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-rt-6.4.0-150600.10.61.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_10_61-rt-1-150600.1.3.1.x86_64",
"SUSE Real Time Module 15 SP6:cluster-md-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:dlm-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:gfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-devel-rt-6.4.0-150600.10.61.1.noarch",
"SUSE Real Time Module 15 SP6:kernel-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-rt-devel-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-rt_debug-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-rt_debug-devel-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-source-rt-6.4.0-150600.10.61.1.noarch",
"SUSE Real Time Module 15 SP6:kernel-syms-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:ocfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:gfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-rt-6.4.0-150600.10.61.1.noarch",
"openSUSE Leap 15.6:kernel-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-devel-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-extra-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-livepatch-devel-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-optional-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-vdso-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt_debug-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt_debug-devel-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt_debug-vdso-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-source-rt-6.4.0-150600.10.61.1.noarch",
"openSUSE Leap 15.6:kernel-syms-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kselftests-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-rt-6.4.0-150600.10.61.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-24T12:42:49Z",
"details": "moderate"
}
],
"title": "CVE-2025-40021"
},
{
"cve": "CVE-2025-40027",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40027"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnet/9p: fix double req put in p9_fd_cancelled\n\nSyzkaller reports a KASAN issue as below:\n\ngeneral protection fault, probably for non-canonical address 0xfbd59c0000000021: 0000 [#1] PREEMPT SMP KASAN NOPTI\nKASAN: maybe wild-memory-access in range [0xdead000000000108-0xdead00000000010f]\nCPU: 0 PID: 5083 Comm: syz-executor.2 Not tainted 6.1.134-syzkaller-00037-g855bd1d7d838 #0\nHardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014\nRIP: 0010:__list_del include/linux/list.h:114 [inline]\nRIP: 0010:__list_del_entry include/linux/list.h:137 [inline]\nRIP: 0010:list_del include/linux/list.h:148 [inline]\nRIP: 0010:p9_fd_cancelled+0xe9/0x200 net/9p/trans_fd.c:734\n\nCall Trace:\n \u003cTASK\u003e\n p9_client_flush+0x351/0x440 net/9p/client.c:614\n p9_client_rpc+0xb6b/0xc70 net/9p/client.c:734\n p9_client_version net/9p/client.c:920 [inline]\n p9_client_create+0xb51/0x1240 net/9p/client.c:1027\n v9fs_session_init+0x1f0/0x18f0 fs/9p/v9fs.c:408\n v9fs_mount+0xba/0xcb0 fs/9p/vfs_super.c:126\n legacy_get_tree+0x108/0x220 fs/fs_context.c:632\n vfs_get_tree+0x8e/0x300 fs/super.c:1573\n do_new_mount fs/namespace.c:3056 [inline]\n path_mount+0x6a6/0x1e90 fs/namespace.c:3386\n do_mount fs/namespace.c:3399 [inline]\n __do_sys_mount fs/namespace.c:3607 [inline]\n __se_sys_mount fs/namespace.c:3584 [inline]\n __x64_sys_mount+0x283/0x300 fs/namespace.c:3584\n do_syscall_x64 arch/x86/entry/common.c:51 [inline]\n do_syscall_64+0x35/0x80 arch/x86/entry/common.c:81\n entry_SYSCALL_64_after_hwframe+0x6e/0xd8\n\nThis happens because of a race condition between:\n\n- The 9p client sending an invalid flush request and later cleaning it up;\n- The 9p client in p9_read_work() canceled all pending requests.\n\n Thread 1 Thread 2\n ...\n p9_client_create()\n ...\n p9_fd_create()\n ...\n p9_conn_create()\n ...\n // start Thread 2\n INIT_WORK(\u0026m-\u003erq, p9_read_work);\n p9_read_work()\n ...\n p9_client_rpc()\n ...\n ...\n p9_conn_cancel()\n ...\n spin_lock(\u0026m-\u003ereq_lock);\n ...\n p9_fd_cancelled()\n ...\n ...\n spin_unlock(\u0026m-\u003ereq_lock);\n // status rewrite\n p9_client_cb(m-\u003eclient, req, REQ_STATUS_ERROR)\n // first remove\n list_del(\u0026req-\u003ereq_list);\n ...\n\n spin_lock(\u0026m-\u003ereq_lock)\n ...\n // second remove\n list_del(\u0026req-\u003ereq_list);\n spin_unlock(\u0026m-\u003ereq_lock)\n ...\n\nCommit 74d6a5d56629 (\"9p/trans_fd: Fix concurrency del of req_list in\np9_fd_cancelled/p9_read_work\") fixes a concurrency issue in the 9p filesystem\nclient where the req_list could be deleted simultaneously by both\np9_read_work and p9_fd_cancelled functions, but for the case where req-\u003estatus\nequals REQ_STATUS_RCVD.\n\nUpdate the check for req-\u003estatus in p9_fd_cancelled to skip processing not\njust received requests, but anything that is not SENT, as whatever\nchanged the state from SENT also removed the request from its list.\n\nFound by Linux Verification Center (linuxtesting.org) with Syzkaller.\n\n[updated the check from status == RECV || status == ERROR to status != SENT]",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_10_61-rt-1-150600.1.3.1.x86_64",
"SUSE Real Time Module 15 SP6:cluster-md-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:dlm-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:gfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-devel-rt-6.4.0-150600.10.61.1.noarch",
"SUSE Real Time Module 15 SP6:kernel-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-rt-devel-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-rt_debug-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-rt_debug-devel-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-source-rt-6.4.0-150600.10.61.1.noarch",
"SUSE Real Time Module 15 SP6:kernel-syms-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:ocfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:gfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-rt-6.4.0-150600.10.61.1.noarch",
"openSUSE Leap 15.6:kernel-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-devel-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-extra-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-livepatch-devel-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-optional-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-vdso-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt_debug-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt_debug-devel-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt_debug-vdso-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-source-rt-6.4.0-150600.10.61.1.noarch",
"openSUSE Leap 15.6:kernel-syms-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kselftests-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-rt-6.4.0-150600.10.61.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40027",
"url": "https://www.suse.com/security/cve/CVE-2025-40027"
},
{
"category": "external",
"summary": "SUSE Bug 1252763 for CVE-2025-40027",
"url": "https://bugzilla.suse.com/1252763"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_10_61-rt-1-150600.1.3.1.x86_64",
"SUSE Real Time Module 15 SP6:cluster-md-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:dlm-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:gfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-devel-rt-6.4.0-150600.10.61.1.noarch",
"SUSE Real Time Module 15 SP6:kernel-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-rt-devel-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-rt_debug-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-rt_debug-devel-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-source-rt-6.4.0-150600.10.61.1.noarch",
"SUSE Real Time Module 15 SP6:kernel-syms-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:ocfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:gfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-rt-6.4.0-150600.10.61.1.noarch",
"openSUSE Leap 15.6:kernel-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-devel-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-extra-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-livepatch-devel-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-optional-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-vdso-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt_debug-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt_debug-devel-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt_debug-vdso-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-source-rt-6.4.0-150600.10.61.1.noarch",
"openSUSE Leap 15.6:kernel-syms-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kselftests-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-rt-6.4.0-150600.10.61.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_10_61-rt-1-150600.1.3.1.x86_64",
"SUSE Real Time Module 15 SP6:cluster-md-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:dlm-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:gfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-devel-rt-6.4.0-150600.10.61.1.noarch",
"SUSE Real Time Module 15 SP6:kernel-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-rt-devel-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-rt_debug-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-rt_debug-devel-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-source-rt-6.4.0-150600.10.61.1.noarch",
"SUSE Real Time Module 15 SP6:kernel-syms-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:ocfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:gfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-rt-6.4.0-150600.10.61.1.noarch",
"openSUSE Leap 15.6:kernel-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-devel-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-extra-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-livepatch-devel-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-optional-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-vdso-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt_debug-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt_debug-devel-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt_debug-vdso-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-source-rt-6.4.0-150600.10.61.1.noarch",
"openSUSE Leap 15.6:kernel-syms-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kselftests-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-rt-6.4.0-150600.10.61.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-24T12:42:49Z",
"details": "moderate"
}
],
"title": "CVE-2025-40027"
},
{
"cve": "CVE-2025-40030",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40030"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\npinctrl: check the return value of pinmux_ops::get_function_name()\n\nWhile the API contract in docs doesn\u0027t specify it explicitly, the\ngeneric implementation of the get_function_name() callback from struct\npinmux_ops - pinmux_generic_get_function_name() - can fail and return\nNULL. This is already checked in pinmux_check_ops() so add a similar\ncheck in pinmux_func_name_to_selector() instead of passing the returned\npointer right down to strcmp() where the NULL can get dereferenced. This\nis normal operation when adding new pinfunctions.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_10_61-rt-1-150600.1.3.1.x86_64",
"SUSE Real Time Module 15 SP6:cluster-md-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:dlm-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:gfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-devel-rt-6.4.0-150600.10.61.1.noarch",
"SUSE Real Time Module 15 SP6:kernel-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-rt-devel-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-rt_debug-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-rt_debug-devel-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-source-rt-6.4.0-150600.10.61.1.noarch",
"SUSE Real Time Module 15 SP6:kernel-syms-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:ocfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:gfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-rt-6.4.0-150600.10.61.1.noarch",
"openSUSE Leap 15.6:kernel-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-devel-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-extra-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-livepatch-devel-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-optional-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-vdso-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt_debug-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt_debug-devel-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt_debug-vdso-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-source-rt-6.4.0-150600.10.61.1.noarch",
"openSUSE Leap 15.6:kernel-syms-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kselftests-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-rt-6.4.0-150600.10.61.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40030",
"url": "https://www.suse.com/security/cve/CVE-2025-40030"
},
{
"category": "external",
"summary": "SUSE Bug 1252773 for CVE-2025-40030",
"url": "https://bugzilla.suse.com/1252773"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_10_61-rt-1-150600.1.3.1.x86_64",
"SUSE Real Time Module 15 SP6:cluster-md-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:dlm-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:gfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-devel-rt-6.4.0-150600.10.61.1.noarch",
"SUSE Real Time Module 15 SP6:kernel-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-rt-devel-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-rt_debug-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-rt_debug-devel-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-source-rt-6.4.0-150600.10.61.1.noarch",
"SUSE Real Time Module 15 SP6:kernel-syms-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:ocfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:gfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-rt-6.4.0-150600.10.61.1.noarch",
"openSUSE Leap 15.6:kernel-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-devel-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-extra-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-livepatch-devel-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-optional-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-vdso-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt_debug-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt_debug-devel-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt_debug-vdso-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-source-rt-6.4.0-150600.10.61.1.noarch",
"openSUSE Leap 15.6:kernel-syms-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kselftests-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-rt-6.4.0-150600.10.61.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_10_61-rt-1-150600.1.3.1.x86_64",
"SUSE Real Time Module 15 SP6:cluster-md-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:dlm-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:gfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-devel-rt-6.4.0-150600.10.61.1.noarch",
"SUSE Real Time Module 15 SP6:kernel-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-rt-devel-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-rt_debug-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-rt_debug-devel-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-source-rt-6.4.0-150600.10.61.1.noarch",
"SUSE Real Time Module 15 SP6:kernel-syms-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:ocfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:gfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-rt-6.4.0-150600.10.61.1.noarch",
"openSUSE Leap 15.6:kernel-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-devel-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-extra-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-livepatch-devel-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-optional-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-vdso-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt_debug-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt_debug-devel-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt_debug-vdso-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-source-rt-6.4.0-150600.10.61.1.noarch",
"openSUSE Leap 15.6:kernel-syms-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kselftests-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-rt-6.4.0-150600.10.61.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-24T12:42:49Z",
"details": "moderate"
}
],
"title": "CVE-2025-40030"
},
{
"cve": "CVE-2025-40038",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40038"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nKVM: SVM: Skip fastpath emulation on VM-Exit if next RIP isn\u0027t valid\n\nSkip the WRMSR and HLT fastpaths in SVM\u0027s VM-Exit handler if the next RIP\nisn\u0027t valid, e.g. because KVM is running with nrips=false. SVM must\ndecode and emulate to skip the instruction if the CPU doesn\u0027t provide the\nnext RIP, and getting the instruction bytes to decode requires reading\nguest memory. Reading guest memory through the emulator can fault, i.e.\ncan sleep, which is disallowed since the fastpath handlers run with IRQs\ndisabled.\n\n BUG: sleeping function called from invalid context at ./include/linux/uaccess.h:106\n in_atomic(): 1, irqs_disabled(): 1, non_block: 0, pid: 32611, name: qemu\n preempt_count: 1, expected: 0\n INFO: lockdep is turned off.\n irq event stamp: 30580\n hardirqs last enabled at (30579): [\u003cffffffffc08b2527\u003e] vcpu_run+0x1787/0x1db0 [kvm]\n hardirqs last disabled at (30580): [\u003cffffffffb4f62e32\u003e] __schedule+0x1e2/0xed0\n softirqs last enabled at (30570): [\u003cffffffffb4247a64\u003e] fpu_swap_kvm_fpstate+0x44/0x210\n softirqs last disabled at (30568): [\u003cffffffffb4247a64\u003e] fpu_swap_kvm_fpstate+0x44/0x210\n CPU: 298 UID: 0 PID: 32611 Comm: qemu Tainted: G U 6.16.0-smp--e6c618b51cfe-sleep #782 NONE\n Tainted: [U]=USER\n Hardware name: Google Astoria-Turin/astoria, BIOS 0.20241223.2-0 01/17/2025\n Call Trace:\n \u003cTASK\u003e\n dump_stack_lvl+0x7d/0xb0\n __might_resched+0x271/0x290\n __might_fault+0x28/0x80\n kvm_vcpu_read_guest_page+0x8d/0xc0 [kvm]\n kvm_fetch_guest_virt+0x92/0xc0 [kvm]\n __do_insn_fetch_bytes+0xf3/0x1e0 [kvm]\n x86_decode_insn+0xd1/0x1010 [kvm]\n x86_emulate_instruction+0x105/0x810 [kvm]\n __svm_skip_emulated_instruction+0xc4/0x140 [kvm_amd]\n handle_fastpath_invd+0xc4/0x1a0 [kvm]\n vcpu_run+0x11a1/0x1db0 [kvm]\n kvm_arch_vcpu_ioctl_run+0x5cc/0x730 [kvm]\n kvm_vcpu_ioctl+0x578/0x6a0 [kvm]\n __se_sys_ioctl+0x6d/0xb0\n do_syscall_64+0x8a/0x2c0\n entry_SYSCALL_64_after_hwframe+0x4b/0x53\n RIP: 0033:0x7f479d57a94b\n \u003c/TASK\u003e\n\nNote, this is essentially a reapply of commit 5c30e8101e8d (\"KVM: SVM:\nSkip WRMSR fastpath on VM-Exit if next RIP isn\u0027t valid\"), but with\ndifferent justification (KVM now grabs SRCU when skipping the instruction\nfor other reasons).",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_10_61-rt-1-150600.1.3.1.x86_64",
"SUSE Real Time Module 15 SP6:cluster-md-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:dlm-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:gfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-devel-rt-6.4.0-150600.10.61.1.noarch",
"SUSE Real Time Module 15 SP6:kernel-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-rt-devel-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-rt_debug-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-rt_debug-devel-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-source-rt-6.4.0-150600.10.61.1.noarch",
"SUSE Real Time Module 15 SP6:kernel-syms-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:ocfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:gfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-rt-6.4.0-150600.10.61.1.noarch",
"openSUSE Leap 15.6:kernel-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-devel-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-extra-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-livepatch-devel-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-optional-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-vdso-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt_debug-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt_debug-devel-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt_debug-vdso-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-source-rt-6.4.0-150600.10.61.1.noarch",
"openSUSE Leap 15.6:kernel-syms-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kselftests-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-rt-6.4.0-150600.10.61.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40038",
"url": "https://www.suse.com/security/cve/CVE-2025-40038"
},
{
"category": "external",
"summary": "SUSE Bug 1252817 for CVE-2025-40038",
"url": "https://bugzilla.suse.com/1252817"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_10_61-rt-1-150600.1.3.1.x86_64",
"SUSE Real Time Module 15 SP6:cluster-md-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:dlm-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:gfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-devel-rt-6.4.0-150600.10.61.1.noarch",
"SUSE Real Time Module 15 SP6:kernel-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-rt-devel-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-rt_debug-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-rt_debug-devel-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-source-rt-6.4.0-150600.10.61.1.noarch",
"SUSE Real Time Module 15 SP6:kernel-syms-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:ocfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:gfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-rt-6.4.0-150600.10.61.1.noarch",
"openSUSE Leap 15.6:kernel-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-devel-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-extra-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-livepatch-devel-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-optional-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-vdso-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt_debug-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt_debug-devel-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt_debug-vdso-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-source-rt-6.4.0-150600.10.61.1.noarch",
"openSUSE Leap 15.6:kernel-syms-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kselftests-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-rt-6.4.0-150600.10.61.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_10_61-rt-1-150600.1.3.1.x86_64",
"SUSE Real Time Module 15 SP6:cluster-md-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:dlm-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:gfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-devel-rt-6.4.0-150600.10.61.1.noarch",
"SUSE Real Time Module 15 SP6:kernel-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-rt-devel-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-rt_debug-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-rt_debug-devel-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-source-rt-6.4.0-150600.10.61.1.noarch",
"SUSE Real Time Module 15 SP6:kernel-syms-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:ocfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:gfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-rt-6.4.0-150600.10.61.1.noarch",
"openSUSE Leap 15.6:kernel-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-devel-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-extra-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-livepatch-devel-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-optional-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-vdso-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt_debug-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt_debug-devel-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt_debug-vdso-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-source-rt-6.4.0-150600.10.61.1.noarch",
"openSUSE Leap 15.6:kernel-syms-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kselftests-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-rt-6.4.0-150600.10.61.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-24T12:42:49Z",
"details": "moderate"
}
],
"title": "CVE-2025-40038"
},
{
"cve": "CVE-2025-40040",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40040"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nmm/ksm: fix flag-dropping behavior in ksm_madvise\n\nsyzkaller discovered the following crash: (kernel BUG)\n\n[ 44.607039] ------------[ cut here ]------------\n[ 44.607422] kernel BUG at mm/userfaultfd.c:2067!\n[ 44.608148] Oops: invalid opcode: 0000 [#1] SMP DEBUG_PAGEALLOC KASAN NOPTI\n[ 44.608814] CPU: 1 UID: 0 PID: 2475 Comm: reproducer Not tainted 6.16.0-rc6 #1 PREEMPT(none)\n[ 44.609635] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.16.3-0-ga6ed6b701f0a-prebuilt.qemu.org 04/01/2014\n[ 44.610695] RIP: 0010:userfaultfd_release_all+0x3a8/0x460\n\n\u003csnip other registers, drop unreliable trace\u003e\n\n[ 44.617726] Call Trace:\n[ 44.617926] \u003cTASK\u003e\n[ 44.619284] userfaultfd_release+0xef/0x1b0\n[ 44.620976] __fput+0x3f9/0xb60\n[ 44.621240] fput_close_sync+0x110/0x210\n[ 44.622222] __x64_sys_close+0x8f/0x120\n[ 44.622530] do_syscall_64+0x5b/0x2f0\n[ 44.622840] entry_SYSCALL_64_after_hwframe+0x76/0x7e\n[ 44.623244] RIP: 0033:0x7f365bb3f227\n\nKernel panics because it detects UFFD inconsistency during\nuserfaultfd_release_all(). Specifically, a VMA which has a valid pointer\nto vma-\u003evm_userfaultfd_ctx, but no UFFD flags in vma-\u003evm_flags.\n\nThe inconsistency is caused in ksm_madvise(): when user calls madvise()\nwith MADV_UNMEARGEABLE on a VMA that is registered for UFFD in MINOR mode,\nit accidentally clears all flags stored in the upper 32 bits of\nvma-\u003evm_flags.\n\nAssuming x86_64 kernel build, unsigned long is 64-bit and unsigned int and\nint are 32-bit wide. This setup causes the following mishap during the \u0026=\n~VM_MERGEABLE assignment.\n\nVM_MERGEABLE is a 32-bit constant of type unsigned int, 0x8000\u00270000. \nAfter ~ is applied, it becomes 0x7fff\u0027ffff unsigned int, which is then\npromoted to unsigned long before the \u0026 operation. This promotion fills\nupper 32 bits with leading 0s, as we\u0027re doing unsigned conversion (and\neven for a signed conversion, this wouldn\u0027t help as the leading bit is 0).\n\u0026 operation thus ends up AND-ing vm_flags with 0x0000\u00270000\u00277fff\u0027ffff\ninstead of intended 0xffff\u0027ffff\u00277fff\u0027ffff and hence accidentally clears\nthe upper 32-bits of its value.\n\nFix it by changing `VM_MERGEABLE` constant to unsigned long, using the\nBIT() macro.\n\nNote: other VM_* flags are not affected: This only happens to the\nVM_MERGEABLE flag, as the other VM_* flags are all constants of type int\nand after ~ operation, they end up with leading 1 and are thus converted\nto unsigned long with leading 1s.\n\nNote 2:\nAfter commit 31defc3b01d9 (\"userfaultfd: remove (VM_)BUG_ON()s\"), this is\nno longer a kernel BUG, but a WARNING at the same place:\n\n[ 45.595973] WARNING: CPU: 1 PID: 2474 at mm/userfaultfd.c:2067\n\nbut the root-cause (flag-drop) remains the same.\n\n[akpm@linux-foundation.org: rust bindgen wasn\u0027t able to handle BIT(), from Miguel]",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_10_61-rt-1-150600.1.3.1.x86_64",
"SUSE Real Time Module 15 SP6:cluster-md-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:dlm-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:gfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-devel-rt-6.4.0-150600.10.61.1.noarch",
"SUSE Real Time Module 15 SP6:kernel-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-rt-devel-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-rt_debug-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-rt_debug-devel-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-source-rt-6.4.0-150600.10.61.1.noarch",
"SUSE Real Time Module 15 SP6:kernel-syms-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:ocfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:gfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-rt-6.4.0-150600.10.61.1.noarch",
"openSUSE Leap 15.6:kernel-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-devel-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-extra-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-livepatch-devel-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-optional-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-vdso-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt_debug-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt_debug-devel-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt_debug-vdso-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-source-rt-6.4.0-150600.10.61.1.noarch",
"openSUSE Leap 15.6:kernel-syms-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kselftests-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-rt-6.4.0-150600.10.61.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40040",
"url": "https://www.suse.com/security/cve/CVE-2025-40040"
},
{
"category": "external",
"summary": "SUSE Bug 1252780 for CVE-2025-40040",
"url": "https://bugzilla.suse.com/1252780"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_10_61-rt-1-150600.1.3.1.x86_64",
"SUSE Real Time Module 15 SP6:cluster-md-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:dlm-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:gfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-devel-rt-6.4.0-150600.10.61.1.noarch",
"SUSE Real Time Module 15 SP6:kernel-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-rt-devel-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-rt_debug-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-rt_debug-devel-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-source-rt-6.4.0-150600.10.61.1.noarch",
"SUSE Real Time Module 15 SP6:kernel-syms-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:ocfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:gfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-rt-6.4.0-150600.10.61.1.noarch",
"openSUSE Leap 15.6:kernel-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-devel-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-extra-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-livepatch-devel-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-optional-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-vdso-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt_debug-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt_debug-devel-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt_debug-vdso-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-source-rt-6.4.0-150600.10.61.1.noarch",
"openSUSE Leap 15.6:kernel-syms-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kselftests-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-rt-6.4.0-150600.10.61.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_10_61-rt-1-150600.1.3.1.x86_64",
"SUSE Real Time Module 15 SP6:cluster-md-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:dlm-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:gfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-devel-rt-6.4.0-150600.10.61.1.noarch",
"SUSE Real Time Module 15 SP6:kernel-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-rt-devel-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-rt_debug-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-rt_debug-devel-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-source-rt-6.4.0-150600.10.61.1.noarch",
"SUSE Real Time Module 15 SP6:kernel-syms-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:ocfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:gfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-rt-6.4.0-150600.10.61.1.noarch",
"openSUSE Leap 15.6:kernel-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-devel-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-extra-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-livepatch-devel-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-optional-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-vdso-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt_debug-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt_debug-devel-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt_debug-vdso-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-source-rt-6.4.0-150600.10.61.1.noarch",
"openSUSE Leap 15.6:kernel-syms-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kselftests-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-rt-6.4.0-150600.10.61.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-24T12:42:49Z",
"details": "moderate"
}
],
"title": "CVE-2025-40040"
},
{
"cve": "CVE-2025-40048",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40048"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nuio_hv_generic: Let userspace take care of interrupt mask\n\nRemove the logic to set interrupt mask by default in uio_hv_generic\ndriver as the interrupt mask value is supposed to be controlled\ncompletely by the user space. If the mask bit gets changed\nby the driver, concurrently with user mode operating on the ring,\nthe mask bit may be set when it is supposed to be clear, and the\nuser-mode driver will miss an interrupt which will cause a hang.\n\nFor eg- when the driver sets inbound ring buffer interrupt mask to 1,\nthe host does not interrupt the guest on the UIO VMBus channel.\nHowever, setting the mask does not prevent the host from putting a\nmessage in the inbound ring buffer. So let\u0027s assume that happens,\nthe host puts a message into the ring buffer but does not interrupt.\n\nSubsequently, the user space code in the guest sets the inbound ring\nbuffer interrupt mask to 0, saying \"Hey, I\u0027m ready for interrupts\".\nUser space code then calls pread() to wait for an interrupt.\nThen one of two things happens:\n\n* The host never sends another message. So the pread() waits forever.\n* The host does send another message. But because there\u0027s already a\n message in the ring buffer, it doesn\u0027t generate an interrupt.\n This is the correct behavior, because the host should only send an\n interrupt when the inbound ring buffer transitions from empty to\n not-empty. Adding an additional message to a ring buffer that is not\n empty is not supposed to generate an interrupt on the guest.\n Since the guest is waiting in pread() and not removing messages from\n the ring buffer, the pread() waits forever.\n\nThis could be easily reproduced in hv_fcopy_uio_daemon if we delay\nsetting interrupt mask to 0.\n\nSimilarly if hv_uio_channel_cb() sets the interrupt_mask to 1,\nthere\u0027s a race condition. Once user space empties the inbound ring\nbuffer, but before user space sets interrupt_mask to 0, the host could\nput another message in the ring buffer but it wouldn\u0027t interrupt.\nThen the next pread() would hang.\n\nFix these by removing all instances where interrupt_mask is changed,\nwhile keeping the one in set_event() unchanged to enable userspace\ncontrol the interrupt mask by writing 0/1 to /dev/uioX.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_10_61-rt-1-150600.1.3.1.x86_64",
"SUSE Real Time Module 15 SP6:cluster-md-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:dlm-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:gfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-devel-rt-6.4.0-150600.10.61.1.noarch",
"SUSE Real Time Module 15 SP6:kernel-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-rt-devel-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-rt_debug-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-rt_debug-devel-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-source-rt-6.4.0-150600.10.61.1.noarch",
"SUSE Real Time Module 15 SP6:kernel-syms-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:ocfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:gfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-rt-6.4.0-150600.10.61.1.noarch",
"openSUSE Leap 15.6:kernel-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-devel-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-extra-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-livepatch-devel-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-optional-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-vdso-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt_debug-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt_debug-devel-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt_debug-vdso-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-source-rt-6.4.0-150600.10.61.1.noarch",
"openSUSE Leap 15.6:kernel-syms-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kselftests-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-rt-6.4.0-150600.10.61.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40048",
"url": "https://www.suse.com/security/cve/CVE-2025-40048"
},
{
"category": "external",
"summary": "SUSE Bug 1252862 for CVE-2025-40048",
"url": "https://bugzilla.suse.com/1252862"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_10_61-rt-1-150600.1.3.1.x86_64",
"SUSE Real Time Module 15 SP6:cluster-md-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:dlm-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:gfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-devel-rt-6.4.0-150600.10.61.1.noarch",
"SUSE Real Time Module 15 SP6:kernel-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-rt-devel-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-rt_debug-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-rt_debug-devel-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-source-rt-6.4.0-150600.10.61.1.noarch",
"SUSE Real Time Module 15 SP6:kernel-syms-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:ocfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:gfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-rt-6.4.0-150600.10.61.1.noarch",
"openSUSE Leap 15.6:kernel-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-devel-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-extra-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-livepatch-devel-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-optional-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-vdso-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt_debug-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt_debug-devel-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt_debug-vdso-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-source-rt-6.4.0-150600.10.61.1.noarch",
"openSUSE Leap 15.6:kernel-syms-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kselftests-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-rt-6.4.0-150600.10.61.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_10_61-rt-1-150600.1.3.1.x86_64",
"SUSE Real Time Module 15 SP6:cluster-md-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:dlm-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:gfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-devel-rt-6.4.0-150600.10.61.1.noarch",
"SUSE Real Time Module 15 SP6:kernel-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-rt-devel-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-rt_debug-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-rt_debug-devel-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-source-rt-6.4.0-150600.10.61.1.noarch",
"SUSE Real Time Module 15 SP6:kernel-syms-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:ocfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:gfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-rt-6.4.0-150600.10.61.1.noarch",
"openSUSE Leap 15.6:kernel-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-devel-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-extra-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-livepatch-devel-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-optional-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-vdso-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt_debug-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt_debug-devel-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt_debug-vdso-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-source-rt-6.4.0-150600.10.61.1.noarch",
"openSUSE Leap 15.6:kernel-syms-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kselftests-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-rt-6.4.0-150600.10.61.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-24T12:42:49Z",
"details": "moderate"
}
],
"title": "CVE-2025-40048"
},
{
"cve": "CVE-2025-40055",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40055"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nocfs2: fix double free in user_cluster_connect()\n\nuser_cluster_disconnect() frees \"conn-\u003ecc_private\" which is \"lc\" but then\nthe error handling frees \"lc\" a second time. Set \"lc\" to NULL on this\npath to avoid a double free.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_10_61-rt-1-150600.1.3.1.x86_64",
"SUSE Real Time Module 15 SP6:cluster-md-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:dlm-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:gfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-devel-rt-6.4.0-150600.10.61.1.noarch",
"SUSE Real Time Module 15 SP6:kernel-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-rt-devel-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-rt_debug-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-rt_debug-devel-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-source-rt-6.4.0-150600.10.61.1.noarch",
"SUSE Real Time Module 15 SP6:kernel-syms-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:ocfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:gfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-rt-6.4.0-150600.10.61.1.noarch",
"openSUSE Leap 15.6:kernel-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-devel-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-extra-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-livepatch-devel-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-optional-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-vdso-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt_debug-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt_debug-devel-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt_debug-vdso-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-source-rt-6.4.0-150600.10.61.1.noarch",
"openSUSE Leap 15.6:kernel-syms-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kselftests-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-rt-6.4.0-150600.10.61.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40055",
"url": "https://www.suse.com/security/cve/CVE-2025-40055"
},
{
"category": "external",
"summary": "SUSE Bug 1252821 for CVE-2025-40055",
"url": "https://bugzilla.suse.com/1252821"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_10_61-rt-1-150600.1.3.1.x86_64",
"SUSE Real Time Module 15 SP6:cluster-md-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:dlm-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:gfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-devel-rt-6.4.0-150600.10.61.1.noarch",
"SUSE Real Time Module 15 SP6:kernel-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-rt-devel-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-rt_debug-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-rt_debug-devel-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-source-rt-6.4.0-150600.10.61.1.noarch",
"SUSE Real Time Module 15 SP6:kernel-syms-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:ocfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:gfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-rt-6.4.0-150600.10.61.1.noarch",
"openSUSE Leap 15.6:kernel-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-devel-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-extra-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-livepatch-devel-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-optional-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-vdso-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt_debug-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt_debug-devel-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt_debug-vdso-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-source-rt-6.4.0-150600.10.61.1.noarch",
"openSUSE Leap 15.6:kernel-syms-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kselftests-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-rt-6.4.0-150600.10.61.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_10_61-rt-1-150600.1.3.1.x86_64",
"SUSE Real Time Module 15 SP6:cluster-md-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:dlm-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:gfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-devel-rt-6.4.0-150600.10.61.1.noarch",
"SUSE Real Time Module 15 SP6:kernel-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-rt-devel-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-rt_debug-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-rt_debug-devel-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-source-rt-6.4.0-150600.10.61.1.noarch",
"SUSE Real Time Module 15 SP6:kernel-syms-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:ocfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:gfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-rt-6.4.0-150600.10.61.1.noarch",
"openSUSE Leap 15.6:kernel-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-devel-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-extra-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-livepatch-devel-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-optional-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-vdso-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt_debug-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt_debug-devel-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt_debug-vdso-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-source-rt-6.4.0-150600.10.61.1.noarch",
"openSUSE Leap 15.6:kernel-syms-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kselftests-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-rt-6.4.0-150600.10.61.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-24T12:42:49Z",
"details": "moderate"
}
],
"title": "CVE-2025-40055"
},
{
"cve": "CVE-2025-40059",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40059"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\ncoresight: Fix incorrect handling for return value of devm_kzalloc\n\nThe return value of devm_kzalloc could be an null pointer,\nuse \"!desc.pdata\" to fix incorrect handling return value\nof devm_kzalloc.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_10_61-rt-1-150600.1.3.1.x86_64",
"SUSE Real Time Module 15 SP6:cluster-md-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:dlm-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:gfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-devel-rt-6.4.0-150600.10.61.1.noarch",
"SUSE Real Time Module 15 SP6:kernel-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-rt-devel-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-rt_debug-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-rt_debug-devel-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-source-rt-6.4.0-150600.10.61.1.noarch",
"SUSE Real Time Module 15 SP6:kernel-syms-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:ocfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:gfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-rt-6.4.0-150600.10.61.1.noarch",
"openSUSE Leap 15.6:kernel-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-devel-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-extra-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-livepatch-devel-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-optional-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-vdso-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt_debug-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt_debug-devel-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt_debug-vdso-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-source-rt-6.4.0-150600.10.61.1.noarch",
"openSUSE Leap 15.6:kernel-syms-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kselftests-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-rt-6.4.0-150600.10.61.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40059",
"url": "https://www.suse.com/security/cve/CVE-2025-40059"
},
{
"category": "external",
"summary": "SUSE Bug 1252809 for CVE-2025-40059",
"url": "https://bugzilla.suse.com/1252809"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_10_61-rt-1-150600.1.3.1.x86_64",
"SUSE Real Time Module 15 SP6:cluster-md-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:dlm-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:gfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-devel-rt-6.4.0-150600.10.61.1.noarch",
"SUSE Real Time Module 15 SP6:kernel-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-rt-devel-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-rt_debug-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-rt_debug-devel-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-source-rt-6.4.0-150600.10.61.1.noarch",
"SUSE Real Time Module 15 SP6:kernel-syms-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:ocfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:gfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-rt-6.4.0-150600.10.61.1.noarch",
"openSUSE Leap 15.6:kernel-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-devel-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-extra-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-livepatch-devel-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-optional-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-vdso-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt_debug-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt_debug-devel-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt_debug-vdso-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-source-rt-6.4.0-150600.10.61.1.noarch",
"openSUSE Leap 15.6:kernel-syms-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kselftests-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-rt-6.4.0-150600.10.61.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_10_61-rt-1-150600.1.3.1.x86_64",
"SUSE Real Time Module 15 SP6:cluster-md-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:dlm-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:gfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-devel-rt-6.4.0-150600.10.61.1.noarch",
"SUSE Real Time Module 15 SP6:kernel-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-rt-devel-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-rt_debug-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-rt_debug-devel-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-source-rt-6.4.0-150600.10.61.1.noarch",
"SUSE Real Time Module 15 SP6:kernel-syms-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:ocfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:gfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-rt-6.4.0-150600.10.61.1.noarch",
"openSUSE Leap 15.6:kernel-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-devel-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-extra-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-livepatch-devel-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-optional-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-vdso-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt_debug-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt_debug-devel-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt_debug-vdso-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-source-rt-6.4.0-150600.10.61.1.noarch",
"openSUSE Leap 15.6:kernel-syms-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kselftests-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-rt-6.4.0-150600.10.61.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-24T12:42:49Z",
"details": "moderate"
}
],
"title": "CVE-2025-40059"
},
{
"cve": "CVE-2025-40064",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40064"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nsmc: Fix use-after-free in __pnet_find_base_ndev().\n\nsyzbot reported use-after-free of net_device in __pnet_find_base_ndev(),\nwhich was called during connect(). [0]\n\nsmc_pnet_find_ism_resource() fetches sk_dst_get(sk)-\u003edev and passes\ndown to pnet_find_base_ndev(), where RTNL is held. Then, UAF happened\nat __pnet_find_base_ndev() when the dev is first used.\n\nThis means dev had already been freed before acquiring RTNL in\npnet_find_base_ndev().\n\nWhile dev is going away, dst-\u003edev could be swapped with blackhole_netdev,\nand the dev\u0027s refcnt by dst will be released.\n\nWe must hold dev\u0027s refcnt before calling smc_pnet_find_ism_resource().\n\nAlso, smc_pnet_find_roce_resource() has the same problem.\n\nLet\u0027s use __sk_dst_get() and dst_dev_rcu() in the two functions.\n\n[0]:\nBUG: KASAN: use-after-free in __pnet_find_base_ndev+0x1b1/0x1c0 net/smc/smc_pnet.c:926\nRead of size 1 at addr ffff888036bac33a by task syz.0.3632/18609\n\nCPU: 1 UID: 0 PID: 18609 Comm: syz.0.3632 Not tainted syzkaller #0 PREEMPT(full)\nHardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/18/2025\nCall Trace:\n \u003cTASK\u003e\n dump_stack_lvl+0x189/0x250 lib/dump_stack.c:120\n print_address_description mm/kasan/report.c:378 [inline]\n print_report+0xca/0x240 mm/kasan/report.c:482\n kasan_report+0x118/0x150 mm/kasan/report.c:595\n __pnet_find_base_ndev+0x1b1/0x1c0 net/smc/smc_pnet.c:926\n pnet_find_base_ndev net/smc/smc_pnet.c:946 [inline]\n smc_pnet_find_ism_by_pnetid net/smc/smc_pnet.c:1103 [inline]\n smc_pnet_find_ism_resource+0xef/0x390 net/smc/smc_pnet.c:1154\n smc_find_ism_device net/smc/af_smc.c:1030 [inline]\n smc_find_proposal_devices net/smc/af_smc.c:1115 [inline]\n __smc_connect+0x372/0x1890 net/smc/af_smc.c:1545\n smc_connect+0x877/0xd90 net/smc/af_smc.c:1715\n __sys_connect_file net/socket.c:2086 [inline]\n __sys_connect+0x313/0x440 net/socket.c:2105\n __do_sys_connect net/socket.c:2111 [inline]\n __se_sys_connect net/socket.c:2108 [inline]\n __x64_sys_connect+0x7a/0x90 net/socket.c:2108\n do_syscall_x64 arch/x86/entry/syscall_64.c:63 [inline]\n do_syscall_64+0xfa/0x3b0 arch/x86/entry/syscall_64.c:94\n entry_SYSCALL_64_after_hwframe+0x77/0x7f\nRIP: 0033:0x7f47cbf8eba9\nCode: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 \u003c48\u003e 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48\nRSP: 002b:00007f47ccdb1038 EFLAGS: 00000246 ORIG_RAX: 000000000000002a\nRAX: ffffffffffffffda RBX: 00007f47cc1d5fa0 RCX: 00007f47cbf8eba9\nRDX: 0000000000000010 RSI: 0000200000000280 RDI: 000000000000000b\nRBP: 00007f47cc011e19 R08: 0000000000000000 R09: 0000000000000000\nR10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000\nR13: 00007f47cc1d6038 R14: 00007f47cc1d5fa0 R15: 00007ffc512f8aa8\n \u003c/TASK\u003e\n\nThe buggy address belongs to the physical page:\npage: refcount:0 mapcount:0 mapping:0000000000000000 index:0xffff888036bacd00 pfn:0x36bac\nflags: 0xfff00000000000(node=0|zone=1|lastcpupid=0x7ff)\nraw: 00fff00000000000 ffffea0001243d08 ffff8880b863fdc0 0000000000000000\nraw: ffff888036bacd00 0000000000000000 00000000ffffffff 0000000000000000\npage dumped because: kasan: bad access detected\npage_owner tracks the page as freed\npage last allocated via order 2, migratetype Unmovable, gfp_mask 0x446dc0(GFP_KERNEL_ACCOUNT|__GFP_ZERO|__GFP_NOWARN|__GFP_RETRY_MAYFAIL|__GFP_COMP), pid 16741, tgid 16741 (syz-executor), ts 343313197788, free_ts 380670750466\n set_page_owner include/linux/page_owner.h:32 [inline]\n post_alloc_hook+0x240/0x2a0 mm/page_alloc.c:1851\n prep_new_page mm/page_alloc.c:1859 [inline]\n get_page_from_freelist+0x21e4/0x22c0 mm/page_alloc.c:3858\n __alloc_frozen_pages_noprof+0x181/0x370 mm/page_alloc.c:5148\n alloc_pages_mpol+0x232/0x4a0 mm/mempolicy.c:2416\n ___kmalloc_large_node+0x5f/0x1b0 mm/slub.c:4317\n __kmalloc_large_node_noprof+0x18/0x90 mm/slub.c:4348\n __do_kmalloc_node mm/slub.c:4364 [inline]\n __kvmalloc_node\n---truncated---",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_10_61-rt-1-150600.1.3.1.x86_64",
"SUSE Real Time Module 15 SP6:cluster-md-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:dlm-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:gfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-devel-rt-6.4.0-150600.10.61.1.noarch",
"SUSE Real Time Module 15 SP6:kernel-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-rt-devel-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-rt_debug-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-rt_debug-devel-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-source-rt-6.4.0-150600.10.61.1.noarch",
"SUSE Real Time Module 15 SP6:kernel-syms-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:ocfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:gfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-rt-6.4.0-150600.10.61.1.noarch",
"openSUSE Leap 15.6:kernel-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-devel-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-extra-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-livepatch-devel-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-optional-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-vdso-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt_debug-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt_debug-devel-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt_debug-vdso-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-source-rt-6.4.0-150600.10.61.1.noarch",
"openSUSE Leap 15.6:kernel-syms-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kselftests-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-rt-6.4.0-150600.10.61.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40064",
"url": "https://www.suse.com/security/cve/CVE-2025-40064"
},
{
"category": "external",
"summary": "SUSE Bug 1252845 for CVE-2025-40064",
"url": "https://bugzilla.suse.com/1252845"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_10_61-rt-1-150600.1.3.1.x86_64",
"SUSE Real Time Module 15 SP6:cluster-md-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:dlm-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:gfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-devel-rt-6.4.0-150600.10.61.1.noarch",
"SUSE Real Time Module 15 SP6:kernel-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-rt-devel-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-rt_debug-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-rt_debug-devel-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-source-rt-6.4.0-150600.10.61.1.noarch",
"SUSE Real Time Module 15 SP6:kernel-syms-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:ocfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:gfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-rt-6.4.0-150600.10.61.1.noarch",
"openSUSE Leap 15.6:kernel-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-devel-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-extra-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-livepatch-devel-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-optional-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-vdso-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt_debug-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt_debug-devel-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt_debug-vdso-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-source-rt-6.4.0-150600.10.61.1.noarch",
"openSUSE Leap 15.6:kernel-syms-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kselftests-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-rt-6.4.0-150600.10.61.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_10_61-rt-1-150600.1.3.1.x86_64",
"SUSE Real Time Module 15 SP6:cluster-md-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:dlm-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:gfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-devel-rt-6.4.0-150600.10.61.1.noarch",
"SUSE Real Time Module 15 SP6:kernel-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-rt-devel-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-rt_debug-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-rt_debug-devel-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-source-rt-6.4.0-150600.10.61.1.noarch",
"SUSE Real Time Module 15 SP6:kernel-syms-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:ocfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:gfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-rt-6.4.0-150600.10.61.1.noarch",
"openSUSE Leap 15.6:kernel-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-devel-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-extra-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-livepatch-devel-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-optional-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-vdso-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt_debug-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt_debug-devel-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt_debug-vdso-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-source-rt-6.4.0-150600.10.61.1.noarch",
"openSUSE Leap 15.6:kernel-syms-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kselftests-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-rt-6.4.0-150600.10.61.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-24T12:42:49Z",
"details": "moderate"
}
],
"title": "CVE-2025-40064"
},
{
"cve": "CVE-2025-40070",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40070"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\npps: fix warning in pps_register_cdev when register device fail\n\nSimilar to previous commit 2a934fdb01db (\"media: v4l2-dev: fix error\nhandling in __video_register_device()\"), the release hook should be set\nbefore device_register(). Otherwise, when device_register() return error\nand put_device() try to callback the release function, the below warning\nmay happen.\n\n ------------[ cut here ]------------\n WARNING: CPU: 1 PID: 4760 at drivers/base/core.c:2567 device_release+0x1bd/0x240 drivers/base/core.c:2567\n Modules linked in:\n CPU: 1 UID: 0 PID: 4760 Comm: syz.4.914 Not tainted 6.17.0-rc3+ #1 NONE\n RIP: 0010:device_release+0x1bd/0x240 drivers/base/core.c:2567\n Call Trace:\n \u003cTASK\u003e\n kobject_cleanup+0x136/0x410 lib/kobject.c:689\n kobject_release lib/kobject.c:720 [inline]\n kref_put include/linux/kref.h:65 [inline]\n kobject_put+0xe9/0x130 lib/kobject.c:737\n put_device+0x24/0x30 drivers/base/core.c:3797\n pps_register_cdev+0x2da/0x370 drivers/pps/pps.c:402\n pps_register_source+0x2f6/0x480 drivers/pps/kapi.c:108\n pps_tty_open+0x190/0x310 drivers/pps/clients/pps-ldisc.c:57\n tty_ldisc_open+0xa7/0x120 drivers/tty/tty_ldisc.c:432\n tty_set_ldisc+0x333/0x780 drivers/tty/tty_ldisc.c:563\n tiocsetd drivers/tty/tty_io.c:2429 [inline]\n tty_ioctl+0x5d1/0x1700 drivers/tty/tty_io.c:2728\n vfs_ioctl fs/ioctl.c:51 [inline]\n __do_sys_ioctl fs/ioctl.c:598 [inline]\n __se_sys_ioctl fs/ioctl.c:584 [inline]\n __x64_sys_ioctl+0x194/0x210 fs/ioctl.c:584\n do_syscall_x64 arch/x86/entry/syscall_64.c:63 [inline]\n do_syscall_64+0x5f/0x2a0 arch/x86/entry/syscall_64.c:94\n entry_SYSCALL_64_after_hwframe+0x76/0x7e\n \u003c/TASK\u003e\n\nBefore commit c79a39dc8d06 (\"pps: Fix a use-after-free\"),\npps_register_cdev() call device_create() to create pps-\u003edev, which will\ninit dev-\u003erelease to device_create_release(). Now the comment is outdated,\njust remove it.\n\nThanks for the reminder from Calvin Owens, \u0027kfree_pps\u0027 should be removed\nin pps_register_source() to avoid a double free in the failure case.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_10_61-rt-1-150600.1.3.1.x86_64",
"SUSE Real Time Module 15 SP6:cluster-md-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:dlm-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:gfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-devel-rt-6.4.0-150600.10.61.1.noarch",
"SUSE Real Time Module 15 SP6:kernel-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-rt-devel-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-rt_debug-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-rt_debug-devel-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-source-rt-6.4.0-150600.10.61.1.noarch",
"SUSE Real Time Module 15 SP6:kernel-syms-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:ocfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:gfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-rt-6.4.0-150600.10.61.1.noarch",
"openSUSE Leap 15.6:kernel-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-devel-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-extra-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-livepatch-devel-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-optional-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-vdso-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt_debug-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt_debug-devel-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt_debug-vdso-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-source-rt-6.4.0-150600.10.61.1.noarch",
"openSUSE Leap 15.6:kernel-syms-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kselftests-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-rt-6.4.0-150600.10.61.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40070",
"url": "https://www.suse.com/security/cve/CVE-2025-40070"
},
{
"category": "external",
"summary": "SUSE Bug 1252836 for CVE-2025-40070",
"url": "https://bugzilla.suse.com/1252836"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_10_61-rt-1-150600.1.3.1.x86_64",
"SUSE Real Time Module 15 SP6:cluster-md-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:dlm-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:gfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-devel-rt-6.4.0-150600.10.61.1.noarch",
"SUSE Real Time Module 15 SP6:kernel-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-rt-devel-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-rt_debug-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-rt_debug-devel-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-source-rt-6.4.0-150600.10.61.1.noarch",
"SUSE Real Time Module 15 SP6:kernel-syms-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:ocfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:gfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-rt-6.4.0-150600.10.61.1.noarch",
"openSUSE Leap 15.6:kernel-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-devel-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-extra-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-livepatch-devel-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-optional-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-vdso-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt_debug-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt_debug-devel-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt_debug-vdso-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-source-rt-6.4.0-150600.10.61.1.noarch",
"openSUSE Leap 15.6:kernel-syms-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kselftests-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-rt-6.4.0-150600.10.61.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_10_61-rt-1-150600.1.3.1.x86_64",
"SUSE Real Time Module 15 SP6:cluster-md-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:dlm-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:gfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-devel-rt-6.4.0-150600.10.61.1.noarch",
"SUSE Real Time Module 15 SP6:kernel-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-rt-devel-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-rt_debug-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-rt_debug-devel-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-source-rt-6.4.0-150600.10.61.1.noarch",
"SUSE Real Time Module 15 SP6:kernel-syms-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:ocfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:gfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-rt-6.4.0-150600.10.61.1.noarch",
"openSUSE Leap 15.6:kernel-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-devel-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-extra-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-livepatch-devel-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-optional-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-vdso-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt_debug-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt_debug-devel-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt_debug-vdso-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-source-rt-6.4.0-150600.10.61.1.noarch",
"openSUSE Leap 15.6:kernel-syms-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kselftests-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-rt-6.4.0-150600.10.61.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-24T12:42:49Z",
"details": "moderate"
}
],
"title": "CVE-2025-40070"
},
{
"cve": "CVE-2025-40074",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40074"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nipv4: start using dst_dev_rcu()\n\nChange icmpv4_xrlim_allow(), ip_defrag() to prevent possible UAF.\n\nChange ipmr_prepare_xmit(), ipmr_queue_fwd_xmit(), ip_mr_output(),\nipv4_neigh_lookup() to use lockdep enabled dst_dev_rcu().",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_10_61-rt-1-150600.1.3.1.x86_64",
"SUSE Real Time Module 15 SP6:cluster-md-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:dlm-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:gfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-devel-rt-6.4.0-150600.10.61.1.noarch",
"SUSE Real Time Module 15 SP6:kernel-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-rt-devel-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-rt_debug-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-rt_debug-devel-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-source-rt-6.4.0-150600.10.61.1.noarch",
"SUSE Real Time Module 15 SP6:kernel-syms-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:ocfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:gfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-rt-6.4.0-150600.10.61.1.noarch",
"openSUSE Leap 15.6:kernel-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-devel-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-extra-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-livepatch-devel-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-optional-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-vdso-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt_debug-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt_debug-devel-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt_debug-vdso-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-source-rt-6.4.0-150600.10.61.1.noarch",
"openSUSE Leap 15.6:kernel-syms-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kselftests-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-rt-6.4.0-150600.10.61.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40074",
"url": "https://www.suse.com/security/cve/CVE-2025-40074"
},
{
"category": "external",
"summary": "SUSE Bug 1252794 for CVE-2025-40074",
"url": "https://bugzilla.suse.com/1252794"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_10_61-rt-1-150600.1.3.1.x86_64",
"SUSE Real Time Module 15 SP6:cluster-md-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:dlm-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:gfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-devel-rt-6.4.0-150600.10.61.1.noarch",
"SUSE Real Time Module 15 SP6:kernel-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-rt-devel-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-rt_debug-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-rt_debug-devel-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-source-rt-6.4.0-150600.10.61.1.noarch",
"SUSE Real Time Module 15 SP6:kernel-syms-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:ocfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:gfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-rt-6.4.0-150600.10.61.1.noarch",
"openSUSE Leap 15.6:kernel-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-devel-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-extra-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-livepatch-devel-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-optional-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-vdso-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt_debug-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt_debug-devel-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt_debug-vdso-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-source-rt-6.4.0-150600.10.61.1.noarch",
"openSUSE Leap 15.6:kernel-syms-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kselftests-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-rt-6.4.0-150600.10.61.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_10_61-rt-1-150600.1.3.1.x86_64",
"SUSE Real Time Module 15 SP6:cluster-md-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:dlm-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:gfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-devel-rt-6.4.0-150600.10.61.1.noarch",
"SUSE Real Time Module 15 SP6:kernel-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-rt-devel-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-rt_debug-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-rt_debug-devel-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-source-rt-6.4.0-150600.10.61.1.noarch",
"SUSE Real Time Module 15 SP6:kernel-syms-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:ocfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:gfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-rt-6.4.0-150600.10.61.1.noarch",
"openSUSE Leap 15.6:kernel-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-devel-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-extra-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-livepatch-devel-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-optional-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-vdso-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt_debug-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt_debug-devel-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt_debug-vdso-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-source-rt-6.4.0-150600.10.61.1.noarch",
"openSUSE Leap 15.6:kernel-syms-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kselftests-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-rt-6.4.0-150600.10.61.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-24T12:42:49Z",
"details": "moderate"
}
],
"title": "CVE-2025-40074"
},
{
"cve": "CVE-2025-40075",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40075"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\ntcp_metrics: use dst_dev_net_rcu()\n\nReplace three dst_dev() with a lockdep enabled helper.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_10_61-rt-1-150600.1.3.1.x86_64",
"SUSE Real Time Module 15 SP6:cluster-md-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:dlm-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:gfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-devel-rt-6.4.0-150600.10.61.1.noarch",
"SUSE Real Time Module 15 SP6:kernel-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-rt-devel-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-rt_debug-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-rt_debug-devel-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-source-rt-6.4.0-150600.10.61.1.noarch",
"SUSE Real Time Module 15 SP6:kernel-syms-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:ocfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:gfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-rt-6.4.0-150600.10.61.1.noarch",
"openSUSE Leap 15.6:kernel-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-devel-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-extra-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-livepatch-devel-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-optional-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-vdso-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt_debug-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt_debug-devel-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt_debug-vdso-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-source-rt-6.4.0-150600.10.61.1.noarch",
"openSUSE Leap 15.6:kernel-syms-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kselftests-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-rt-6.4.0-150600.10.61.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40075",
"url": "https://www.suse.com/security/cve/CVE-2025-40075"
},
{
"category": "external",
"summary": "SUSE Bug 1252795 for CVE-2025-40075",
"url": "https://bugzilla.suse.com/1252795"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_10_61-rt-1-150600.1.3.1.x86_64",
"SUSE Real Time Module 15 SP6:cluster-md-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:dlm-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:gfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-devel-rt-6.4.0-150600.10.61.1.noarch",
"SUSE Real Time Module 15 SP6:kernel-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-rt-devel-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-rt_debug-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-rt_debug-devel-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-source-rt-6.4.0-150600.10.61.1.noarch",
"SUSE Real Time Module 15 SP6:kernel-syms-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:ocfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:gfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-rt-6.4.0-150600.10.61.1.noarch",
"openSUSE Leap 15.6:kernel-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-devel-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-extra-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-livepatch-devel-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-optional-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-vdso-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt_debug-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt_debug-devel-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt_debug-vdso-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-source-rt-6.4.0-150600.10.61.1.noarch",
"openSUSE Leap 15.6:kernel-syms-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kselftests-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-rt-6.4.0-150600.10.61.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_10_61-rt-1-150600.1.3.1.x86_64",
"SUSE Real Time Module 15 SP6:cluster-md-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:dlm-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:gfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-devel-rt-6.4.0-150600.10.61.1.noarch",
"SUSE Real Time Module 15 SP6:kernel-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-rt-devel-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-rt_debug-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-rt_debug-devel-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-source-rt-6.4.0-150600.10.61.1.noarch",
"SUSE Real Time Module 15 SP6:kernel-syms-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:ocfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:gfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-rt-6.4.0-150600.10.61.1.noarch",
"openSUSE Leap 15.6:kernel-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-devel-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-extra-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-livepatch-devel-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-optional-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-vdso-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt_debug-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt_debug-devel-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt_debug-vdso-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-source-rt-6.4.0-150600.10.61.1.noarch",
"openSUSE Leap 15.6:kernel-syms-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kselftests-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-rt-6.4.0-150600.10.61.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-24T12:42:49Z",
"details": "moderate"
}
],
"title": "CVE-2025-40075"
},
{
"cve": "CVE-2025-40083",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40083"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnet/sched: sch_qfq: Fix null-deref in agg_dequeue\n\nTo prevent a potential crash in agg_dequeue (net/sched/sch_qfq.c)\nwhen cl-\u003eqdisc-\u003eops-\u003epeek(cl-\u003eqdisc) returns NULL, we check the return\nvalue before using it, similar to the existing approach in sch_hfsc.c.\n\nTo avoid code duplication, the following changes are made:\n\n1. Changed qdisc_warn_nonwc(include/net/pkt_sched.h) into a static\ninline function.\n\n2. Moved qdisc_peek_len from net/sched/sch_hfsc.c to\ninclude/net/pkt_sched.h so that sch_qfq can reuse it.\n\n3. Applied qdisc_peek_len in agg_dequeue to avoid crashing.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_10_61-rt-1-150600.1.3.1.x86_64",
"SUSE Real Time Module 15 SP6:cluster-md-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:dlm-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:gfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-devel-rt-6.4.0-150600.10.61.1.noarch",
"SUSE Real Time Module 15 SP6:kernel-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-rt-devel-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-rt_debug-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-rt_debug-devel-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-source-rt-6.4.0-150600.10.61.1.noarch",
"SUSE Real Time Module 15 SP6:kernel-syms-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:ocfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:gfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-rt-6.4.0-150600.10.61.1.noarch",
"openSUSE Leap 15.6:kernel-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-devel-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-extra-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-livepatch-devel-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-optional-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-vdso-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt_debug-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt_debug-devel-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt_debug-vdso-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-source-rt-6.4.0-150600.10.61.1.noarch",
"openSUSE Leap 15.6:kernel-syms-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kselftests-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-rt-6.4.0-150600.10.61.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40083",
"url": "https://www.suse.com/security/cve/CVE-2025-40083"
},
{
"category": "external",
"summary": "SUSE Bug 1252912 for CVE-2025-40083",
"url": "https://bugzilla.suse.com/1252912"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_10_61-rt-1-150600.1.3.1.x86_64",
"SUSE Real Time Module 15 SP6:cluster-md-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:dlm-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:gfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-devel-rt-6.4.0-150600.10.61.1.noarch",
"SUSE Real Time Module 15 SP6:kernel-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-rt-devel-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-rt_debug-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-rt_debug-devel-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-source-rt-6.4.0-150600.10.61.1.noarch",
"SUSE Real Time Module 15 SP6:kernel-syms-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:ocfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:gfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-rt-6.4.0-150600.10.61.1.noarch",
"openSUSE Leap 15.6:kernel-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-devel-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-extra-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-livepatch-devel-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-optional-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-vdso-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt_debug-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt_debug-devel-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt_debug-vdso-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-source-rt-6.4.0-150600.10.61.1.noarch",
"openSUSE Leap 15.6:kernel-syms-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kselftests-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-rt-6.4.0-150600.10.61.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_10_61-rt-1-150600.1.3.1.x86_64",
"SUSE Real Time Module 15 SP6:cluster-md-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:dlm-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:gfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-devel-rt-6.4.0-150600.10.61.1.noarch",
"SUSE Real Time Module 15 SP6:kernel-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-rt-devel-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-rt_debug-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-rt_debug-devel-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-source-rt-6.4.0-150600.10.61.1.noarch",
"SUSE Real Time Module 15 SP6:kernel-syms-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:ocfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:gfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-rt-6.4.0-150600.10.61.1.noarch",
"openSUSE Leap 15.6:kernel-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-devel-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-extra-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-livepatch-devel-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-optional-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-vdso-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt_debug-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt_debug-devel-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt_debug-vdso-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-source-rt-6.4.0-150600.10.61.1.noarch",
"openSUSE Leap 15.6:kernel-syms-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kselftests-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-rt-6.4.0-150600.10.61.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-24T12:42:49Z",
"details": "moderate"
}
],
"title": "CVE-2025-40083"
},
{
"cve": "CVE-2025-40098",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40098"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nALSA: hda: cs35l41: Fix NULL pointer dereference in cs35l41_get_acpi_mute_state()\n\nReturn value of a function acpi_evaluate_dsm() is dereferenced without\nchecking for NULL, but it is usually checked for this function.\n\nacpi_evaluate_dsm() may return NULL, when acpi_evaluate_object() returns\nacpi_status other than ACPI_SUCCESS, so add a check to prevent the crach.\n\nFound by Linux Verification Center (linuxtesting.org) with SVACE.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_10_61-rt-1-150600.1.3.1.x86_64",
"SUSE Real Time Module 15 SP6:cluster-md-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:dlm-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:gfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-devel-rt-6.4.0-150600.10.61.1.noarch",
"SUSE Real Time Module 15 SP6:kernel-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-rt-devel-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-rt_debug-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-rt_debug-devel-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-source-rt-6.4.0-150600.10.61.1.noarch",
"SUSE Real Time Module 15 SP6:kernel-syms-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:ocfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:gfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-rt-6.4.0-150600.10.61.1.noarch",
"openSUSE Leap 15.6:kernel-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-devel-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-extra-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-livepatch-devel-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-optional-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-vdso-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt_debug-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt_debug-devel-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt_debug-vdso-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-source-rt-6.4.0-150600.10.61.1.noarch",
"openSUSE Leap 15.6:kernel-syms-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kselftests-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-rt-6.4.0-150600.10.61.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40098",
"url": "https://www.suse.com/security/cve/CVE-2025-40098"
},
{
"category": "external",
"summary": "SUSE Bug 1252917 for CVE-2025-40098",
"url": "https://bugzilla.suse.com/1252917"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_10_61-rt-1-150600.1.3.1.x86_64",
"SUSE Real Time Module 15 SP6:cluster-md-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:dlm-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:gfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-devel-rt-6.4.0-150600.10.61.1.noarch",
"SUSE Real Time Module 15 SP6:kernel-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-rt-devel-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-rt_debug-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-rt_debug-devel-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-source-rt-6.4.0-150600.10.61.1.noarch",
"SUSE Real Time Module 15 SP6:kernel-syms-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:ocfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:gfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-rt-6.4.0-150600.10.61.1.noarch",
"openSUSE Leap 15.6:kernel-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-devel-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-extra-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-livepatch-devel-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-optional-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-vdso-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt_debug-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt_debug-devel-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt_debug-vdso-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-source-rt-6.4.0-150600.10.61.1.noarch",
"openSUSE Leap 15.6:kernel-syms-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kselftests-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-rt-6.4.0-150600.10.61.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_10_61-rt-1-150600.1.3.1.x86_64",
"SUSE Real Time Module 15 SP6:cluster-md-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:dlm-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:gfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-devel-rt-6.4.0-150600.10.61.1.noarch",
"SUSE Real Time Module 15 SP6:kernel-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-rt-devel-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-rt_debug-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-rt_debug-devel-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-source-rt-6.4.0-150600.10.61.1.noarch",
"SUSE Real Time Module 15 SP6:kernel-syms-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:ocfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:gfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-rt-6.4.0-150600.10.61.1.noarch",
"openSUSE Leap 15.6:kernel-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-devel-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-extra-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-livepatch-devel-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-optional-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-vdso-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt_debug-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt_debug-devel-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt_debug-vdso-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-source-rt-6.4.0-150600.10.61.1.noarch",
"openSUSE Leap 15.6:kernel-syms-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kselftests-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-rt-6.4.0-150600.10.61.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-24T12:42:49Z",
"details": "moderate"
}
],
"title": "CVE-2025-40098"
},
{
"cve": "CVE-2025-40105",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40105"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nvfs: Don\u0027t leak disconnected dentries on umount\n\nWhen user calls open_by_handle_at() on some inode that is not cached, we\nwill create disconnected dentry for it. If such dentry is a directory,\nexportfs_decode_fh_raw() will then try to connect this dentry to the\ndentry tree through reconnect_path(). It may happen for various reasons\n(such as corrupted fs or race with rename) that the call to\nlookup_one_unlocked() in reconnect_one() will fail to find the dentry we\nare trying to reconnect and instead create a new dentry under the\nparent. Now this dentry will not be marked as disconnected although the\nparent still may well be disconnected (at least in case this\ninconsistency happened because the fs is corrupted and .. doesn\u0027t point\nto the real parent directory). This creates inconsistency in\ndisconnected flags but AFAICS it was mostly harmless. At least until\ncommit f1ee616214cb (\"VFS: don\u0027t keep disconnected dentries on d_anon\")\nwhich removed adding of most disconnected dentries to sb-\u003es_anon list.\nThus after this commit cleanup of disconnected dentries implicitely\nrelies on the fact that dput() will immediately reclaim such dentries.\nHowever when some leaf dentry isn\u0027t marked as disconnected, as in the\nscenario described above, the reclaim doesn\u0027t happen and the dentries\nare \"leaked\". Memory reclaim can eventually reclaim them but otherwise\nthey stay in memory and if umount comes first, we hit infamous \"Busy\ninodes after unmount\" bug. Make sure all dentries created under a\ndisconnected parent are marked as disconnected as well.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_10_61-rt-1-150600.1.3.1.x86_64",
"SUSE Real Time Module 15 SP6:cluster-md-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:dlm-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:gfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-devel-rt-6.4.0-150600.10.61.1.noarch",
"SUSE Real Time Module 15 SP6:kernel-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-rt-devel-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-rt_debug-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-rt_debug-devel-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-source-rt-6.4.0-150600.10.61.1.noarch",
"SUSE Real Time Module 15 SP6:kernel-syms-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:ocfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:gfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-rt-6.4.0-150600.10.61.1.noarch",
"openSUSE Leap 15.6:kernel-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-devel-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-extra-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-livepatch-devel-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-optional-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-vdso-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt_debug-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt_debug-devel-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt_debug-vdso-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-source-rt-6.4.0-150600.10.61.1.noarch",
"openSUSE Leap 15.6:kernel-syms-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kselftests-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-rt-6.4.0-150600.10.61.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40105",
"url": "https://www.suse.com/security/cve/CVE-2025-40105"
},
{
"category": "external",
"summary": "SUSE Bug 1252928 for CVE-2025-40105",
"url": "https://bugzilla.suse.com/1252928"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_10_61-rt-1-150600.1.3.1.x86_64",
"SUSE Real Time Module 15 SP6:cluster-md-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:dlm-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:gfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-devel-rt-6.4.0-150600.10.61.1.noarch",
"SUSE Real Time Module 15 SP6:kernel-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-rt-devel-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-rt_debug-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-rt_debug-devel-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-source-rt-6.4.0-150600.10.61.1.noarch",
"SUSE Real Time Module 15 SP6:kernel-syms-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:ocfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:gfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-rt-6.4.0-150600.10.61.1.noarch",
"openSUSE Leap 15.6:kernel-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-devel-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-extra-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-livepatch-devel-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-optional-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-vdso-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt_debug-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt_debug-devel-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt_debug-vdso-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-source-rt-6.4.0-150600.10.61.1.noarch",
"openSUSE Leap 15.6:kernel-syms-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kselftests-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-rt-6.4.0-150600.10.61.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.3,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_10_61-rt-1-150600.1.3.1.x86_64",
"SUSE Real Time Module 15 SP6:cluster-md-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:dlm-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:gfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-devel-rt-6.4.0-150600.10.61.1.noarch",
"SUSE Real Time Module 15 SP6:kernel-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-rt-devel-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-rt_debug-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-rt_debug-devel-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-source-rt-6.4.0-150600.10.61.1.noarch",
"SUSE Real Time Module 15 SP6:kernel-syms-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:ocfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:gfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-rt-6.4.0-150600.10.61.1.noarch",
"openSUSE Leap 15.6:kernel-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-devel-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-extra-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-livepatch-devel-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-optional-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-vdso-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt_debug-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt_debug-devel-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt_debug-vdso-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-source-rt-6.4.0-150600.10.61.1.noarch",
"openSUSE Leap 15.6:kernel-syms-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kselftests-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-rt-6.4.0-150600.10.61.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-24T12:42:49Z",
"details": "low"
}
],
"title": "CVE-2025-40105"
},
{
"cve": "CVE-2025-40107",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40107"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\ncan: hi311x: fix null pointer dereference when resuming from sleep before interface was enabled\n\nThis issue is similar to the vulnerability in the `mcp251x` driver,\nwhich was fixed in commit 03c427147b2d (\"can: mcp251x: fix resume from\nsleep before interface was brought up\").\n\nIn the `hi311x` driver, when the device resumes from sleep, the driver\nschedules `priv-\u003erestart_work`. However, if the network interface was\nnot previously enabled, the `priv-\u003ewq` (workqueue) is not allocated and\ninitialized, leading to a null pointer dereference.\n\nTo fix this, we move the allocation and initialization of the workqueue\nfrom the `hi3110_open` function to the `hi3110_can_probe` function.\nThis ensures that the workqueue is properly initialized before it is\nused during device resume. And added logic to destroy the workqueue\nin the error handling paths of `hi3110_can_probe` and in the\n`hi3110_can_remove` function to prevent resource leaks.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_10_61-rt-1-150600.1.3.1.x86_64",
"SUSE Real Time Module 15 SP6:cluster-md-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:dlm-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:gfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-devel-rt-6.4.0-150600.10.61.1.noarch",
"SUSE Real Time Module 15 SP6:kernel-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-rt-devel-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-rt_debug-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-rt_debug-devel-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-source-rt-6.4.0-150600.10.61.1.noarch",
"SUSE Real Time Module 15 SP6:kernel-syms-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:ocfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:gfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-rt-6.4.0-150600.10.61.1.noarch",
"openSUSE Leap 15.6:kernel-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-devel-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-extra-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-livepatch-devel-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-optional-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-vdso-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt_debug-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt_debug-devel-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt_debug-vdso-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-source-rt-6.4.0-150600.10.61.1.noarch",
"openSUSE Leap 15.6:kernel-syms-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kselftests-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-rt-6.4.0-150600.10.61.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40107",
"url": "https://www.suse.com/security/cve/CVE-2025-40107"
},
{
"category": "external",
"summary": "SUSE Bug 1253018 for CVE-2025-40107",
"url": "https://bugzilla.suse.com/1253018"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_10_61-rt-1-150600.1.3.1.x86_64",
"SUSE Real Time Module 15 SP6:cluster-md-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:dlm-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:gfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-devel-rt-6.4.0-150600.10.61.1.noarch",
"SUSE Real Time Module 15 SP6:kernel-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-rt-devel-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-rt_debug-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-rt_debug-devel-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-source-rt-6.4.0-150600.10.61.1.noarch",
"SUSE Real Time Module 15 SP6:kernel-syms-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:ocfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:gfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-rt-6.4.0-150600.10.61.1.noarch",
"openSUSE Leap 15.6:kernel-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-devel-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-extra-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-livepatch-devel-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-optional-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-vdso-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt_debug-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt_debug-devel-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt_debug-vdso-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-source-rt-6.4.0-150600.10.61.1.noarch",
"openSUSE Leap 15.6:kernel-syms-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kselftests-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-rt-6.4.0-150600.10.61.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_10_61-rt-1-150600.1.3.1.x86_64",
"SUSE Real Time Module 15 SP6:cluster-md-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:dlm-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:gfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-devel-rt-6.4.0-150600.10.61.1.noarch",
"SUSE Real Time Module 15 SP6:kernel-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-rt-devel-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-rt_debug-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-rt_debug-devel-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-source-rt-6.4.0-150600.10.61.1.noarch",
"SUSE Real Time Module 15 SP6:kernel-syms-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:ocfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:gfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-rt-6.4.0-150600.10.61.1.noarch",
"openSUSE Leap 15.6:kernel-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-devel-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-extra-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-livepatch-devel-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-optional-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-vdso-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt_debug-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt_debug-devel-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt_debug-vdso-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-source-rt-6.4.0-150600.10.61.1.noarch",
"openSUSE Leap 15.6:kernel-syms-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kselftests-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-rt-6.4.0-150600.10.61.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-24T12:42:49Z",
"details": "moderate"
}
],
"title": "CVE-2025-40107"
},
{
"cve": "CVE-2025-40109",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40109"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\ncrypto: rng - Ensure set_ent is always present\n\nEnsure that set_ent is always set since only drbg provides it.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_10_61-rt-1-150600.1.3.1.x86_64",
"SUSE Real Time Module 15 SP6:cluster-md-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:dlm-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:gfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-devel-rt-6.4.0-150600.10.61.1.noarch",
"SUSE Real Time Module 15 SP6:kernel-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-rt-devel-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-rt_debug-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-rt_debug-devel-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-source-rt-6.4.0-150600.10.61.1.noarch",
"SUSE Real Time Module 15 SP6:kernel-syms-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:ocfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:gfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-rt-6.4.0-150600.10.61.1.noarch",
"openSUSE Leap 15.6:kernel-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-devel-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-extra-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-livepatch-devel-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-optional-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-vdso-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt_debug-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt_debug-devel-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt_debug-vdso-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-source-rt-6.4.0-150600.10.61.1.noarch",
"openSUSE Leap 15.6:kernel-syms-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kselftests-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-rt-6.4.0-150600.10.61.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40109",
"url": "https://www.suse.com/security/cve/CVE-2025-40109"
},
{
"category": "external",
"summary": "SUSE Bug 1253176 for CVE-2025-40109",
"url": "https://bugzilla.suse.com/1253176"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_10_61-rt-1-150600.1.3.1.x86_64",
"SUSE Real Time Module 15 SP6:cluster-md-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:dlm-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:gfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-devel-rt-6.4.0-150600.10.61.1.noarch",
"SUSE Real Time Module 15 SP6:kernel-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-rt-devel-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-rt_debug-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-rt_debug-devel-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-source-rt-6.4.0-150600.10.61.1.noarch",
"SUSE Real Time Module 15 SP6:kernel-syms-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:ocfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:gfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-rt-6.4.0-150600.10.61.1.noarch",
"openSUSE Leap 15.6:kernel-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-devel-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-extra-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-livepatch-devel-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-optional-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-vdso-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt_debug-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt_debug-devel-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt_debug-vdso-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-source-rt-6.4.0-150600.10.61.1.noarch",
"openSUSE Leap 15.6:kernel-syms-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kselftests-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-rt-6.4.0-150600.10.61.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_10_61-rt-1-150600.1.3.1.x86_64",
"SUSE Real Time Module 15 SP6:cluster-md-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:dlm-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:gfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-devel-rt-6.4.0-150600.10.61.1.noarch",
"SUSE Real Time Module 15 SP6:kernel-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-rt-devel-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-rt_debug-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-rt_debug-devel-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-source-rt-6.4.0-150600.10.61.1.noarch",
"SUSE Real Time Module 15 SP6:kernel-syms-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:ocfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:gfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-rt-6.4.0-150600.10.61.1.noarch",
"openSUSE Leap 15.6:kernel-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-devel-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-extra-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-livepatch-devel-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-optional-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-vdso-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt_debug-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt_debug-devel-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt_debug-vdso-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-source-rt-6.4.0-150600.10.61.1.noarch",
"openSUSE Leap 15.6:kernel-syms-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kselftests-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-rt-6.4.0-150600.10.61.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-24T12:42:49Z",
"details": "moderate"
}
],
"title": "CVE-2025-40109"
},
{
"cve": "CVE-2025-40110",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40110"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\ndrm/vmwgfx: Fix a null-ptr access in the cursor snooper\n\nCheck that the resource which is converted to a surface exists before\ntrying to use the cursor snooper on it.\n\nvmw_cmd_res_check allows explicit invalid (SVGA3D_INVALID_ID) identifiers\nbecause some svga commands accept SVGA3D_INVALID_ID to mean \"no surface\",\nunfortunately functions that accept the actual surfaces as objects might\n(and in case of the cursor snooper, do not) be able to handle null\nobjects. Make sure that we validate not only the identifier (via the\nvmw_cmd_res_check) but also check that the actual resource exists before\ntrying to do something with it.\n\nFixes unchecked null-ptr reference in the snooping code.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_10_61-rt-1-150600.1.3.1.x86_64",
"SUSE Real Time Module 15 SP6:cluster-md-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:dlm-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:gfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-devel-rt-6.4.0-150600.10.61.1.noarch",
"SUSE Real Time Module 15 SP6:kernel-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-rt-devel-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-rt_debug-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-rt_debug-devel-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-source-rt-6.4.0-150600.10.61.1.noarch",
"SUSE Real Time Module 15 SP6:kernel-syms-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:ocfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:gfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-rt-6.4.0-150600.10.61.1.noarch",
"openSUSE Leap 15.6:kernel-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-devel-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-extra-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-livepatch-devel-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-optional-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-vdso-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt_debug-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt_debug-devel-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt_debug-vdso-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-source-rt-6.4.0-150600.10.61.1.noarch",
"openSUSE Leap 15.6:kernel-syms-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kselftests-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-rt-6.4.0-150600.10.61.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40110",
"url": "https://www.suse.com/security/cve/CVE-2025-40110"
},
{
"category": "external",
"summary": "SUSE Bug 1253275 for CVE-2025-40110",
"url": "https://bugzilla.suse.com/1253275"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_10_61-rt-1-150600.1.3.1.x86_64",
"SUSE Real Time Module 15 SP6:cluster-md-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:dlm-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:gfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-devel-rt-6.4.0-150600.10.61.1.noarch",
"SUSE Real Time Module 15 SP6:kernel-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-rt-devel-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-rt_debug-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-rt_debug-devel-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-source-rt-6.4.0-150600.10.61.1.noarch",
"SUSE Real Time Module 15 SP6:kernel-syms-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:ocfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:gfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-rt-6.4.0-150600.10.61.1.noarch",
"openSUSE Leap 15.6:kernel-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-devel-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-extra-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-livepatch-devel-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-optional-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-vdso-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt_debug-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt_debug-devel-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt_debug-vdso-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-source-rt-6.4.0-150600.10.61.1.noarch",
"openSUSE Leap 15.6:kernel-syms-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kselftests-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-rt-6.4.0-150600.10.61.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.1,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_10_61-rt-1-150600.1.3.1.x86_64",
"SUSE Real Time Module 15 SP6:cluster-md-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:dlm-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:gfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-devel-rt-6.4.0-150600.10.61.1.noarch",
"SUSE Real Time Module 15 SP6:kernel-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-rt-devel-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-rt_debug-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-rt_debug-devel-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-source-rt-6.4.0-150600.10.61.1.noarch",
"SUSE Real Time Module 15 SP6:kernel-syms-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:ocfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:gfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-rt-6.4.0-150600.10.61.1.noarch",
"openSUSE Leap 15.6:kernel-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-devel-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-extra-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-livepatch-devel-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-optional-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-vdso-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt_debug-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt_debug-devel-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt_debug-vdso-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-source-rt-6.4.0-150600.10.61.1.noarch",
"openSUSE Leap 15.6:kernel-syms-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kselftests-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-rt-6.4.0-150600.10.61.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-24T12:42:49Z",
"details": "moderate"
}
],
"title": "CVE-2025-40110"
},
{
"cve": "CVE-2025-40111",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40111"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\ndrm/vmwgfx: Fix Use-after-free in validation\n\nNodes stored in the validation duplicates hashtable come from an arena\nallocator that is cleared at the end of vmw_execbuf_process. All nodes\nare expected to be cleared in vmw_validation_drop_ht but this node escaped\nbecause its resource was destroyed prematurely.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_10_61-rt-1-150600.1.3.1.x86_64",
"SUSE Real Time Module 15 SP6:cluster-md-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:dlm-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:gfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-devel-rt-6.4.0-150600.10.61.1.noarch",
"SUSE Real Time Module 15 SP6:kernel-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-rt-devel-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-rt_debug-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-rt_debug-devel-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-source-rt-6.4.0-150600.10.61.1.noarch",
"SUSE Real Time Module 15 SP6:kernel-syms-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:ocfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:gfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-rt-6.4.0-150600.10.61.1.noarch",
"openSUSE Leap 15.6:kernel-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-devel-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-extra-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-livepatch-devel-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-optional-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-vdso-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt_debug-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt_debug-devel-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt_debug-vdso-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-source-rt-6.4.0-150600.10.61.1.noarch",
"openSUSE Leap 15.6:kernel-syms-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kselftests-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-rt-6.4.0-150600.10.61.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40111",
"url": "https://www.suse.com/security/cve/CVE-2025-40111"
},
{
"category": "external",
"summary": "SUSE Bug 1253362 for CVE-2025-40111",
"url": "https://bugzilla.suse.com/1253362"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_10_61-rt-1-150600.1.3.1.x86_64",
"SUSE Real Time Module 15 SP6:cluster-md-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:dlm-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:gfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-devel-rt-6.4.0-150600.10.61.1.noarch",
"SUSE Real Time Module 15 SP6:kernel-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-rt-devel-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-rt_debug-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-rt_debug-devel-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-source-rt-6.4.0-150600.10.61.1.noarch",
"SUSE Real Time Module 15 SP6:kernel-syms-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:ocfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:gfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-rt-6.4.0-150600.10.61.1.noarch",
"openSUSE Leap 15.6:kernel-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-devel-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-extra-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-livepatch-devel-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-optional-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-vdso-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt_debug-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt_debug-devel-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt_debug-vdso-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-source-rt-6.4.0-150600.10.61.1.noarch",
"openSUSE Leap 15.6:kernel-syms-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kselftests-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-rt-6.4.0-150600.10.61.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.7,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:L/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_10_61-rt-1-150600.1.3.1.x86_64",
"SUSE Real Time Module 15 SP6:cluster-md-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:dlm-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:gfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-devel-rt-6.4.0-150600.10.61.1.noarch",
"SUSE Real Time Module 15 SP6:kernel-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-rt-devel-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-rt_debug-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-rt_debug-devel-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-source-rt-6.4.0-150600.10.61.1.noarch",
"SUSE Real Time Module 15 SP6:kernel-syms-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:ocfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:gfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-rt-6.4.0-150600.10.61.1.noarch",
"openSUSE Leap 15.6:kernel-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-devel-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-extra-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-livepatch-devel-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-optional-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-vdso-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt_debug-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt_debug-devel-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt_debug-vdso-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-source-rt-6.4.0-150600.10.61.1.noarch",
"openSUSE Leap 15.6:kernel-syms-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kselftests-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-rt-6.4.0-150600.10.61.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-24T12:42:49Z",
"details": "moderate"
}
],
"title": "CVE-2025-40111"
},
{
"cve": "CVE-2025-40115",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40115"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nscsi: mpt3sas: Fix crash in transport port remove by using ioc_info()\n\nDuring mpt3sas_transport_port_remove(), messages were logged with\ndev_printk() against \u0026mpt3sas_port-\u003eport-\u003edev. At this point the SAS\ntransport device may already be partially unregistered or freed, leading\nto a crash when accessing its struct device.\n\nUsing ioc_info(), which logs via the PCI device (ioc-\u003epdev-\u003edev),\nguaranteed to remain valid until driver removal.\n\n[83428.295776] Oops: general protection fault, probably for non-canonical address 0x6f702f323a33312d: 0000 [#1] SMP NOPTI\n[83428.295785] CPU: 145 UID: 0 PID: 113296 Comm: rmmod Kdump: loaded Tainted: G OE 6.16.0-rc1+ #1 PREEMPT(voluntary)\n[83428.295792] Tainted: [O]=OOT_MODULE, [E]=UNSIGNED_MODULE\n[83428.295795] Hardware name: Dell Inc. Precision 7875 Tower/, BIOS 89.1.67 02/23/2024\n[83428.295799] RIP: 0010:__dev_printk+0x1f/0x70\n[83428.295805] Code: 90 90 90 90 90 90 90 90 90 90 90 0f 1f 44 00 00 49 89 d1 48 85 f6 74 52 4c 8b 46 50 4d 85 c0 74 1f 48 8b 46 68 48 85 c0 74 22 \u003c48\u003e 8b 08 0f b6 7f 01 48 c7 c2 db e8 42 ad 83 ef 30 e9 7b f8 ff ff\n[83428.295813] RSP: 0018:ff85aeafc3137bb0 EFLAGS: 00010206\n[83428.295817] RAX: 6f702f323a33312d RBX: ff4290ee81292860 RCX: 5000cca25103be32\n[83428.295820] RDX: ff85aeafc3137bb8 RSI: ff4290eeb1966c00 RDI: ffffffffc1560845\n[83428.295823] RBP: ff85aeafc3137c18 R08: 74726f702f303a33 R09: ff85aeafc3137bb8\n[83428.295826] R10: ff85aeafc3137b18 R11: ff4290f5bd60fe68 R12: ff4290ee81290000\n[83428.295830] R13: ff4290ee6e345de0 R14: ff4290ee81290000 R15: ff4290ee6e345e30\n[83428.295833] FS: 00007fd9472a6740(0000) GS:ff4290f5ce96b000(0000) knlGS:0000000000000000\n[83428.295837] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033\n[83428.295840] CR2: 00007f242b4db238 CR3: 00000002372b8006 CR4: 0000000000771ef0\n[83428.295844] PKRU: 55555554\n[83428.295846] Call Trace:\n[83428.295848] \u003cTASK\u003e\n[83428.295850] _dev_printk+0x5c/0x80\n[83428.295857] ? srso_alias_return_thunk+0x5/0xfbef5\n[83428.295863] mpt3sas_transport_port_remove+0x1c7/0x420 [mpt3sas]\n[83428.295882] _scsih_remove_device+0x21b/0x280 [mpt3sas]\n[83428.295894] ? _scsih_expander_node_remove+0x108/0x140 [mpt3sas]\n[83428.295906] ? srso_alias_return_thunk+0x5/0xfbef5\n[83428.295910] mpt3sas_device_remove_by_sas_address.part.0+0x8f/0x110 [mpt3sas]\n[83428.295921] _scsih_expander_node_remove+0x129/0x140 [mpt3sas]\n[83428.295933] _scsih_expander_node_remove+0x6a/0x140 [mpt3sas]\n[83428.295944] scsih_remove+0x3f0/0x4a0 [mpt3sas]\n[83428.295957] pci_device_remove+0x3b/0xb0\n[83428.295962] device_release_driver_internal+0x193/0x200\n[83428.295968] driver_detach+0x44/0x90\n[83428.295971] bus_remove_driver+0x69/0xf0\n[83428.295975] pci_unregister_driver+0x2a/0xb0\n[83428.295979] _mpt3sas_exit+0x1f/0x300 [mpt3sas]\n[83428.295991] __do_sys_delete_module.constprop.0+0x174/0x310\n[83428.295997] ? srso_alias_return_thunk+0x5/0xfbef5\n[83428.296000] ? __x64_sys_getdents64+0x9a/0x110\n[83428.296005] ? srso_alias_return_thunk+0x5/0xfbef5\n[83428.296009] ? syscall_trace_enter+0xf6/0x1b0\n[83428.296014] do_syscall_64+0x7b/0x2c0\n[83428.296019] ? srso_alias_return_thunk+0x5/0xfbef5\n[83428.296023] entry_SYSCALL_64_after_hwframe+0x76/0x7e",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_10_61-rt-1-150600.1.3.1.x86_64",
"SUSE Real Time Module 15 SP6:cluster-md-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:dlm-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:gfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-devel-rt-6.4.0-150600.10.61.1.noarch",
"SUSE Real Time Module 15 SP6:kernel-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-rt-devel-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-rt_debug-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-rt_debug-devel-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-source-rt-6.4.0-150600.10.61.1.noarch",
"SUSE Real Time Module 15 SP6:kernel-syms-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:ocfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:gfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-rt-6.4.0-150600.10.61.1.noarch",
"openSUSE Leap 15.6:kernel-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-devel-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-extra-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-livepatch-devel-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-optional-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-vdso-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt_debug-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt_debug-devel-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt_debug-vdso-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-source-rt-6.4.0-150600.10.61.1.noarch",
"openSUSE Leap 15.6:kernel-syms-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kselftests-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-rt-6.4.0-150600.10.61.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40115",
"url": "https://www.suse.com/security/cve/CVE-2025-40115"
},
{
"category": "external",
"summary": "SUSE Bug 1253318 for CVE-2025-40115",
"url": "https://bugzilla.suse.com/1253318"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_10_61-rt-1-150600.1.3.1.x86_64",
"SUSE Real Time Module 15 SP6:cluster-md-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:dlm-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:gfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-devel-rt-6.4.0-150600.10.61.1.noarch",
"SUSE Real Time Module 15 SP6:kernel-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-rt-devel-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-rt_debug-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-rt_debug-devel-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-source-rt-6.4.0-150600.10.61.1.noarch",
"SUSE Real Time Module 15 SP6:kernel-syms-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:ocfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:gfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-rt-6.4.0-150600.10.61.1.noarch",
"openSUSE Leap 15.6:kernel-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-devel-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-extra-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-livepatch-devel-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-optional-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-vdso-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt_debug-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt_debug-devel-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt_debug-vdso-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-source-rt-6.4.0-150600.10.61.1.noarch",
"openSUSE Leap 15.6:kernel-syms-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kselftests-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-rt-6.4.0-150600.10.61.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_10_61-rt-1-150600.1.3.1.x86_64",
"SUSE Real Time Module 15 SP6:cluster-md-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:dlm-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:gfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-devel-rt-6.4.0-150600.10.61.1.noarch",
"SUSE Real Time Module 15 SP6:kernel-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-rt-devel-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-rt_debug-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-rt_debug-devel-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-source-rt-6.4.0-150600.10.61.1.noarch",
"SUSE Real Time Module 15 SP6:kernel-syms-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:ocfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:gfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-rt-6.4.0-150600.10.61.1.noarch",
"openSUSE Leap 15.6:kernel-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-devel-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-extra-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-livepatch-devel-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-optional-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-vdso-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt_debug-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt_debug-devel-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt_debug-vdso-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-source-rt-6.4.0-150600.10.61.1.noarch",
"openSUSE Leap 15.6:kernel-syms-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kselftests-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-rt-6.4.0-150600.10.61.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-24T12:42:49Z",
"details": "moderate"
}
],
"title": "CVE-2025-40115"
},
{
"cve": "CVE-2025-40116",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40116"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nusb: host: max3421-hcd: Fix error pointer dereference in probe cleanup\n\nThe kthread_run() function returns error pointers so the\nmax3421_hcd-\u003espi_thread pointer can be either error pointers or NULL.\nCheck for both before dereferencing it.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_10_61-rt-1-150600.1.3.1.x86_64",
"SUSE Real Time Module 15 SP6:cluster-md-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:dlm-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:gfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-devel-rt-6.4.0-150600.10.61.1.noarch",
"SUSE Real Time Module 15 SP6:kernel-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-rt-devel-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-rt_debug-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-rt_debug-devel-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-source-rt-6.4.0-150600.10.61.1.noarch",
"SUSE Real Time Module 15 SP6:kernel-syms-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:ocfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:gfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-rt-6.4.0-150600.10.61.1.noarch",
"openSUSE Leap 15.6:kernel-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-devel-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-extra-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-livepatch-devel-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-optional-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-vdso-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt_debug-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt_debug-devel-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt_debug-vdso-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-source-rt-6.4.0-150600.10.61.1.noarch",
"openSUSE Leap 15.6:kernel-syms-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kselftests-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-rt-6.4.0-150600.10.61.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40116",
"url": "https://www.suse.com/security/cve/CVE-2025-40116"
},
{
"category": "external",
"summary": "SUSE Bug 1253324 for CVE-2025-40116",
"url": "https://bugzilla.suse.com/1253324"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_10_61-rt-1-150600.1.3.1.x86_64",
"SUSE Real Time Module 15 SP6:cluster-md-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:dlm-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:gfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-devel-rt-6.4.0-150600.10.61.1.noarch",
"SUSE Real Time Module 15 SP6:kernel-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-rt-devel-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-rt_debug-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-rt_debug-devel-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-source-rt-6.4.0-150600.10.61.1.noarch",
"SUSE Real Time Module 15 SP6:kernel-syms-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:ocfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:gfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-rt-6.4.0-150600.10.61.1.noarch",
"openSUSE Leap 15.6:kernel-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-devel-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-extra-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-livepatch-devel-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-optional-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-vdso-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt_debug-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt_debug-devel-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt_debug-vdso-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-source-rt-6.4.0-150600.10.61.1.noarch",
"openSUSE Leap 15.6:kernel-syms-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kselftests-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-rt-6.4.0-150600.10.61.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_10_61-rt-1-150600.1.3.1.x86_64",
"SUSE Real Time Module 15 SP6:cluster-md-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:dlm-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:gfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-devel-rt-6.4.0-150600.10.61.1.noarch",
"SUSE Real Time Module 15 SP6:kernel-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-rt-devel-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-rt_debug-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-rt_debug-devel-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-source-rt-6.4.0-150600.10.61.1.noarch",
"SUSE Real Time Module 15 SP6:kernel-syms-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:ocfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:gfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-rt-6.4.0-150600.10.61.1.noarch",
"openSUSE Leap 15.6:kernel-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-devel-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-extra-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-livepatch-devel-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-optional-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-vdso-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt_debug-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt_debug-devel-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt_debug-vdso-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-source-rt-6.4.0-150600.10.61.1.noarch",
"openSUSE Leap 15.6:kernel-syms-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kselftests-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-rt-6.4.0-150600.10.61.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-24T12:42:49Z",
"details": "moderate"
}
],
"title": "CVE-2025-40116"
},
{
"cve": "CVE-2025-40118",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40118"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nscsi: pm80xx: Fix array-index-out-of-of-bounds on rmmod\n\nSince commit f7b705c238d1 (\"scsi: pm80xx: Set phy_attached to zero when\ndevice is gone\") UBSAN reports:\n\n UBSAN: array-index-out-of-bounds in drivers/scsi/pm8001/pm8001_sas.c:786:17\n index 28 is out of range for type \u0027pm8001_phy [16]\u0027\n\non rmmod when using an expander.\n\nFor a direct attached device, attached_phy contains the local phy id.\nFor a device behind an expander, attached_phy contains the remote phy\nid, not the local phy id.\n\nI.e. while pm8001_ha will have pm8001_ha-\u003echip-\u003en_phy local phys, for a\ndevice behind an expander, attached_phy can be much larger than\npm8001_ha-\u003echip-\u003en_phy (depending on the amount of phys of the\nexpander).\n\nE.g. on my system pm8001_ha has 8 phys with phy ids 0-7. One of the\nports has an expander connected. The expander has 31 phys with phy ids\n0-30.\n\nThe pm8001_ha-\u003ephy array only contains the phys of the HBA. It does not\ncontain the phys of the expander. Thus, it is wrong to use attached_phy\nto index the pm8001_ha-\u003ephy array for a device behind an expander.\n\nThus, we can only clear phy_attached for devices that are directly\nattached.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_10_61-rt-1-150600.1.3.1.x86_64",
"SUSE Real Time Module 15 SP6:cluster-md-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:dlm-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:gfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-devel-rt-6.4.0-150600.10.61.1.noarch",
"SUSE Real Time Module 15 SP6:kernel-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-rt-devel-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-rt_debug-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-rt_debug-devel-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-source-rt-6.4.0-150600.10.61.1.noarch",
"SUSE Real Time Module 15 SP6:kernel-syms-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:ocfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:gfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-rt-6.4.0-150600.10.61.1.noarch",
"openSUSE Leap 15.6:kernel-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-devel-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-extra-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-livepatch-devel-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-optional-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-vdso-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt_debug-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt_debug-devel-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt_debug-vdso-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-source-rt-6.4.0-150600.10.61.1.noarch",
"openSUSE Leap 15.6:kernel-syms-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kselftests-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-rt-6.4.0-150600.10.61.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40118",
"url": "https://www.suse.com/security/cve/CVE-2025-40118"
},
{
"category": "external",
"summary": "SUSE Bug 1253363 for CVE-2025-40118",
"url": "https://bugzilla.suse.com/1253363"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_10_61-rt-1-150600.1.3.1.x86_64",
"SUSE Real Time Module 15 SP6:cluster-md-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:dlm-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:gfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-devel-rt-6.4.0-150600.10.61.1.noarch",
"SUSE Real Time Module 15 SP6:kernel-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-rt-devel-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-rt_debug-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-rt_debug-devel-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-source-rt-6.4.0-150600.10.61.1.noarch",
"SUSE Real Time Module 15 SP6:kernel-syms-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:ocfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:gfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-rt-6.4.0-150600.10.61.1.noarch",
"openSUSE Leap 15.6:kernel-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-devel-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-extra-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-livepatch-devel-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-optional-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-vdso-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt_debug-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt_debug-devel-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt_debug-vdso-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-source-rt-6.4.0-150600.10.61.1.noarch",
"openSUSE Leap 15.6:kernel-syms-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kselftests-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-rt-6.4.0-150600.10.61.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.1,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_10_61-rt-1-150600.1.3.1.x86_64",
"SUSE Real Time Module 15 SP6:cluster-md-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:dlm-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:gfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-devel-rt-6.4.0-150600.10.61.1.noarch",
"SUSE Real Time Module 15 SP6:kernel-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-rt-devel-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-rt_debug-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-rt_debug-devel-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-source-rt-6.4.0-150600.10.61.1.noarch",
"SUSE Real Time Module 15 SP6:kernel-syms-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:ocfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:gfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-rt-6.4.0-150600.10.61.1.noarch",
"openSUSE Leap 15.6:kernel-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-devel-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-extra-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-livepatch-devel-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-optional-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-vdso-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt_debug-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt_debug-devel-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt_debug-vdso-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-source-rt-6.4.0-150600.10.61.1.noarch",
"openSUSE Leap 15.6:kernel-syms-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kselftests-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-rt-6.4.0-150600.10.61.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-24T12:42:49Z",
"details": "moderate"
}
],
"title": "CVE-2025-40118"
},
{
"cve": "CVE-2025-40120",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40120"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnet: usb: asix: hold PM usage ref to avoid PM/MDIO + RTNL deadlock\n\nPrevent USB runtime PM (autosuspend) for AX88772* in bind.\n\nusbnet enables runtime PM (autosuspend) by default, so disabling it via\nthe usb_driver flag is ineffective. On AX88772B, autosuspend shows no\nmeasurable power saving with current driver (no link partner, admin\nup/down). The ~0.453 W -\u003e ~0.248 W drop on v6.1 comes from phylib powering\nthe PHY off on admin-down, not from USB autosuspend.\n\nThe real hazard is that with runtime PM enabled, ndo_open() (under RTNL)\nmay synchronously trigger autoresume (usb_autopm_get_interface()) into\nasix_resume() while the USB PM lock is held. Resume paths then invoke\nphylink/phylib and MDIO, which also expect RTNL, leading to possible\ndeadlocks or PM lock vs MDIO wake issues.\n\nTo avoid this, keep the device runtime-PM active by taking a usage\nreference in ax88772_bind() and dropping it in unbind(). A non-zero PM\nusage count blocks runtime suspend regardless of userspace policy\n(.../power/control - pm_runtime_allow/forbid), making this approach\nrobust against sysfs overrides.\n\nHolding a runtime-PM usage ref does not affect system-wide suspend;\nsystem sleep/resume callbacks continue to run as before.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_10_61-rt-1-150600.1.3.1.x86_64",
"SUSE Real Time Module 15 SP6:cluster-md-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:dlm-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:gfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-devel-rt-6.4.0-150600.10.61.1.noarch",
"SUSE Real Time Module 15 SP6:kernel-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-rt-devel-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-rt_debug-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-rt_debug-devel-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-source-rt-6.4.0-150600.10.61.1.noarch",
"SUSE Real Time Module 15 SP6:kernel-syms-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:ocfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:gfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-rt-6.4.0-150600.10.61.1.noarch",
"openSUSE Leap 15.6:kernel-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-devel-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-extra-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-livepatch-devel-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-optional-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-vdso-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt_debug-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt_debug-devel-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt_debug-vdso-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-source-rt-6.4.0-150600.10.61.1.noarch",
"openSUSE Leap 15.6:kernel-syms-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kselftests-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-rt-6.4.0-150600.10.61.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40120",
"url": "https://www.suse.com/security/cve/CVE-2025-40120"
},
{
"category": "external",
"summary": "SUSE Bug 1253360 for CVE-2025-40120",
"url": "https://bugzilla.suse.com/1253360"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_10_61-rt-1-150600.1.3.1.x86_64",
"SUSE Real Time Module 15 SP6:cluster-md-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:dlm-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:gfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-devel-rt-6.4.0-150600.10.61.1.noarch",
"SUSE Real Time Module 15 SP6:kernel-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-rt-devel-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-rt_debug-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-rt_debug-devel-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-source-rt-6.4.0-150600.10.61.1.noarch",
"SUSE Real Time Module 15 SP6:kernel-syms-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:ocfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:gfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-rt-6.4.0-150600.10.61.1.noarch",
"openSUSE Leap 15.6:kernel-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-devel-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-extra-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-livepatch-devel-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-optional-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-vdso-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt_debug-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt_debug-devel-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt_debug-vdso-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-source-rt-6.4.0-150600.10.61.1.noarch",
"openSUSE Leap 15.6:kernel-syms-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kselftests-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-rt-6.4.0-150600.10.61.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_10_61-rt-1-150600.1.3.1.x86_64",
"SUSE Real Time Module 15 SP6:cluster-md-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:dlm-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:gfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-devel-rt-6.4.0-150600.10.61.1.noarch",
"SUSE Real Time Module 15 SP6:kernel-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-rt-devel-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-rt_debug-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-rt_debug-devel-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-source-rt-6.4.0-150600.10.61.1.noarch",
"SUSE Real Time Module 15 SP6:kernel-syms-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:ocfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:gfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-rt-6.4.0-150600.10.61.1.noarch",
"openSUSE Leap 15.6:kernel-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-devel-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-extra-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-livepatch-devel-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-optional-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-vdso-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt_debug-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt_debug-devel-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt_debug-vdso-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-source-rt-6.4.0-150600.10.61.1.noarch",
"openSUSE Leap 15.6:kernel-syms-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kselftests-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-rt-6.4.0-150600.10.61.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-24T12:42:49Z",
"details": "moderate"
}
],
"title": "CVE-2025-40120"
},
{
"cve": "CVE-2025-40121",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40121"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nASoC: Intel: bytcr_rt5651: Fix invalid quirk input mapping\n\nWhen an invalid value is passed via quirk option, currently\nbytcr_rt5640 driver just ignores and leaves as is, which may lead to\nunepxected results like OOB access.\n\nThis patch adds the sanity check and corrects the input mapping to the\ncertain default value if an invalid value is passed.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_10_61-rt-1-150600.1.3.1.x86_64",
"SUSE Real Time Module 15 SP6:cluster-md-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:dlm-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:gfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-devel-rt-6.4.0-150600.10.61.1.noarch",
"SUSE Real Time Module 15 SP6:kernel-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-rt-devel-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-rt_debug-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-rt_debug-devel-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-source-rt-6.4.0-150600.10.61.1.noarch",
"SUSE Real Time Module 15 SP6:kernel-syms-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:ocfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:gfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-rt-6.4.0-150600.10.61.1.noarch",
"openSUSE Leap 15.6:kernel-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-devel-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-extra-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-livepatch-devel-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-optional-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-vdso-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt_debug-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt_debug-devel-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt_debug-vdso-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-source-rt-6.4.0-150600.10.61.1.noarch",
"openSUSE Leap 15.6:kernel-syms-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kselftests-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-rt-6.4.0-150600.10.61.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40121",
"url": "https://www.suse.com/security/cve/CVE-2025-40121"
},
{
"category": "external",
"summary": "SUSE Bug 1253367 for CVE-2025-40121",
"url": "https://bugzilla.suse.com/1253367"
},
{
"category": "external",
"summary": "SUSE Bug 1253430 for CVE-2025-40121",
"url": "https://bugzilla.suse.com/1253430"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_10_61-rt-1-150600.1.3.1.x86_64",
"SUSE Real Time Module 15 SP6:cluster-md-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:dlm-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:gfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-devel-rt-6.4.0-150600.10.61.1.noarch",
"SUSE Real Time Module 15 SP6:kernel-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-rt-devel-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-rt_debug-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-rt_debug-devel-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-source-rt-6.4.0-150600.10.61.1.noarch",
"SUSE Real Time Module 15 SP6:kernel-syms-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:ocfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:gfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-rt-6.4.0-150600.10.61.1.noarch",
"openSUSE Leap 15.6:kernel-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-devel-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-extra-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-livepatch-devel-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-optional-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-vdso-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt_debug-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt_debug-devel-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt_debug-vdso-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-source-rt-6.4.0-150600.10.61.1.noarch",
"openSUSE Leap 15.6:kernel-syms-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kselftests-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-rt-6.4.0-150600.10.61.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_10_61-rt-1-150600.1.3.1.x86_64",
"SUSE Real Time Module 15 SP6:cluster-md-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:dlm-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:gfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-devel-rt-6.4.0-150600.10.61.1.noarch",
"SUSE Real Time Module 15 SP6:kernel-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-rt-devel-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-rt_debug-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-rt_debug-devel-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-source-rt-6.4.0-150600.10.61.1.noarch",
"SUSE Real Time Module 15 SP6:kernel-syms-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:ocfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:gfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-rt-6.4.0-150600.10.61.1.noarch",
"openSUSE Leap 15.6:kernel-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-devel-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-extra-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-livepatch-devel-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-optional-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-vdso-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt_debug-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt_debug-devel-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt_debug-vdso-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-source-rt-6.4.0-150600.10.61.1.noarch",
"openSUSE Leap 15.6:kernel-syms-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kselftests-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-rt-6.4.0-150600.10.61.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-24T12:42:49Z",
"details": "moderate"
}
],
"title": "CVE-2025-40121"
},
{
"cve": "CVE-2025-40127",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40127"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nhwrng: ks-sa - fix division by zero in ks_sa_rng_init\n\nFix division by zero in ks_sa_rng_init caused by missing clock\npointer initialization. The clk_get_rate() call is performed on\nan uninitialized clk pointer, resulting in division by zero when\ncalculating delay values.\n\nAdd clock initialization code before using the clock.\n\n\n drivers/char/hw_random/ks-sa-rng.c | 7 +++++++\n 1 file changed, 7 insertions(+)",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_10_61-rt-1-150600.1.3.1.x86_64",
"SUSE Real Time Module 15 SP6:cluster-md-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:dlm-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:gfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-devel-rt-6.4.0-150600.10.61.1.noarch",
"SUSE Real Time Module 15 SP6:kernel-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-rt-devel-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-rt_debug-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-rt_debug-devel-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-source-rt-6.4.0-150600.10.61.1.noarch",
"SUSE Real Time Module 15 SP6:kernel-syms-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:ocfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:gfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-rt-6.4.0-150600.10.61.1.noarch",
"openSUSE Leap 15.6:kernel-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-devel-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-extra-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-livepatch-devel-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-optional-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-vdso-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt_debug-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt_debug-devel-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt_debug-vdso-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-source-rt-6.4.0-150600.10.61.1.noarch",
"openSUSE Leap 15.6:kernel-syms-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kselftests-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-rt-6.4.0-150600.10.61.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40127",
"url": "https://www.suse.com/security/cve/CVE-2025-40127"
},
{
"category": "external",
"summary": "SUSE Bug 1253369 for CVE-2025-40127",
"url": "https://bugzilla.suse.com/1253369"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_10_61-rt-1-150600.1.3.1.x86_64",
"SUSE Real Time Module 15 SP6:cluster-md-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:dlm-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:gfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-devel-rt-6.4.0-150600.10.61.1.noarch",
"SUSE Real Time Module 15 SP6:kernel-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-rt-devel-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-rt_debug-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-rt_debug-devel-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-source-rt-6.4.0-150600.10.61.1.noarch",
"SUSE Real Time Module 15 SP6:kernel-syms-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:ocfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:gfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-rt-6.4.0-150600.10.61.1.noarch",
"openSUSE Leap 15.6:kernel-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-devel-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-extra-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-livepatch-devel-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-optional-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-vdso-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt_debug-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt_debug-devel-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt_debug-vdso-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-source-rt-6.4.0-150600.10.61.1.noarch",
"openSUSE Leap 15.6:kernel-syms-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kselftests-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-rt-6.4.0-150600.10.61.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_10_61-rt-1-150600.1.3.1.x86_64",
"SUSE Real Time Module 15 SP6:cluster-md-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:dlm-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:gfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-devel-rt-6.4.0-150600.10.61.1.noarch",
"SUSE Real Time Module 15 SP6:kernel-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-rt-devel-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-rt_debug-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-rt_debug-devel-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-source-rt-6.4.0-150600.10.61.1.noarch",
"SUSE Real Time Module 15 SP6:kernel-syms-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:ocfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:gfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-rt-6.4.0-150600.10.61.1.noarch",
"openSUSE Leap 15.6:kernel-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-devel-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-extra-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-livepatch-devel-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-optional-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-vdso-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt_debug-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt_debug-devel-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt_debug-vdso-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-source-rt-6.4.0-150600.10.61.1.noarch",
"openSUSE Leap 15.6:kernel-syms-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kselftests-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-rt-6.4.0-150600.10.61.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-24T12:42:49Z",
"details": "moderate"
}
],
"title": "CVE-2025-40127"
},
{
"cve": "CVE-2025-40129",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40129"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nsunrpc: fix null pointer dereference on zero-length checksum\n\nIn xdr_stream_decode_opaque_auth(), zero-length checksum.len causes\nchecksum.data to be set to NULL. This triggers a NPD when accessing\nchecksum.data in gss_krb5_verify_mic_v2(). This patch ensures that\nthe value of checksum.len is not less than XDR_UNIT.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_10_61-rt-1-150600.1.3.1.x86_64",
"SUSE Real Time Module 15 SP6:cluster-md-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:dlm-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:gfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-devel-rt-6.4.0-150600.10.61.1.noarch",
"SUSE Real Time Module 15 SP6:kernel-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-rt-devel-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-rt_debug-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-rt_debug-devel-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-source-rt-6.4.0-150600.10.61.1.noarch",
"SUSE Real Time Module 15 SP6:kernel-syms-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:ocfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:gfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-rt-6.4.0-150600.10.61.1.noarch",
"openSUSE Leap 15.6:kernel-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-devel-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-extra-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-livepatch-devel-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-optional-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-vdso-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt_debug-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt_debug-devel-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt_debug-vdso-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-source-rt-6.4.0-150600.10.61.1.noarch",
"openSUSE Leap 15.6:kernel-syms-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kselftests-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-rt-6.4.0-150600.10.61.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40129",
"url": "https://www.suse.com/security/cve/CVE-2025-40129"
},
{
"category": "external",
"summary": "SUSE Bug 1253472 for CVE-2025-40129",
"url": "https://bugzilla.suse.com/1253472"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_10_61-rt-1-150600.1.3.1.x86_64",
"SUSE Real Time Module 15 SP6:cluster-md-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:dlm-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:gfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-devel-rt-6.4.0-150600.10.61.1.noarch",
"SUSE Real Time Module 15 SP6:kernel-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-rt-devel-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-rt_debug-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-rt_debug-devel-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-source-rt-6.4.0-150600.10.61.1.noarch",
"SUSE Real Time Module 15 SP6:kernel-syms-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:ocfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:gfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-rt-6.4.0-150600.10.61.1.noarch",
"openSUSE Leap 15.6:kernel-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-devel-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-extra-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-livepatch-devel-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-optional-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-vdso-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt_debug-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt_debug-devel-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt_debug-vdso-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-source-rt-6.4.0-150600.10.61.1.noarch",
"openSUSE Leap 15.6:kernel-syms-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kselftests-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-rt-6.4.0-150600.10.61.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_10_61-rt-1-150600.1.3.1.x86_64",
"SUSE Real Time Module 15 SP6:cluster-md-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:dlm-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:gfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-devel-rt-6.4.0-150600.10.61.1.noarch",
"SUSE Real Time Module 15 SP6:kernel-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-rt-devel-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-rt_debug-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-rt_debug-devel-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-source-rt-6.4.0-150600.10.61.1.noarch",
"SUSE Real Time Module 15 SP6:kernel-syms-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:ocfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:gfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-rt-6.4.0-150600.10.61.1.noarch",
"openSUSE Leap 15.6:kernel-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-devel-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-extra-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-livepatch-devel-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-optional-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-vdso-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt_debug-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt_debug-devel-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt_debug-vdso-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-source-rt-6.4.0-150600.10.61.1.noarch",
"openSUSE Leap 15.6:kernel-syms-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kselftests-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-rt-6.4.0-150600.10.61.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-24T12:42:49Z",
"details": "important"
}
],
"title": "CVE-2025-40129"
},
{
"cve": "CVE-2025-40139",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40139"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nsmc: Use __sk_dst_get() and dst_dev_rcu() in in smc_clc_prfx_set().\n\nsmc_clc_prfx_set() is called during connect() and not under RCU\nnor RTNL.\n\nUsing sk_dst_get(sk)-\u003edev could trigger UAF.\n\nLet\u0027s use __sk_dst_get() and dev_dst_rcu() under rcu_read_lock()\nafter kernel_getsockname().\n\nNote that the returned value of smc_clc_prfx_set() is not used\nin the caller.\n\nWhile at it, we change the 1st arg of smc_clc_prfx_set[46]_rcu()\nnot to touch dst there.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_10_61-rt-1-150600.1.3.1.x86_64",
"SUSE Real Time Module 15 SP6:cluster-md-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:dlm-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:gfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-devel-rt-6.4.0-150600.10.61.1.noarch",
"SUSE Real Time Module 15 SP6:kernel-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-rt-devel-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-rt_debug-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-rt_debug-devel-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-source-rt-6.4.0-150600.10.61.1.noarch",
"SUSE Real Time Module 15 SP6:kernel-syms-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:ocfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:gfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-rt-6.4.0-150600.10.61.1.noarch",
"openSUSE Leap 15.6:kernel-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-devel-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-extra-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-livepatch-devel-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-optional-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-vdso-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt_debug-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt_debug-devel-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt_debug-vdso-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-source-rt-6.4.0-150600.10.61.1.noarch",
"openSUSE Leap 15.6:kernel-syms-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kselftests-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-rt-6.4.0-150600.10.61.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40139",
"url": "https://www.suse.com/security/cve/CVE-2025-40139"
},
{
"category": "external",
"summary": "SUSE Bug 1253409 for CVE-2025-40139",
"url": "https://bugzilla.suse.com/1253409"
},
{
"category": "external",
"summary": "SUSE Bug 1253411 for CVE-2025-40139",
"url": "https://bugzilla.suse.com/1253411"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_10_61-rt-1-150600.1.3.1.x86_64",
"SUSE Real Time Module 15 SP6:cluster-md-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:dlm-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:gfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-devel-rt-6.4.0-150600.10.61.1.noarch",
"SUSE Real Time Module 15 SP6:kernel-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-rt-devel-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-rt_debug-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-rt_debug-devel-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-source-rt-6.4.0-150600.10.61.1.noarch",
"SUSE Real Time Module 15 SP6:kernel-syms-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:ocfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:gfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-rt-6.4.0-150600.10.61.1.noarch",
"openSUSE Leap 15.6:kernel-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-devel-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-extra-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-livepatch-devel-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-optional-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-vdso-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt_debug-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt_debug-devel-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt_debug-vdso-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-source-rt-6.4.0-150600.10.61.1.noarch",
"openSUSE Leap 15.6:kernel-syms-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kselftests-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-rt-6.4.0-150600.10.61.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_10_61-rt-1-150600.1.3.1.x86_64",
"SUSE Real Time Module 15 SP6:cluster-md-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:dlm-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:gfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-devel-rt-6.4.0-150600.10.61.1.noarch",
"SUSE Real Time Module 15 SP6:kernel-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-rt-devel-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-rt_debug-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-rt_debug-devel-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-source-rt-6.4.0-150600.10.61.1.noarch",
"SUSE Real Time Module 15 SP6:kernel-syms-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:ocfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:gfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-rt-6.4.0-150600.10.61.1.noarch",
"openSUSE Leap 15.6:kernel-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-devel-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-extra-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-livepatch-devel-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-optional-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-vdso-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt_debug-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt_debug-devel-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt_debug-vdso-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-source-rt-6.4.0-150600.10.61.1.noarch",
"openSUSE Leap 15.6:kernel-syms-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kselftests-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-rt-6.4.0-150600.10.61.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-24T12:42:49Z",
"details": "important"
}
],
"title": "CVE-2025-40139"
},
{
"cve": "CVE-2025-40140",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40140"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnet: usb: Remove disruptive netif_wake_queue in rtl8150_set_multicast\n\nsyzbot reported WARNING in rtl8150_start_xmit/usb_submit_urb.\nThis is the sequence of events that leads to the warning:\n\nrtl8150_start_xmit() {\n\tnetif_stop_queue();\n\tusb_submit_urb(dev-\u003etx_urb);\n}\n\nrtl8150_set_multicast() {\n\tnetif_stop_queue();\n\tnetif_wake_queue();\t\t\u003c-- wakes up TX queue before URB is done\n}\n\nrtl8150_start_xmit() {\n\tnetif_stop_queue();\n\tusb_submit_urb(dev-\u003etx_urb);\t\u003c-- double submission\n}\n\nrtl8150_set_multicast being the ndo_set_rx_mode callback should not be\ncalling netif_stop_queue and notif_start_queue as these handle\nTX queue synchronization.\n\nThe net core function dev_set_rx_mode handles the synchronization\nfor rtl8150_set_multicast making it safe to remove these locks.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_10_61-rt-1-150600.1.3.1.x86_64",
"SUSE Real Time Module 15 SP6:cluster-md-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:dlm-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:gfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-devel-rt-6.4.0-150600.10.61.1.noarch",
"SUSE Real Time Module 15 SP6:kernel-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-rt-devel-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-rt_debug-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-rt_debug-devel-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-source-rt-6.4.0-150600.10.61.1.noarch",
"SUSE Real Time Module 15 SP6:kernel-syms-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:ocfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:gfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-rt-6.4.0-150600.10.61.1.noarch",
"openSUSE Leap 15.6:kernel-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-devel-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-extra-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-livepatch-devel-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-optional-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-vdso-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt_debug-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt_debug-devel-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt_debug-vdso-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-source-rt-6.4.0-150600.10.61.1.noarch",
"openSUSE Leap 15.6:kernel-syms-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kselftests-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-rt-6.4.0-150600.10.61.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40140",
"url": "https://www.suse.com/security/cve/CVE-2025-40140"
},
{
"category": "external",
"summary": "SUSE Bug 1253349 for CVE-2025-40140",
"url": "https://bugzilla.suse.com/1253349"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_10_61-rt-1-150600.1.3.1.x86_64",
"SUSE Real Time Module 15 SP6:cluster-md-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:dlm-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:gfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-devel-rt-6.4.0-150600.10.61.1.noarch",
"SUSE Real Time Module 15 SP6:kernel-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-rt-devel-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-rt_debug-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-rt_debug-devel-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-source-rt-6.4.0-150600.10.61.1.noarch",
"SUSE Real Time Module 15 SP6:kernel-syms-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:ocfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:gfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-rt-6.4.0-150600.10.61.1.noarch",
"openSUSE Leap 15.6:kernel-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-devel-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-extra-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-livepatch-devel-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-optional-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-vdso-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt_debug-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt_debug-devel-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt_debug-vdso-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-source-rt-6.4.0-150600.10.61.1.noarch",
"openSUSE Leap 15.6:kernel-syms-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kselftests-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-rt-6.4.0-150600.10.61.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.3,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_10_61-rt-1-150600.1.3.1.x86_64",
"SUSE Real Time Module 15 SP6:cluster-md-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:dlm-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:gfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-devel-rt-6.4.0-150600.10.61.1.noarch",
"SUSE Real Time Module 15 SP6:kernel-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-rt-devel-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-rt_debug-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-rt_debug-devel-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-source-rt-6.4.0-150600.10.61.1.noarch",
"SUSE Real Time Module 15 SP6:kernel-syms-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:ocfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:gfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-rt-6.4.0-150600.10.61.1.noarch",
"openSUSE Leap 15.6:kernel-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-devel-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-extra-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-livepatch-devel-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-optional-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-vdso-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt_debug-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt_debug-devel-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt_debug-vdso-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-source-rt-6.4.0-150600.10.61.1.noarch",
"openSUSE Leap 15.6:kernel-syms-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kselftests-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-rt-6.4.0-150600.10.61.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-24T12:42:49Z",
"details": "low"
}
],
"title": "CVE-2025-40140"
},
{
"cve": "CVE-2025-40141",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40141"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nBluetooth: ISO: Fix possible UAF on iso_conn_free\n\nThis attempt to fix similar issue to sco_conn_free where if the\nconn-\u003esk is not set to NULL may lead to UAF on iso_conn_free.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_10_61-rt-1-150600.1.3.1.x86_64",
"SUSE Real Time Module 15 SP6:cluster-md-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:dlm-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:gfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-devel-rt-6.4.0-150600.10.61.1.noarch",
"SUSE Real Time Module 15 SP6:kernel-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-rt-devel-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-rt_debug-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-rt_debug-devel-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-source-rt-6.4.0-150600.10.61.1.noarch",
"SUSE Real Time Module 15 SP6:kernel-syms-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:ocfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:gfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-rt-6.4.0-150600.10.61.1.noarch",
"openSUSE Leap 15.6:kernel-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-devel-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-extra-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-livepatch-devel-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-optional-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-vdso-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt_debug-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt_debug-devel-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt_debug-vdso-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-source-rt-6.4.0-150600.10.61.1.noarch",
"openSUSE Leap 15.6:kernel-syms-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kselftests-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-rt-6.4.0-150600.10.61.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40141",
"url": "https://www.suse.com/security/cve/CVE-2025-40141"
},
{
"category": "external",
"summary": "SUSE Bug 1253352 for CVE-2025-40141",
"url": "https://bugzilla.suse.com/1253352"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_10_61-rt-1-150600.1.3.1.x86_64",
"SUSE Real Time Module 15 SP6:cluster-md-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:dlm-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:gfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-devel-rt-6.4.0-150600.10.61.1.noarch",
"SUSE Real Time Module 15 SP6:kernel-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-rt-devel-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-rt_debug-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-rt_debug-devel-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-source-rt-6.4.0-150600.10.61.1.noarch",
"SUSE Real Time Module 15 SP6:kernel-syms-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:ocfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:gfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-rt-6.4.0-150600.10.61.1.noarch",
"openSUSE Leap 15.6:kernel-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-devel-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-extra-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-livepatch-devel-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-optional-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-vdso-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt_debug-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt_debug-devel-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt_debug-vdso-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-source-rt-6.4.0-150600.10.61.1.noarch",
"openSUSE Leap 15.6:kernel-syms-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kselftests-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-rt-6.4.0-150600.10.61.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_10_61-rt-1-150600.1.3.1.x86_64",
"SUSE Real Time Module 15 SP6:cluster-md-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:dlm-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:gfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-devel-rt-6.4.0-150600.10.61.1.noarch",
"SUSE Real Time Module 15 SP6:kernel-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-rt-devel-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-rt_debug-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-rt_debug-devel-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-source-rt-6.4.0-150600.10.61.1.noarch",
"SUSE Real Time Module 15 SP6:kernel-syms-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:ocfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:gfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-rt-6.4.0-150600.10.61.1.noarch",
"openSUSE Leap 15.6:kernel-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-devel-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-extra-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-livepatch-devel-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-optional-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-vdso-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt_debug-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt_debug-devel-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt_debug-vdso-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-source-rt-6.4.0-150600.10.61.1.noarch",
"openSUSE Leap 15.6:kernel-syms-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kselftests-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-rt-6.4.0-150600.10.61.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-24T12:42:49Z",
"details": "moderate"
}
],
"title": "CVE-2025-40141"
},
{
"cve": "CVE-2025-40149",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40149"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\ntls: Use __sk_dst_get() and dst_dev_rcu() in get_netdev_for_sock().\n\nget_netdev_for_sock() is called during setsockopt(),\nso not under RCU.\n\nUsing sk_dst_get(sk)-\u003edev could trigger UAF.\n\nLet\u0027s use __sk_dst_get() and dst_dev_rcu().\n\nNote that the only -\u003endo_sk_get_lower_dev() user is\nbond_sk_get_lower_dev(), which uses RCU.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_10_61-rt-1-150600.1.3.1.x86_64",
"SUSE Real Time Module 15 SP6:cluster-md-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:dlm-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:gfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-devel-rt-6.4.0-150600.10.61.1.noarch",
"SUSE Real Time Module 15 SP6:kernel-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-rt-devel-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-rt_debug-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-rt_debug-devel-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-source-rt-6.4.0-150600.10.61.1.noarch",
"SUSE Real Time Module 15 SP6:kernel-syms-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:ocfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:gfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-rt-6.4.0-150600.10.61.1.noarch",
"openSUSE Leap 15.6:kernel-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-devel-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-extra-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-livepatch-devel-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-optional-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-vdso-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt_debug-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt_debug-devel-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt_debug-vdso-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-source-rt-6.4.0-150600.10.61.1.noarch",
"openSUSE Leap 15.6:kernel-syms-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kselftests-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-rt-6.4.0-150600.10.61.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40149",
"url": "https://www.suse.com/security/cve/CVE-2025-40149"
},
{
"category": "external",
"summary": "SUSE Bug 1253355 for CVE-2025-40149",
"url": "https://bugzilla.suse.com/1253355"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_10_61-rt-1-150600.1.3.1.x86_64",
"SUSE Real Time Module 15 SP6:cluster-md-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:dlm-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:gfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-devel-rt-6.4.0-150600.10.61.1.noarch",
"SUSE Real Time Module 15 SP6:kernel-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-rt-devel-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-rt_debug-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-rt_debug-devel-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-source-rt-6.4.0-150600.10.61.1.noarch",
"SUSE Real Time Module 15 SP6:kernel-syms-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:ocfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:gfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-rt-6.4.0-150600.10.61.1.noarch",
"openSUSE Leap 15.6:kernel-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-devel-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-extra-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-livepatch-devel-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-optional-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-vdso-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt_debug-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt_debug-devel-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt_debug-vdso-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-source-rt-6.4.0-150600.10.61.1.noarch",
"openSUSE Leap 15.6:kernel-syms-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kselftests-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-rt-6.4.0-150600.10.61.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_10_61-rt-1-150600.1.3.1.x86_64",
"SUSE Real Time Module 15 SP6:cluster-md-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:dlm-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:gfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-devel-rt-6.4.0-150600.10.61.1.noarch",
"SUSE Real Time Module 15 SP6:kernel-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-rt-devel-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-rt_debug-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-rt_debug-devel-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-source-rt-6.4.0-150600.10.61.1.noarch",
"SUSE Real Time Module 15 SP6:kernel-syms-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:ocfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:gfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-rt-6.4.0-150600.10.61.1.noarch",
"openSUSE Leap 15.6:kernel-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-devel-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-extra-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-livepatch-devel-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-optional-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-vdso-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt_debug-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt_debug-devel-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt_debug-vdso-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-source-rt-6.4.0-150600.10.61.1.noarch",
"openSUSE Leap 15.6:kernel-syms-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kselftests-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-rt-6.4.0-150600.10.61.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-24T12:42:49Z",
"details": "moderate"
}
],
"title": "CVE-2025-40149"
},
{
"cve": "CVE-2025-40154",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40154"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nASoC: Intel: bytcr_rt5640: Fix invalid quirk input mapping\n\nWhen an invalid value is passed via quirk option, currently\nbytcr_rt5640 driver only shows an error message but leaves as is.\nThis may lead to unepxected results like OOB access.\n\nThis patch corrects the input mapping to the certain default value if\nan invalid value is passed.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_10_61-rt-1-150600.1.3.1.x86_64",
"SUSE Real Time Module 15 SP6:cluster-md-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:dlm-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:gfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-devel-rt-6.4.0-150600.10.61.1.noarch",
"SUSE Real Time Module 15 SP6:kernel-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-rt-devel-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-rt_debug-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-rt_debug-devel-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-source-rt-6.4.0-150600.10.61.1.noarch",
"SUSE Real Time Module 15 SP6:kernel-syms-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:ocfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:gfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-rt-6.4.0-150600.10.61.1.noarch",
"openSUSE Leap 15.6:kernel-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-devel-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-extra-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-livepatch-devel-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-optional-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-vdso-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt_debug-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt_debug-devel-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt_debug-vdso-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-source-rt-6.4.0-150600.10.61.1.noarch",
"openSUSE Leap 15.6:kernel-syms-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kselftests-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-rt-6.4.0-150600.10.61.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40154",
"url": "https://www.suse.com/security/cve/CVE-2025-40154"
},
{
"category": "external",
"summary": "SUSE Bug 1253431 for CVE-2025-40154",
"url": "https://bugzilla.suse.com/1253431"
},
{
"category": "external",
"summary": "SUSE Bug 1253432 for CVE-2025-40154",
"url": "https://bugzilla.suse.com/1253432"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_10_61-rt-1-150600.1.3.1.x86_64",
"SUSE Real Time Module 15 SP6:cluster-md-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:dlm-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:gfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-devel-rt-6.4.0-150600.10.61.1.noarch",
"SUSE Real Time Module 15 SP6:kernel-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-rt-devel-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-rt_debug-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-rt_debug-devel-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-source-rt-6.4.0-150600.10.61.1.noarch",
"SUSE Real Time Module 15 SP6:kernel-syms-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:ocfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:gfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-rt-6.4.0-150600.10.61.1.noarch",
"openSUSE Leap 15.6:kernel-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-devel-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-extra-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-livepatch-devel-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-optional-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-vdso-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt_debug-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt_debug-devel-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt_debug-vdso-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-source-rt-6.4.0-150600.10.61.1.noarch",
"openSUSE Leap 15.6:kernel-syms-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kselftests-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-rt-6.4.0-150600.10.61.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_10_61-rt-1-150600.1.3.1.x86_64",
"SUSE Real Time Module 15 SP6:cluster-md-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:dlm-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:gfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-devel-rt-6.4.0-150600.10.61.1.noarch",
"SUSE Real Time Module 15 SP6:kernel-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-rt-devel-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-rt_debug-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-rt_debug-devel-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-source-rt-6.4.0-150600.10.61.1.noarch",
"SUSE Real Time Module 15 SP6:kernel-syms-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:ocfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:gfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-rt-6.4.0-150600.10.61.1.noarch",
"openSUSE Leap 15.6:kernel-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-devel-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-extra-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-livepatch-devel-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-optional-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-vdso-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt_debug-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt_debug-devel-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt_debug-vdso-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-source-rt-6.4.0-150600.10.61.1.noarch",
"openSUSE Leap 15.6:kernel-syms-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kselftests-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-rt-6.4.0-150600.10.61.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-24T12:42:49Z",
"details": "moderate"
}
],
"title": "CVE-2025-40154"
},
{
"cve": "CVE-2025-40156",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40156"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nPM / devfreq: mtk-cci: Fix potential error pointer dereference in probe()\n\nThe drv-\u003esram_reg pointer could be set to ERR_PTR(-EPROBE_DEFER) which\nwould lead to a error pointer dereference. Use IS_ERR_OR_NULL() to check\nthat the pointer is valid.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_10_61-rt-1-150600.1.3.1.x86_64",
"SUSE Real Time Module 15 SP6:cluster-md-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:dlm-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:gfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-devel-rt-6.4.0-150600.10.61.1.noarch",
"SUSE Real Time Module 15 SP6:kernel-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-rt-devel-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-rt_debug-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-rt_debug-devel-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-source-rt-6.4.0-150600.10.61.1.noarch",
"SUSE Real Time Module 15 SP6:kernel-syms-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:ocfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:gfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-rt-6.4.0-150600.10.61.1.noarch",
"openSUSE Leap 15.6:kernel-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-devel-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-extra-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-livepatch-devel-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-optional-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-vdso-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt_debug-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt_debug-devel-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt_debug-vdso-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-source-rt-6.4.0-150600.10.61.1.noarch",
"openSUSE Leap 15.6:kernel-syms-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kselftests-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-rt-6.4.0-150600.10.61.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40156",
"url": "https://www.suse.com/security/cve/CVE-2025-40156"
},
{
"category": "external",
"summary": "SUSE Bug 1253428 for CVE-2025-40156",
"url": "https://bugzilla.suse.com/1253428"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_10_61-rt-1-150600.1.3.1.x86_64",
"SUSE Real Time Module 15 SP6:cluster-md-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:dlm-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:gfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-devel-rt-6.4.0-150600.10.61.1.noarch",
"SUSE Real Time Module 15 SP6:kernel-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-rt-devel-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-rt_debug-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-rt_debug-devel-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-source-rt-6.4.0-150600.10.61.1.noarch",
"SUSE Real Time Module 15 SP6:kernel-syms-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:ocfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:gfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-rt-6.4.0-150600.10.61.1.noarch",
"openSUSE Leap 15.6:kernel-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-devel-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-extra-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-livepatch-devel-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-optional-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-vdso-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt_debug-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt_debug-devel-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt_debug-vdso-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-source-rt-6.4.0-150600.10.61.1.noarch",
"openSUSE Leap 15.6:kernel-syms-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kselftests-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-rt-6.4.0-150600.10.61.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_10_61-rt-1-150600.1.3.1.x86_64",
"SUSE Real Time Module 15 SP6:cluster-md-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:dlm-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:gfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-devel-rt-6.4.0-150600.10.61.1.noarch",
"SUSE Real Time Module 15 SP6:kernel-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-rt-devel-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-rt_debug-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-rt_debug-devel-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-source-rt-6.4.0-150600.10.61.1.noarch",
"SUSE Real Time Module 15 SP6:kernel-syms-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:ocfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:gfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-rt-6.4.0-150600.10.61.1.noarch",
"openSUSE Leap 15.6:kernel-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-devel-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-extra-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-livepatch-devel-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-optional-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-vdso-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt_debug-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt_debug-devel-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt_debug-vdso-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-source-rt-6.4.0-150600.10.61.1.noarch",
"openSUSE Leap 15.6:kernel-syms-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kselftests-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-rt-6.4.0-150600.10.61.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-24T12:42:49Z",
"details": "moderate"
}
],
"title": "CVE-2025-40156"
},
{
"cve": "CVE-2025-40157",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40157"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nEDAC/i10nm: Skip DIMM enumeration on a disabled memory controller\n\nWhen loading the i10nm_edac driver on some Intel Granite Rapids servers,\na call trace may appear as follows:\n\n UBSAN: shift-out-of-bounds in drivers/edac/skx_common.c:453:16\n shift exponent -66 is negative\n ...\n __ubsan_handle_shift_out_of_bounds+0x1e3/0x390\n skx_get_dimm_info.cold+0x47/0xd40 [skx_edac_common]\n i10nm_get_dimm_config+0x23e/0x390 [i10nm_edac]\n skx_register_mci+0x159/0x220 [skx_edac_common]\n i10nm_init+0xcb0/0x1ff0 [i10nm_edac]\n ...\n\nThis occurs because some BIOS may disable a memory controller if there\naren\u0027t any memory DIMMs populated on this memory controller. The DIMMMTR\nregister of this disabled memory controller contains the invalid value\n~0, resulting in the call trace above.\n\nFix this call trace by skipping DIMM enumeration on a disabled memory\ncontroller.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_10_61-rt-1-150600.1.3.1.x86_64",
"SUSE Real Time Module 15 SP6:cluster-md-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:dlm-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:gfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-devel-rt-6.4.0-150600.10.61.1.noarch",
"SUSE Real Time Module 15 SP6:kernel-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-rt-devel-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-rt_debug-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-rt_debug-devel-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-source-rt-6.4.0-150600.10.61.1.noarch",
"SUSE Real Time Module 15 SP6:kernel-syms-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:ocfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:gfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-rt-6.4.0-150600.10.61.1.noarch",
"openSUSE Leap 15.6:kernel-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-devel-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-extra-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-livepatch-devel-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-optional-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-vdso-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt_debug-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt_debug-devel-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt_debug-vdso-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-source-rt-6.4.0-150600.10.61.1.noarch",
"openSUSE Leap 15.6:kernel-syms-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kselftests-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-rt-6.4.0-150600.10.61.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40157",
"url": "https://www.suse.com/security/cve/CVE-2025-40157"
},
{
"category": "external",
"summary": "SUSE Bug 1253423 for CVE-2025-40157",
"url": "https://bugzilla.suse.com/1253423"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_10_61-rt-1-150600.1.3.1.x86_64",
"SUSE Real Time Module 15 SP6:cluster-md-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:dlm-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:gfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-devel-rt-6.4.0-150600.10.61.1.noarch",
"SUSE Real Time Module 15 SP6:kernel-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-rt-devel-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-rt_debug-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-rt_debug-devel-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-source-rt-6.4.0-150600.10.61.1.noarch",
"SUSE Real Time Module 15 SP6:kernel-syms-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:ocfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:gfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-rt-6.4.0-150600.10.61.1.noarch",
"openSUSE Leap 15.6:kernel-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-devel-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-extra-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-livepatch-devel-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-optional-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-vdso-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt_debug-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt_debug-devel-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt_debug-vdso-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-source-rt-6.4.0-150600.10.61.1.noarch",
"openSUSE Leap 15.6:kernel-syms-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kselftests-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-rt-6.4.0-150600.10.61.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.2,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:L/I:L/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_10_61-rt-1-150600.1.3.1.x86_64",
"SUSE Real Time Module 15 SP6:cluster-md-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:dlm-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:gfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-devel-rt-6.4.0-150600.10.61.1.noarch",
"SUSE Real Time Module 15 SP6:kernel-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-rt-devel-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-rt_debug-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-rt_debug-devel-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-source-rt-6.4.0-150600.10.61.1.noarch",
"SUSE Real Time Module 15 SP6:kernel-syms-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:ocfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:gfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-rt-6.4.0-150600.10.61.1.noarch",
"openSUSE Leap 15.6:kernel-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-devel-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-extra-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-livepatch-devel-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-optional-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-vdso-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt_debug-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt_debug-devel-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt_debug-vdso-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-source-rt-6.4.0-150600.10.61.1.noarch",
"openSUSE Leap 15.6:kernel-syms-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kselftests-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-rt-6.4.0-150600.10.61.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-24T12:42:49Z",
"details": "moderate"
}
],
"title": "CVE-2025-40157"
},
{
"cve": "CVE-2025-40159",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40159"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nxsk: Harden userspace-supplied xdp_desc validation\n\nTurned out certain clearly invalid values passed in xdp_desc from\nuserspace can pass xp_{,un}aligned_validate_desc() and then lead\nto UBs or just invalid frames to be queued for xmit.\n\ndesc-\u003elen close to ``U32_MAX`` with a non-zero pool-\u003etx_metadata_len\ncan cause positive integer overflow and wraparound, the same way low\nenough desc-\u003eaddr with a non-zero pool-\u003etx_metadata_len can cause\nnegative integer overflow. Both scenarios can then pass the\nvalidation successfully.\nThis doesn\u0027t happen with valid XSk applications, but can be used\nto perform attacks.\n\nAlways promote desc-\u003elen to ``u64`` first to exclude positive\noverflows of it. Use explicit check_{add,sub}_overflow() when\nvalidating desc-\u003eaddr (which is ``u64`` already).\n\nbloat-o-meter reports a little growth of the code size:\n\nadd/remove: 0/0 grow/shrink: 2/1 up/down: 60/-16 (44)\nFunction old new delta\nxskq_cons_peek_desc 299 330 +31\nxsk_tx_peek_release_desc_batch 973 1002 +29\nxsk_generic_xmit 3148 3132 -16\n\nbut hopefully this doesn\u0027t hurt the performance much.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_10_61-rt-1-150600.1.3.1.x86_64",
"SUSE Real Time Module 15 SP6:cluster-md-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:dlm-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:gfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-devel-rt-6.4.0-150600.10.61.1.noarch",
"SUSE Real Time Module 15 SP6:kernel-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-rt-devel-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-rt_debug-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-rt_debug-devel-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-source-rt-6.4.0-150600.10.61.1.noarch",
"SUSE Real Time Module 15 SP6:kernel-syms-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:ocfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:gfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-rt-6.4.0-150600.10.61.1.noarch",
"openSUSE Leap 15.6:kernel-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-devel-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-extra-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-livepatch-devel-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-optional-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-vdso-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt_debug-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt_debug-devel-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt_debug-vdso-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-source-rt-6.4.0-150600.10.61.1.noarch",
"openSUSE Leap 15.6:kernel-syms-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kselftests-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-rt-6.4.0-150600.10.61.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40159",
"url": "https://www.suse.com/security/cve/CVE-2025-40159"
},
{
"category": "external",
"summary": "SUSE Bug 1253403 for CVE-2025-40159",
"url": "https://bugzilla.suse.com/1253403"
},
{
"category": "external",
"summary": "SUSE Bug 1253404 for CVE-2025-40159",
"url": "https://bugzilla.suse.com/1253404"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_10_61-rt-1-150600.1.3.1.x86_64",
"SUSE Real Time Module 15 SP6:cluster-md-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:dlm-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:gfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-devel-rt-6.4.0-150600.10.61.1.noarch",
"SUSE Real Time Module 15 SP6:kernel-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-rt-devel-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-rt_debug-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-rt_debug-devel-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-source-rt-6.4.0-150600.10.61.1.noarch",
"SUSE Real Time Module 15 SP6:kernel-syms-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:ocfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:gfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-rt-6.4.0-150600.10.61.1.noarch",
"openSUSE Leap 15.6:kernel-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-devel-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-extra-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-livepatch-devel-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-optional-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-vdso-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt_debug-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt_debug-devel-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt_debug-vdso-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-source-rt-6.4.0-150600.10.61.1.noarch",
"openSUSE Leap 15.6:kernel-syms-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kselftests-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-rt-6.4.0-150600.10.61.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_10_61-rt-1-150600.1.3.1.x86_64",
"SUSE Real Time Module 15 SP6:cluster-md-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:dlm-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:gfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-devel-rt-6.4.0-150600.10.61.1.noarch",
"SUSE Real Time Module 15 SP6:kernel-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-rt-devel-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-rt_debug-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-rt_debug-devel-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-source-rt-6.4.0-150600.10.61.1.noarch",
"SUSE Real Time Module 15 SP6:kernel-syms-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:ocfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:gfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-rt-6.4.0-150600.10.61.1.noarch",
"openSUSE Leap 15.6:kernel-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-devel-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-extra-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-livepatch-devel-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-optional-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-vdso-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt_debug-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt_debug-devel-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt_debug-vdso-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-source-rt-6.4.0-150600.10.61.1.noarch",
"openSUSE Leap 15.6:kernel-syms-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kselftests-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-rt-6.4.0-150600.10.61.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-24T12:42:49Z",
"details": "important"
}
],
"title": "CVE-2025-40159"
},
{
"cve": "CVE-2025-40164",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40164"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nusbnet: Fix using smp_processor_id() in preemptible code warnings\n\nSyzbot reported the following warning:\n\nBUG: using smp_processor_id() in preemptible [00000000] code: dhcpcd/2879\ncaller is usbnet_skb_return+0x74/0x490 drivers/net/usb/usbnet.c:331\nCPU: 1 UID: 0 PID: 2879 Comm: dhcpcd Not tainted 6.15.0-rc4-syzkaller-00098-g615dca38c2ea #0 PREEMPT(voluntary)\nCall Trace:\n \u003cTASK\u003e\n __dump_stack lib/dump_stack.c:94 [inline]\n dump_stack_lvl+0x16c/0x1f0 lib/dump_stack.c:120\n check_preemption_disabled+0xd0/0xe0 lib/smp_processor_id.c:49\n usbnet_skb_return+0x74/0x490 drivers/net/usb/usbnet.c:331\n usbnet_resume_rx+0x4b/0x170 drivers/net/usb/usbnet.c:708\n usbnet_change_mtu+0x1be/0x220 drivers/net/usb/usbnet.c:417\n __dev_set_mtu net/core/dev.c:9443 [inline]\n netif_set_mtu_ext+0x369/0x5c0 net/core/dev.c:9496\n netif_set_mtu+0xb0/0x160 net/core/dev.c:9520\n dev_set_mtu+0xae/0x170 net/core/dev_api.c:247\n dev_ifsioc+0xa31/0x18d0 net/core/dev_ioctl.c:572\n dev_ioctl+0x223/0x10e0 net/core/dev_ioctl.c:821\n sock_do_ioctl+0x19d/0x280 net/socket.c:1204\n sock_ioctl+0x42f/0x6a0 net/socket.c:1311\n vfs_ioctl fs/ioctl.c:51 [inline]\n __do_sys_ioctl fs/ioctl.c:906 [inline]\n __se_sys_ioctl fs/ioctl.c:892 [inline]\n __x64_sys_ioctl+0x190/0x200 fs/ioctl.c:892\n do_syscall_x64 arch/x86/entry/syscall_64.c:63 [inline]\n do_syscall_64+0xcd/0x260 arch/x86/entry/syscall_64.c:94\n entry_SYSCALL_64_after_hwframe+0x77/0x7f\n\nFor historical and portability reasons, the netif_rx() is usually\nrun in the softirq or interrupt context, this commit therefore add\nlocal_bh_disable/enable() protection in the usbnet_resume_rx().",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_10_61-rt-1-150600.1.3.1.x86_64",
"SUSE Real Time Module 15 SP6:cluster-md-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:dlm-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:gfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-devel-rt-6.4.0-150600.10.61.1.noarch",
"SUSE Real Time Module 15 SP6:kernel-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-rt-devel-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-rt_debug-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-rt_debug-devel-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-source-rt-6.4.0-150600.10.61.1.noarch",
"SUSE Real Time Module 15 SP6:kernel-syms-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:ocfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:gfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-rt-6.4.0-150600.10.61.1.noarch",
"openSUSE Leap 15.6:kernel-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-devel-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-extra-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-livepatch-devel-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-optional-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-vdso-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt_debug-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt_debug-devel-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt_debug-vdso-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-source-rt-6.4.0-150600.10.61.1.noarch",
"openSUSE Leap 15.6:kernel-syms-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kselftests-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-rt-6.4.0-150600.10.61.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40164",
"url": "https://www.suse.com/security/cve/CVE-2025-40164"
},
{
"category": "external",
"summary": "SUSE Bug 1253407 for CVE-2025-40164",
"url": "https://bugzilla.suse.com/1253407"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_10_61-rt-1-150600.1.3.1.x86_64",
"SUSE Real Time Module 15 SP6:cluster-md-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:dlm-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:gfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-devel-rt-6.4.0-150600.10.61.1.noarch",
"SUSE Real Time Module 15 SP6:kernel-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-rt-devel-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-rt_debug-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-rt_debug-devel-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-source-rt-6.4.0-150600.10.61.1.noarch",
"SUSE Real Time Module 15 SP6:kernel-syms-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:ocfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:gfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-rt-6.4.0-150600.10.61.1.noarch",
"openSUSE Leap 15.6:kernel-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-devel-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-extra-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-livepatch-devel-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-optional-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-vdso-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt_debug-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt_debug-devel-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt_debug-vdso-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-source-rt-6.4.0-150600.10.61.1.noarch",
"openSUSE Leap 15.6:kernel-syms-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kselftests-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-rt-6.4.0-150600.10.61.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.7,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_10_61-rt-1-150600.1.3.1.x86_64",
"SUSE Real Time Module 15 SP6:cluster-md-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:dlm-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:gfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-devel-rt-6.4.0-150600.10.61.1.noarch",
"SUSE Real Time Module 15 SP6:kernel-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-rt-devel-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-rt_debug-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-rt_debug-devel-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-source-rt-6.4.0-150600.10.61.1.noarch",
"SUSE Real Time Module 15 SP6:kernel-syms-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:ocfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:gfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-rt-6.4.0-150600.10.61.1.noarch",
"openSUSE Leap 15.6:kernel-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-devel-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-extra-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-livepatch-devel-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-optional-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-vdso-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt_debug-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt_debug-devel-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt_debug-vdso-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-source-rt-6.4.0-150600.10.61.1.noarch",
"openSUSE Leap 15.6:kernel-syms-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kselftests-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-rt-6.4.0-150600.10.61.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-24T12:42:49Z",
"details": "moderate"
}
],
"title": "CVE-2025-40164"
},
{
"cve": "CVE-2025-40168",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40168"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nsmc: Use __sk_dst_get() and dst_dev_rcu() in smc_clc_prfx_match().\n\nsmc_clc_prfx_match() is called from smc_listen_work() and\nnot under RCU nor RTNL.\n\nUsing sk_dst_get(sk)-\u003edev could trigger UAF.\n\nLet\u0027s use __sk_dst_get() and dst_dev_rcu().\n\nNote that the returned value of smc_clc_prfx_match() is not\nused in the caller.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_10_61-rt-1-150600.1.3.1.x86_64",
"SUSE Real Time Module 15 SP6:cluster-md-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:dlm-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:gfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-devel-rt-6.4.0-150600.10.61.1.noarch",
"SUSE Real Time Module 15 SP6:kernel-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-rt-devel-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-rt_debug-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-rt_debug-devel-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-source-rt-6.4.0-150600.10.61.1.noarch",
"SUSE Real Time Module 15 SP6:kernel-syms-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:ocfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:gfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-rt-6.4.0-150600.10.61.1.noarch",
"openSUSE Leap 15.6:kernel-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-devel-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-extra-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-livepatch-devel-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-optional-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-vdso-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt_debug-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt_debug-devel-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt_debug-vdso-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-source-rt-6.4.0-150600.10.61.1.noarch",
"openSUSE Leap 15.6:kernel-syms-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kselftests-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-rt-6.4.0-150600.10.61.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40168",
"url": "https://www.suse.com/security/cve/CVE-2025-40168"
},
{
"category": "external",
"summary": "SUSE Bug 1253427 for CVE-2025-40168",
"url": "https://bugzilla.suse.com/1253427"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_10_61-rt-1-150600.1.3.1.x86_64",
"SUSE Real Time Module 15 SP6:cluster-md-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:dlm-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:gfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-devel-rt-6.4.0-150600.10.61.1.noarch",
"SUSE Real Time Module 15 SP6:kernel-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-rt-devel-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-rt_debug-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-rt_debug-devel-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-source-rt-6.4.0-150600.10.61.1.noarch",
"SUSE Real Time Module 15 SP6:kernel-syms-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:ocfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:gfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-rt-6.4.0-150600.10.61.1.noarch",
"openSUSE Leap 15.6:kernel-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-devel-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-extra-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-livepatch-devel-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-optional-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-vdso-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt_debug-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt_debug-devel-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt_debug-vdso-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-source-rt-6.4.0-150600.10.61.1.noarch",
"openSUSE Leap 15.6:kernel-syms-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kselftests-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-rt-6.4.0-150600.10.61.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_10_61-rt-1-150600.1.3.1.x86_64",
"SUSE Real Time Module 15 SP6:cluster-md-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:dlm-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:gfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-devel-rt-6.4.0-150600.10.61.1.noarch",
"SUSE Real Time Module 15 SP6:kernel-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-rt-devel-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-rt_debug-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-rt_debug-devel-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-source-rt-6.4.0-150600.10.61.1.noarch",
"SUSE Real Time Module 15 SP6:kernel-syms-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:ocfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:gfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-rt-6.4.0-150600.10.61.1.noarch",
"openSUSE Leap 15.6:kernel-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-devel-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-extra-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-livepatch-devel-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-optional-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-vdso-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt_debug-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt_debug-devel-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt_debug-vdso-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-source-rt-6.4.0-150600.10.61.1.noarch",
"openSUSE Leap 15.6:kernel-syms-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kselftests-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-rt-6.4.0-150600.10.61.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-24T12:42:49Z",
"details": "moderate"
}
],
"title": "CVE-2025-40168"
},
{
"cve": "CVE-2025-40169",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40169"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nbpf: Reject negative offsets for ALU ops\n\nWhen verifying BPF programs, the check_alu_op() function validates\ninstructions with ALU operations. The \u0027offset\u0027 field in these\ninstructions is a signed 16-bit integer.\n\nThe existing check \u0027insn-\u003eoff \u003e 1\u0027 was intended to ensure the offset is\neither 0, or 1 for BPF_MOD/BPF_DIV. However, because \u0027insn-\u003eoff\u0027 is\nsigned, this check incorrectly accepts all negative values (e.g., -1).\n\nThis commit tightens the validation by changing the condition to\n\u0027(insn-\u003eoff != 0 \u0026\u0026 insn-\u003eoff != 1)\u0027. This ensures that any value\nother than the explicitly permitted 0 and 1 is rejected, hardening the\nverifier against malformed BPF programs.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_10_61-rt-1-150600.1.3.1.x86_64",
"SUSE Real Time Module 15 SP6:cluster-md-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:dlm-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:gfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-devel-rt-6.4.0-150600.10.61.1.noarch",
"SUSE Real Time Module 15 SP6:kernel-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-rt-devel-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-rt_debug-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-rt_debug-devel-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-source-rt-6.4.0-150600.10.61.1.noarch",
"SUSE Real Time Module 15 SP6:kernel-syms-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:ocfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:gfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-rt-6.4.0-150600.10.61.1.noarch",
"openSUSE Leap 15.6:kernel-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-devel-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-extra-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-livepatch-devel-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-optional-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-vdso-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt_debug-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt_debug-devel-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt_debug-vdso-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-source-rt-6.4.0-150600.10.61.1.noarch",
"openSUSE Leap 15.6:kernel-syms-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kselftests-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-rt-6.4.0-150600.10.61.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40169",
"url": "https://www.suse.com/security/cve/CVE-2025-40169"
},
{
"category": "external",
"summary": "SUSE Bug 1253416 for CVE-2025-40169",
"url": "https://bugzilla.suse.com/1253416"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_10_61-rt-1-150600.1.3.1.x86_64",
"SUSE Real Time Module 15 SP6:cluster-md-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:dlm-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:gfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-devel-rt-6.4.0-150600.10.61.1.noarch",
"SUSE Real Time Module 15 SP6:kernel-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-rt-devel-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-rt_debug-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-rt_debug-devel-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-source-rt-6.4.0-150600.10.61.1.noarch",
"SUSE Real Time Module 15 SP6:kernel-syms-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:ocfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:gfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-rt-6.4.0-150600.10.61.1.noarch",
"openSUSE Leap 15.6:kernel-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-devel-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-extra-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-livepatch-devel-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-optional-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-vdso-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt_debug-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt_debug-devel-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt_debug-vdso-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-source-rt-6.4.0-150600.10.61.1.noarch",
"openSUSE Leap 15.6:kernel-syms-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kselftests-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-rt-6.4.0-150600.10.61.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.8,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_10_61-rt-1-150600.1.3.1.x86_64",
"SUSE Real Time Module 15 SP6:cluster-md-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:dlm-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:gfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-devel-rt-6.4.0-150600.10.61.1.noarch",
"SUSE Real Time Module 15 SP6:kernel-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-rt-devel-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-rt_debug-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-rt_debug-devel-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-source-rt-6.4.0-150600.10.61.1.noarch",
"SUSE Real Time Module 15 SP6:kernel-syms-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:ocfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:gfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-rt-6.4.0-150600.10.61.1.noarch",
"openSUSE Leap 15.6:kernel-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-devel-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-extra-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-livepatch-devel-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-optional-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-vdso-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt_debug-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt_debug-devel-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt_debug-vdso-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-source-rt-6.4.0-150600.10.61.1.noarch",
"openSUSE Leap 15.6:kernel-syms-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kselftests-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-rt-6.4.0-150600.10.61.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-24T12:42:49Z",
"details": "moderate"
}
],
"title": "CVE-2025-40169"
},
{
"cve": "CVE-2025-40171",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40171"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnvmet-fc: move lsop put work to nvmet_fc_ls_req_op\n\nIt\u0027s possible for more than one async command to be in flight from\n__nvmet_fc_send_ls_req. For each command, a tgtport reference is taken.\n\nIn the current code, only one put work item is queued at a time, which\nresults in a leaked reference.\n\nTo fix this, move the work item to the nvmet_fc_ls_req_op struct, which\nalready tracks all resources related to the command.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_10_61-rt-1-150600.1.3.1.x86_64",
"SUSE Real Time Module 15 SP6:cluster-md-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:dlm-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:gfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-devel-rt-6.4.0-150600.10.61.1.noarch",
"SUSE Real Time Module 15 SP6:kernel-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-rt-devel-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-rt_debug-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-rt_debug-devel-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-source-rt-6.4.0-150600.10.61.1.noarch",
"SUSE Real Time Module 15 SP6:kernel-syms-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:ocfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:gfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-rt-6.4.0-150600.10.61.1.noarch",
"openSUSE Leap 15.6:kernel-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-devel-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-extra-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-livepatch-devel-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-optional-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-vdso-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt_debug-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt_debug-devel-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt_debug-vdso-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-source-rt-6.4.0-150600.10.61.1.noarch",
"openSUSE Leap 15.6:kernel-syms-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kselftests-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-rt-6.4.0-150600.10.61.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40171",
"url": "https://www.suse.com/security/cve/CVE-2025-40171"
},
{
"category": "external",
"summary": "SUSE Bug 1253412 for CVE-2025-40171",
"url": "https://bugzilla.suse.com/1253412"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_10_61-rt-1-150600.1.3.1.x86_64",
"SUSE Real Time Module 15 SP6:cluster-md-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:dlm-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:gfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-devel-rt-6.4.0-150600.10.61.1.noarch",
"SUSE Real Time Module 15 SP6:kernel-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-rt-devel-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-rt_debug-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-rt_debug-devel-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-source-rt-6.4.0-150600.10.61.1.noarch",
"SUSE Real Time Module 15 SP6:kernel-syms-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:ocfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:gfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-rt-6.4.0-150600.10.61.1.noarch",
"openSUSE Leap 15.6:kernel-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-devel-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-extra-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-livepatch-devel-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-optional-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-vdso-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt_debug-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt_debug-devel-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt_debug-vdso-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-source-rt-6.4.0-150600.10.61.1.noarch",
"openSUSE Leap 15.6:kernel-syms-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kselftests-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-rt-6.4.0-150600.10.61.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_10_61-rt-1-150600.1.3.1.x86_64",
"SUSE Real Time Module 15 SP6:cluster-md-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:dlm-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:gfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-devel-rt-6.4.0-150600.10.61.1.noarch",
"SUSE Real Time Module 15 SP6:kernel-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-rt-devel-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-rt_debug-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-rt_debug-devel-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-source-rt-6.4.0-150600.10.61.1.noarch",
"SUSE Real Time Module 15 SP6:kernel-syms-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:ocfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:gfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-rt-6.4.0-150600.10.61.1.noarch",
"openSUSE Leap 15.6:kernel-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-devel-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-extra-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-livepatch-devel-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-optional-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-vdso-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt_debug-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt_debug-devel-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt_debug-vdso-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-source-rt-6.4.0-150600.10.61.1.noarch",
"openSUSE Leap 15.6:kernel-syms-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kselftests-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-rt-6.4.0-150600.10.61.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-24T12:42:49Z",
"details": "moderate"
}
],
"title": "CVE-2025-40171"
},
{
"cve": "CVE-2025-40172",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40172"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\naccel/qaic: Treat remaining == 0 as error in find_and_map_user_pages()\n\nCurrently, if find_and_map_user_pages() takes a DMA xfer request from the\nuser with a length field set to 0, or in a rare case, the host receives\nQAIC_TRANS_DMA_XFER_CONT from the device where resources-\u003exferred_dma_size\nis equal to the requested transaction size, the function will return 0\nbefore allocating an sgt or setting the fields of the dma_xfer struct.\nIn that case, encode_addr_size_pairs() will try to access the sgt which\nwill lead to a general protection fault.\n\nReturn an EINVAL in case the user provides a zero-sized ALP, or the device\nrequests continuation after all of the bytes have been transferred.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_10_61-rt-1-150600.1.3.1.x86_64",
"SUSE Real Time Module 15 SP6:cluster-md-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:dlm-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:gfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-devel-rt-6.4.0-150600.10.61.1.noarch",
"SUSE Real Time Module 15 SP6:kernel-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-rt-devel-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-rt_debug-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-rt_debug-devel-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-source-rt-6.4.0-150600.10.61.1.noarch",
"SUSE Real Time Module 15 SP6:kernel-syms-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:ocfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:gfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-rt-6.4.0-150600.10.61.1.noarch",
"openSUSE Leap 15.6:kernel-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-devel-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-extra-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-livepatch-devel-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-optional-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-vdso-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt_debug-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt_debug-devel-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt_debug-vdso-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-source-rt-6.4.0-150600.10.61.1.noarch",
"openSUSE Leap 15.6:kernel-syms-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kselftests-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-rt-6.4.0-150600.10.61.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40172",
"url": "https://www.suse.com/security/cve/CVE-2025-40172"
},
{
"category": "external",
"summary": "SUSE Bug 1253424 for CVE-2025-40172",
"url": "https://bugzilla.suse.com/1253424"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_10_61-rt-1-150600.1.3.1.x86_64",
"SUSE Real Time Module 15 SP6:cluster-md-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:dlm-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:gfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-devel-rt-6.4.0-150600.10.61.1.noarch",
"SUSE Real Time Module 15 SP6:kernel-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-rt-devel-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-rt_debug-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-rt_debug-devel-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-source-rt-6.4.0-150600.10.61.1.noarch",
"SUSE Real Time Module 15 SP6:kernel-syms-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:ocfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:gfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-rt-6.4.0-150600.10.61.1.noarch",
"openSUSE Leap 15.6:kernel-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-devel-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-extra-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-livepatch-devel-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-optional-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-vdso-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt_debug-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt_debug-devel-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt_debug-vdso-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-source-rt-6.4.0-150600.10.61.1.noarch",
"openSUSE Leap 15.6:kernel-syms-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kselftests-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-rt-6.4.0-150600.10.61.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_10_61-rt-1-150600.1.3.1.x86_64",
"SUSE Real Time Module 15 SP6:cluster-md-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:dlm-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:gfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-devel-rt-6.4.0-150600.10.61.1.noarch",
"SUSE Real Time Module 15 SP6:kernel-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-rt-devel-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-rt_debug-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-rt_debug-devel-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-source-rt-6.4.0-150600.10.61.1.noarch",
"SUSE Real Time Module 15 SP6:kernel-syms-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:ocfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:gfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-rt-6.4.0-150600.10.61.1.noarch",
"openSUSE Leap 15.6:kernel-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-devel-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-extra-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-livepatch-devel-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-optional-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-vdso-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt_debug-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt_debug-devel-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt_debug-vdso-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-source-rt-6.4.0-150600.10.61.1.noarch",
"openSUSE Leap 15.6:kernel-syms-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kselftests-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-rt-6.4.0-150600.10.61.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-24T12:42:49Z",
"details": "moderate"
}
],
"title": "CVE-2025-40172"
},
{
"cve": "CVE-2025-40173",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40173"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnet/ip6_tunnel: Prevent perpetual tunnel growth\n\nSimilarly to ipv4 tunnel, ipv6 version updates dev-\u003eneeded_headroom, too.\nWhile ipv4 tunnel headroom adjustment growth was limited in\ncommit 5ae1e9922bbd (\"net: ip_tunnel: prevent perpetual headroom growth\"),\nipv6 tunnel yet increases the headroom without any ceiling.\n\nReflect ipv4 tunnel headroom adjustment limit on ipv6 version.\n\nCredits to Francesco Ruggeri, who was originally debugging this issue\nand wrote local Arista-specific patch and a reproducer.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_10_61-rt-1-150600.1.3.1.x86_64",
"SUSE Real Time Module 15 SP6:cluster-md-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:dlm-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:gfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-devel-rt-6.4.0-150600.10.61.1.noarch",
"SUSE Real Time Module 15 SP6:kernel-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-rt-devel-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-rt_debug-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-rt_debug-devel-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-source-rt-6.4.0-150600.10.61.1.noarch",
"SUSE Real Time Module 15 SP6:kernel-syms-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:ocfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:gfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-rt-6.4.0-150600.10.61.1.noarch",
"openSUSE Leap 15.6:kernel-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-devel-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-extra-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-livepatch-devel-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-optional-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-vdso-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt_debug-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt_debug-devel-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt_debug-vdso-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-source-rt-6.4.0-150600.10.61.1.noarch",
"openSUSE Leap 15.6:kernel-syms-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kselftests-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-rt-6.4.0-150600.10.61.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40173",
"url": "https://www.suse.com/security/cve/CVE-2025-40173"
},
{
"category": "external",
"summary": "SUSE Bug 1253421 for CVE-2025-40173",
"url": "https://bugzilla.suse.com/1253421"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_10_61-rt-1-150600.1.3.1.x86_64",
"SUSE Real Time Module 15 SP6:cluster-md-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:dlm-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:gfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-devel-rt-6.4.0-150600.10.61.1.noarch",
"SUSE Real Time Module 15 SP6:kernel-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-rt-devel-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-rt_debug-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-rt_debug-devel-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-source-rt-6.4.0-150600.10.61.1.noarch",
"SUSE Real Time Module 15 SP6:kernel-syms-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:ocfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:gfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-rt-6.4.0-150600.10.61.1.noarch",
"openSUSE Leap 15.6:kernel-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-devel-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-extra-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-livepatch-devel-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-optional-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-vdso-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt_debug-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt_debug-devel-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt_debug-vdso-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-source-rt-6.4.0-150600.10.61.1.noarch",
"openSUSE Leap 15.6:kernel-syms-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kselftests-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-rt-6.4.0-150600.10.61.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.7,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_10_61-rt-1-150600.1.3.1.x86_64",
"SUSE Real Time Module 15 SP6:cluster-md-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:dlm-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:gfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-devel-rt-6.4.0-150600.10.61.1.noarch",
"SUSE Real Time Module 15 SP6:kernel-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-rt-devel-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-rt_debug-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-rt_debug-devel-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-source-rt-6.4.0-150600.10.61.1.noarch",
"SUSE Real Time Module 15 SP6:kernel-syms-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:ocfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:gfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-rt-6.4.0-150600.10.61.1.noarch",
"openSUSE Leap 15.6:kernel-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-devel-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-extra-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-livepatch-devel-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-optional-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-vdso-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt_debug-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt_debug-devel-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt_debug-vdso-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-source-rt-6.4.0-150600.10.61.1.noarch",
"openSUSE Leap 15.6:kernel-syms-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kselftests-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-rt-6.4.0-150600.10.61.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-24T12:42:49Z",
"details": "moderate"
}
],
"title": "CVE-2025-40173"
},
{
"cve": "CVE-2025-40176",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40176"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\ntls: wait for pending async decryptions if tls_strp_msg_hold fails\n\nAsync decryption calls tls_strp_msg_hold to create a clone of the\ninput skb to hold references to the memory it uses. If we fail to\nallocate that clone, proceeding with async decryption can lead to\nvarious issues (UAF on the skb, writing into userspace memory after\nthe recv() call has returned).\n\nIn this case, wait for all pending decryption requests.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_10_61-rt-1-150600.1.3.1.x86_64",
"SUSE Real Time Module 15 SP6:cluster-md-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:dlm-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:gfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-devel-rt-6.4.0-150600.10.61.1.noarch",
"SUSE Real Time Module 15 SP6:kernel-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-rt-devel-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-rt_debug-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-rt_debug-devel-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-source-rt-6.4.0-150600.10.61.1.noarch",
"SUSE Real Time Module 15 SP6:kernel-syms-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:ocfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:gfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-rt-6.4.0-150600.10.61.1.noarch",
"openSUSE Leap 15.6:kernel-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-devel-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-extra-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-livepatch-devel-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-optional-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-vdso-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt_debug-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt_debug-devel-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt_debug-vdso-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-source-rt-6.4.0-150600.10.61.1.noarch",
"openSUSE Leap 15.6:kernel-syms-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kselftests-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-rt-6.4.0-150600.10.61.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40176",
"url": "https://www.suse.com/security/cve/CVE-2025-40176"
},
{
"category": "external",
"summary": "SUSE Bug 1253425 for CVE-2025-40176",
"url": "https://bugzilla.suse.com/1253425"
},
{
"category": "external",
"summary": "SUSE Bug 1254100 for CVE-2025-40176",
"url": "https://bugzilla.suse.com/1254100"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_10_61-rt-1-150600.1.3.1.x86_64",
"SUSE Real Time Module 15 SP6:cluster-md-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:dlm-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:gfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-devel-rt-6.4.0-150600.10.61.1.noarch",
"SUSE Real Time Module 15 SP6:kernel-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-rt-devel-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-rt_debug-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-rt_debug-devel-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-source-rt-6.4.0-150600.10.61.1.noarch",
"SUSE Real Time Module 15 SP6:kernel-syms-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:ocfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:gfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-rt-6.4.0-150600.10.61.1.noarch",
"openSUSE Leap 15.6:kernel-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-devel-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-extra-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-livepatch-devel-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-optional-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-vdso-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt_debug-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt_debug-devel-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt_debug-vdso-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-source-rt-6.4.0-150600.10.61.1.noarch",
"openSUSE Leap 15.6:kernel-syms-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kselftests-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-rt-6.4.0-150600.10.61.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_10_61-rt-1-150600.1.3.1.x86_64",
"SUSE Real Time Module 15 SP6:cluster-md-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:dlm-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:gfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-devel-rt-6.4.0-150600.10.61.1.noarch",
"SUSE Real Time Module 15 SP6:kernel-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-rt-devel-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-rt_debug-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-rt_debug-devel-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-source-rt-6.4.0-150600.10.61.1.noarch",
"SUSE Real Time Module 15 SP6:kernel-syms-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:ocfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:gfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-rt-6.4.0-150600.10.61.1.noarch",
"openSUSE Leap 15.6:kernel-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-devel-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-extra-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-livepatch-devel-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-optional-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-vdso-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt_debug-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt_debug-devel-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt_debug-vdso-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-source-rt-6.4.0-150600.10.61.1.noarch",
"openSUSE Leap 15.6:kernel-syms-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kselftests-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-rt-6.4.0-150600.10.61.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-24T12:42:49Z",
"details": "important"
}
],
"title": "CVE-2025-40176"
},
{
"cve": "CVE-2025-40180",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40180"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nmailbox: zynqmp-ipi: Fix out-of-bounds access in mailbox cleanup loop\n\nThe cleanup loop was starting at the wrong array index, causing\nout-of-bounds access.\nStart the loop at the correct index for zero-indexed arrays to prevent\naccessing memory beyond the allocated array bounds.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_10_61-rt-1-150600.1.3.1.x86_64",
"SUSE Real Time Module 15 SP6:cluster-md-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:dlm-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:gfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-devel-rt-6.4.0-150600.10.61.1.noarch",
"SUSE Real Time Module 15 SP6:kernel-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-rt-devel-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-rt_debug-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-rt_debug-devel-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-source-rt-6.4.0-150600.10.61.1.noarch",
"SUSE Real Time Module 15 SP6:kernel-syms-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:ocfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:gfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-rt-6.4.0-150600.10.61.1.noarch",
"openSUSE Leap 15.6:kernel-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-devel-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-extra-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-livepatch-devel-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-optional-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-vdso-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt_debug-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt_debug-devel-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt_debug-vdso-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-source-rt-6.4.0-150600.10.61.1.noarch",
"openSUSE Leap 15.6:kernel-syms-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kselftests-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-rt-6.4.0-150600.10.61.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40180",
"url": "https://www.suse.com/security/cve/CVE-2025-40180"
},
{
"category": "external",
"summary": "SUSE Bug 1253440 for CVE-2025-40180",
"url": "https://bugzilla.suse.com/1253440"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_10_61-rt-1-150600.1.3.1.x86_64",
"SUSE Real Time Module 15 SP6:cluster-md-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:dlm-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:gfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-devel-rt-6.4.0-150600.10.61.1.noarch",
"SUSE Real Time Module 15 SP6:kernel-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-rt-devel-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-rt_debug-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-rt_debug-devel-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-source-rt-6.4.0-150600.10.61.1.noarch",
"SUSE Real Time Module 15 SP6:kernel-syms-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:ocfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:gfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-rt-6.4.0-150600.10.61.1.noarch",
"openSUSE Leap 15.6:kernel-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-devel-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-extra-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-livepatch-devel-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-optional-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-vdso-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt_debug-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt_debug-devel-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt_debug-vdso-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-source-rt-6.4.0-150600.10.61.1.noarch",
"openSUSE Leap 15.6:kernel-syms-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kselftests-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-rt-6.4.0-150600.10.61.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_10_61-rt-1-150600.1.3.1.x86_64",
"SUSE Real Time Module 15 SP6:cluster-md-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:dlm-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:gfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-devel-rt-6.4.0-150600.10.61.1.noarch",
"SUSE Real Time Module 15 SP6:kernel-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-rt-devel-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-rt_debug-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-rt_debug-devel-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-source-rt-6.4.0-150600.10.61.1.noarch",
"SUSE Real Time Module 15 SP6:kernel-syms-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:ocfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:gfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-rt-6.4.0-150600.10.61.1.noarch",
"openSUSE Leap 15.6:kernel-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-devel-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-extra-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-livepatch-devel-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-optional-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-vdso-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt_debug-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt_debug-devel-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt_debug-vdso-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-source-rt-6.4.0-150600.10.61.1.noarch",
"openSUSE Leap 15.6:kernel-syms-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kselftests-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-rt-6.4.0-150600.10.61.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-24T12:42:49Z",
"details": "moderate"
}
],
"title": "CVE-2025-40180"
},
{
"cve": "CVE-2025-40183",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40183"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nbpf: Fix metadata_dst leak __bpf_redirect_neigh_v{4,6}\n\nCilium has a BPF egress gateway feature which forces outgoing K8s Pod\ntraffic to pass through dedicated egress gateways which then SNAT the\ntraffic in order to interact with stable IPs outside the cluster.\n\nThe traffic is directed to the gateway via vxlan tunnel in collect md\nmode. A recent BPF change utilized the bpf_redirect_neigh() helper to\nforward packets after the arrival and decap on vxlan, which turned out\nover time that the kmalloc-256 slab usage in kernel was ever-increasing.\n\nThe issue was that vxlan allocates the metadata_dst object and attaches\nit through a fake dst entry to the skb. The latter was never released\nthough given bpf_redirect_neigh() was merely setting the new dst entry\nvia skb_dst_set() without dropping an existing one first.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_10_61-rt-1-150600.1.3.1.x86_64",
"SUSE Real Time Module 15 SP6:cluster-md-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:dlm-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:gfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-devel-rt-6.4.0-150600.10.61.1.noarch",
"SUSE Real Time Module 15 SP6:kernel-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-rt-devel-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-rt_debug-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-rt_debug-devel-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-source-rt-6.4.0-150600.10.61.1.noarch",
"SUSE Real Time Module 15 SP6:kernel-syms-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:ocfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:gfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-rt-6.4.0-150600.10.61.1.noarch",
"openSUSE Leap 15.6:kernel-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-devel-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-extra-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-livepatch-devel-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-optional-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-vdso-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt_debug-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt_debug-devel-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt_debug-vdso-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-source-rt-6.4.0-150600.10.61.1.noarch",
"openSUSE Leap 15.6:kernel-syms-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kselftests-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-rt-6.4.0-150600.10.61.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40183",
"url": "https://www.suse.com/security/cve/CVE-2025-40183"
},
{
"category": "external",
"summary": "SUSE Bug 1253441 for CVE-2025-40183",
"url": "https://bugzilla.suse.com/1253441"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_10_61-rt-1-150600.1.3.1.x86_64",
"SUSE Real Time Module 15 SP6:cluster-md-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:dlm-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:gfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-devel-rt-6.4.0-150600.10.61.1.noarch",
"SUSE Real Time Module 15 SP6:kernel-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-rt-devel-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-rt_debug-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-rt_debug-devel-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-source-rt-6.4.0-150600.10.61.1.noarch",
"SUSE Real Time Module 15 SP6:kernel-syms-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:ocfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:gfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-rt-6.4.0-150600.10.61.1.noarch",
"openSUSE Leap 15.6:kernel-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-devel-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-extra-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-livepatch-devel-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-optional-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-vdso-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt_debug-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt_debug-devel-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt_debug-vdso-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-source-rt-6.4.0-150600.10.61.1.noarch",
"openSUSE Leap 15.6:kernel-syms-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kselftests-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-rt-6.4.0-150600.10.61.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_10_61-rt-1-150600.1.3.1.x86_64",
"SUSE Real Time Module 15 SP6:cluster-md-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:dlm-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:gfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-devel-rt-6.4.0-150600.10.61.1.noarch",
"SUSE Real Time Module 15 SP6:kernel-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-rt-devel-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-rt_debug-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-rt_debug-devel-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-source-rt-6.4.0-150600.10.61.1.noarch",
"SUSE Real Time Module 15 SP6:kernel-syms-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:ocfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:gfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-rt-6.4.0-150600.10.61.1.noarch",
"openSUSE Leap 15.6:kernel-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-devel-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-extra-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-livepatch-devel-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-optional-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-vdso-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt_debug-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt_debug-devel-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt_debug-vdso-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-source-rt-6.4.0-150600.10.61.1.noarch",
"openSUSE Leap 15.6:kernel-syms-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kselftests-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-rt-6.4.0-150600.10.61.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-24T12:42:49Z",
"details": "moderate"
}
],
"title": "CVE-2025-40183"
},
{
"cve": "CVE-2025-40186",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40186"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\ntcp: Don\u0027t call reqsk_fastopen_remove() in tcp_conn_request().\n\nsyzbot reported the splat below in tcp_conn_request(). [0]\n\nIf a listener is close()d while a TFO socket is being processed in\ntcp_conn_request(), inet_csk_reqsk_queue_add() does not set reqsk-\u003esk\nand calls inet_child_forget(), which calls tcp_disconnect() for the\nTFO socket.\n\nAfter the cited commit, tcp_disconnect() calls reqsk_fastopen_remove(),\nwhere reqsk_put() is called due to !reqsk-\u003esk.\n\nThen, reqsk_fastopen_remove() in tcp_conn_request() decrements the\nlast req-\u003ersk_refcnt and frees reqsk, and __reqsk_free() at the\ndrop_and_free label causes the refcount underflow for the listener\nand double-free of the reqsk.\n\nLet\u0027s remove reqsk_fastopen_remove() in tcp_conn_request().\n\nNote that other callers make sure tp-\u003efastopen_rsk is not NULL.\n\n[0]:\nrefcount_t: underflow; use-after-free.\nWARNING: CPU: 12 PID: 5563 at lib/refcount.c:28 refcount_warn_saturate (lib/refcount.c:28)\nModules linked in:\nCPU: 12 UID: 0 PID: 5563 Comm: syz-executor Not tainted syzkaller #0 PREEMPT(full)\nHardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025\nRIP: 0010:refcount_warn_saturate (lib/refcount.c:28)\nCode: ab e8 8e b4 98 ff 0f 0b c3 cc cc cc cc cc 80 3d a4 e4 d6 01 00 75 9c c6 05 9b e4 d6 01 01 48 c7 c7 e8 df fb ab e8 6a b4 98 ff \u003c0f\u003e 0b e9 03 5b 76 00 cc 80 3d 7d e4 d6 01 00 0f 85 74 ff ff ff c6\nRSP: 0018:ffffa79fc0304a98 EFLAGS: 00010246\nRAX: d83af4db1c6b3900 RBX: ffff9f65c7a69020 RCX: d83af4db1c6b3900\nRDX: 0000000000000000 RSI: 00000000ffff7fff RDI: ffffffffac78a280\nRBP: 000000009d781b60 R08: 0000000000007fff R09: ffffffffac6ca280\nR10: 0000000000017ffd R11: 0000000000000004 R12: ffff9f65c7b4f100\nR13: ffff9f65c7d23c00 R14: ffff9f65c7d26000 R15: ffff9f65c7a64ef8\nFS: 00007f9f962176c0(0000) GS:ffff9f65fcf00000(0000) knlGS:0000000000000000\nCS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033\nCR2: 0000200000000180 CR3: 000000000dbbe006 CR4: 0000000000372ef0\nCall Trace:\n \u003cIRQ\u003e\n tcp_conn_request (./include/linux/refcount.h:400 ./include/linux/refcount.h:432 ./include/linux/refcount.h:450 ./include/net/sock.h:1965 ./include/net/request_sock.h:131 net/ipv4/tcp_input.c:7301)\n tcp_rcv_state_process (net/ipv4/tcp_input.c:6708)\n tcp_v6_do_rcv (net/ipv6/tcp_ipv6.c:1670)\n tcp_v6_rcv (net/ipv6/tcp_ipv6.c:1906)\n ip6_protocol_deliver_rcu (net/ipv6/ip6_input.c:438)\n ip6_input (net/ipv6/ip6_input.c:500)\n ipv6_rcv (net/ipv6/ip6_input.c:311)\n __netif_receive_skb (net/core/dev.c:6104)\n process_backlog (net/core/dev.c:6456)\n __napi_poll (net/core/dev.c:7506)\n net_rx_action (net/core/dev.c:7569 net/core/dev.c:7696)\n handle_softirqs (kernel/softirq.c:579)\n do_softirq (kernel/softirq.c:480)\n \u003c/IRQ\u003e",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_10_61-rt-1-150600.1.3.1.x86_64",
"SUSE Real Time Module 15 SP6:cluster-md-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:dlm-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:gfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-devel-rt-6.4.0-150600.10.61.1.noarch",
"SUSE Real Time Module 15 SP6:kernel-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-rt-devel-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-rt_debug-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-rt_debug-devel-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-source-rt-6.4.0-150600.10.61.1.noarch",
"SUSE Real Time Module 15 SP6:kernel-syms-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:ocfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:gfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-rt-6.4.0-150600.10.61.1.noarch",
"openSUSE Leap 15.6:kernel-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-devel-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-extra-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-livepatch-devel-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-optional-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-vdso-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt_debug-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt_debug-devel-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt_debug-vdso-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-source-rt-6.4.0-150600.10.61.1.noarch",
"openSUSE Leap 15.6:kernel-syms-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kselftests-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-rt-6.4.0-150600.10.61.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40186",
"url": "https://www.suse.com/security/cve/CVE-2025-40186"
},
{
"category": "external",
"summary": "SUSE Bug 1253438 for CVE-2025-40186",
"url": "https://bugzilla.suse.com/1253438"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_10_61-rt-1-150600.1.3.1.x86_64",
"SUSE Real Time Module 15 SP6:cluster-md-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:dlm-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:gfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-devel-rt-6.4.0-150600.10.61.1.noarch",
"SUSE Real Time Module 15 SP6:kernel-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-rt-devel-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-rt_debug-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-rt_debug-devel-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-source-rt-6.4.0-150600.10.61.1.noarch",
"SUSE Real Time Module 15 SP6:kernel-syms-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:ocfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:gfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-rt-6.4.0-150600.10.61.1.noarch",
"openSUSE Leap 15.6:kernel-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-devel-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-extra-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-livepatch-devel-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-optional-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-vdso-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt_debug-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt_debug-devel-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt_debug-vdso-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-source-rt-6.4.0-150600.10.61.1.noarch",
"openSUSE Leap 15.6:kernel-syms-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kselftests-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-rt-6.4.0-150600.10.61.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_10_61-rt-1-150600.1.3.1.x86_64",
"SUSE Real Time Module 15 SP6:cluster-md-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:dlm-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:gfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-devel-rt-6.4.0-150600.10.61.1.noarch",
"SUSE Real Time Module 15 SP6:kernel-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-rt-devel-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-rt_debug-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-rt_debug-devel-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-source-rt-6.4.0-150600.10.61.1.noarch",
"SUSE Real Time Module 15 SP6:kernel-syms-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:ocfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:gfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-rt-6.4.0-150600.10.61.1.noarch",
"openSUSE Leap 15.6:kernel-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-devel-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-extra-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-livepatch-devel-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-optional-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-vdso-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt_debug-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt_debug-devel-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt_debug-vdso-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-source-rt-6.4.0-150600.10.61.1.noarch",
"openSUSE Leap 15.6:kernel-syms-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kselftests-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-rt-6.4.0-150600.10.61.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-24T12:42:49Z",
"details": "important"
}
],
"title": "CVE-2025-40186"
},
{
"cve": "CVE-2025-40188",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40188"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\npwm: berlin: Fix wrong register in suspend/resume\n\nThe \u0027enable\u0027 register should be BERLIN_PWM_EN rather than\nBERLIN_PWM_ENABLE, otherwise, the driver accesses wrong address, there\nwill be cpu exception then kernel panic during suspend/resume.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_10_61-rt-1-150600.1.3.1.x86_64",
"SUSE Real Time Module 15 SP6:cluster-md-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:dlm-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:gfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-devel-rt-6.4.0-150600.10.61.1.noarch",
"SUSE Real Time Module 15 SP6:kernel-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-rt-devel-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-rt_debug-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-rt_debug-devel-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-source-rt-6.4.0-150600.10.61.1.noarch",
"SUSE Real Time Module 15 SP6:kernel-syms-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:ocfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:gfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-rt-6.4.0-150600.10.61.1.noarch",
"openSUSE Leap 15.6:kernel-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-devel-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-extra-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-livepatch-devel-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-optional-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-vdso-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt_debug-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt_debug-devel-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt_debug-vdso-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-source-rt-6.4.0-150600.10.61.1.noarch",
"openSUSE Leap 15.6:kernel-syms-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kselftests-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-rt-6.4.0-150600.10.61.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40188",
"url": "https://www.suse.com/security/cve/CVE-2025-40188"
},
{
"category": "external",
"summary": "SUSE Bug 1253449 for CVE-2025-40188",
"url": "https://bugzilla.suse.com/1253449"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_10_61-rt-1-150600.1.3.1.x86_64",
"SUSE Real Time Module 15 SP6:cluster-md-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:dlm-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:gfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-devel-rt-6.4.0-150600.10.61.1.noarch",
"SUSE Real Time Module 15 SP6:kernel-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-rt-devel-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-rt_debug-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-rt_debug-devel-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-source-rt-6.4.0-150600.10.61.1.noarch",
"SUSE Real Time Module 15 SP6:kernel-syms-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:ocfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:gfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-rt-6.4.0-150600.10.61.1.noarch",
"openSUSE Leap 15.6:kernel-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-devel-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-extra-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-livepatch-devel-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-optional-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-vdso-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt_debug-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt_debug-devel-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt_debug-vdso-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-source-rt-6.4.0-150600.10.61.1.noarch",
"openSUSE Leap 15.6:kernel-syms-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kselftests-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-rt-6.4.0-150600.10.61.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_10_61-rt-1-150600.1.3.1.x86_64",
"SUSE Real Time Module 15 SP6:cluster-md-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:dlm-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:gfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-devel-rt-6.4.0-150600.10.61.1.noarch",
"SUSE Real Time Module 15 SP6:kernel-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-rt-devel-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-rt_debug-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-rt_debug-devel-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-source-rt-6.4.0-150600.10.61.1.noarch",
"SUSE Real Time Module 15 SP6:kernel-syms-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:ocfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:gfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-rt-6.4.0-150600.10.61.1.noarch",
"openSUSE Leap 15.6:kernel-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-devel-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-extra-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-livepatch-devel-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-optional-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-vdso-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt_debug-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt_debug-devel-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt_debug-vdso-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-source-rt-6.4.0-150600.10.61.1.noarch",
"openSUSE Leap 15.6:kernel-syms-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kselftests-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-rt-6.4.0-150600.10.61.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-24T12:42:49Z",
"details": "moderate"
}
],
"title": "CVE-2025-40188"
},
{
"cve": "CVE-2025-40194",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40194"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\ncpufreq: intel_pstate: Fix object lifecycle issue in update_qos_request()\n\nThe cpufreq_cpu_put() call in update_qos_request() takes place too early\nbecause the latter subsequently calls freq_qos_update_request() that\nindirectly accesses the policy object in question through the QoS request\nobject passed to it.\n\nFortunately, update_qos_request() is called under intel_pstate_driver_lock,\nso this issue does not matter for changing the intel_pstate operation\nmode, but it theoretically can cause a crash to occur on CPU device hot\nremoval (which currently can only happen in virt, but it is formally\nsupported nevertheless).\n\nAddress this issue by modifying update_qos_request() to drop the\nreference to the policy later.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_10_61-rt-1-150600.1.3.1.x86_64",
"SUSE Real Time Module 15 SP6:cluster-md-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:dlm-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:gfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-devel-rt-6.4.0-150600.10.61.1.noarch",
"SUSE Real Time Module 15 SP6:kernel-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-rt-devel-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-rt_debug-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-rt_debug-devel-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-source-rt-6.4.0-150600.10.61.1.noarch",
"SUSE Real Time Module 15 SP6:kernel-syms-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:ocfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:gfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-rt-6.4.0-150600.10.61.1.noarch",
"openSUSE Leap 15.6:kernel-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-devel-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-extra-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-livepatch-devel-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-optional-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-vdso-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt_debug-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt_debug-devel-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt_debug-vdso-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-source-rt-6.4.0-150600.10.61.1.noarch",
"openSUSE Leap 15.6:kernel-syms-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kselftests-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-rt-6.4.0-150600.10.61.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40194",
"url": "https://www.suse.com/security/cve/CVE-2025-40194"
},
{
"category": "external",
"summary": "SUSE Bug 1253445 for CVE-2025-40194",
"url": "https://bugzilla.suse.com/1253445"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_10_61-rt-1-150600.1.3.1.x86_64",
"SUSE Real Time Module 15 SP6:cluster-md-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:dlm-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:gfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-devel-rt-6.4.0-150600.10.61.1.noarch",
"SUSE Real Time Module 15 SP6:kernel-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-rt-devel-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-rt_debug-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-rt_debug-devel-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-source-rt-6.4.0-150600.10.61.1.noarch",
"SUSE Real Time Module 15 SP6:kernel-syms-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:ocfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:gfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-rt-6.4.0-150600.10.61.1.noarch",
"openSUSE Leap 15.6:kernel-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-devel-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-extra-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-livepatch-devel-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-optional-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-vdso-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt_debug-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt_debug-devel-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt_debug-vdso-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-source-rt-6.4.0-150600.10.61.1.noarch",
"openSUSE Leap 15.6:kernel-syms-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kselftests-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-rt-6.4.0-150600.10.61.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.7,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_10_61-rt-1-150600.1.3.1.x86_64",
"SUSE Real Time Module 15 SP6:cluster-md-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:dlm-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:gfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-devel-rt-6.4.0-150600.10.61.1.noarch",
"SUSE Real Time Module 15 SP6:kernel-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-rt-devel-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-rt_debug-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-rt_debug-devel-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-source-rt-6.4.0-150600.10.61.1.noarch",
"SUSE Real Time Module 15 SP6:kernel-syms-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:ocfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:gfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-rt-6.4.0-150600.10.61.1.noarch",
"openSUSE Leap 15.6:kernel-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-devel-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-extra-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-livepatch-devel-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-optional-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-vdso-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt_debug-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt_debug-devel-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt_debug-vdso-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-source-rt-6.4.0-150600.10.61.1.noarch",
"openSUSE Leap 15.6:kernel-syms-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kselftests-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-rt-6.4.0-150600.10.61.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-24T12:42:49Z",
"details": "moderate"
}
],
"title": "CVE-2025-40194"
},
{
"cve": "CVE-2025-40198",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40198"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\next4: avoid potential buffer over-read in parse_apply_sb_mount_options()\n\nUnlike other strings in the ext4 superblock, we rely on tune2fs to\nmake sure s_mount_opts is NUL terminated. Harden\nparse_apply_sb_mount_options() by treating s_mount_opts as a potential\n__nonstring.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_10_61-rt-1-150600.1.3.1.x86_64",
"SUSE Real Time Module 15 SP6:cluster-md-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:dlm-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:gfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-devel-rt-6.4.0-150600.10.61.1.noarch",
"SUSE Real Time Module 15 SP6:kernel-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-rt-devel-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-rt_debug-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-rt_debug-devel-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-source-rt-6.4.0-150600.10.61.1.noarch",
"SUSE Real Time Module 15 SP6:kernel-syms-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:ocfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:gfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-rt-6.4.0-150600.10.61.1.noarch",
"openSUSE Leap 15.6:kernel-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-devel-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-extra-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-livepatch-devel-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-optional-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-vdso-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt_debug-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt_debug-devel-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt_debug-vdso-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-source-rt-6.4.0-150600.10.61.1.noarch",
"openSUSE Leap 15.6:kernel-syms-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kselftests-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-rt-6.4.0-150600.10.61.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40198",
"url": "https://www.suse.com/security/cve/CVE-2025-40198"
},
{
"category": "external",
"summary": "SUSE Bug 1253453 for CVE-2025-40198",
"url": "https://bugzilla.suse.com/1253453"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_10_61-rt-1-150600.1.3.1.x86_64",
"SUSE Real Time Module 15 SP6:cluster-md-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:dlm-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:gfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-devel-rt-6.4.0-150600.10.61.1.noarch",
"SUSE Real Time Module 15 SP6:kernel-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-rt-devel-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-rt_debug-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-rt_debug-devel-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-source-rt-6.4.0-150600.10.61.1.noarch",
"SUSE Real Time Module 15 SP6:kernel-syms-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:ocfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:gfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-rt-6.4.0-150600.10.61.1.noarch",
"openSUSE Leap 15.6:kernel-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-devel-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-extra-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-livepatch-devel-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-optional-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-vdso-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt_debug-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt_debug-devel-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt_debug-vdso-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-source-rt-6.4.0-150600.10.61.1.noarch",
"openSUSE Leap 15.6:kernel-syms-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kselftests-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-rt-6.4.0-150600.10.61.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_10_61-rt-1-150600.1.3.1.x86_64",
"SUSE Real Time Module 15 SP6:cluster-md-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:dlm-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:gfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-devel-rt-6.4.0-150600.10.61.1.noarch",
"SUSE Real Time Module 15 SP6:kernel-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-rt-devel-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-rt_debug-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-rt_debug-devel-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-source-rt-6.4.0-150600.10.61.1.noarch",
"SUSE Real Time Module 15 SP6:kernel-syms-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:ocfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:gfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-rt-6.4.0-150600.10.61.1.noarch",
"openSUSE Leap 15.6:kernel-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-devel-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-extra-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-livepatch-devel-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-optional-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-vdso-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt_debug-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt_debug-devel-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt_debug-vdso-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-source-rt-6.4.0-150600.10.61.1.noarch",
"openSUSE Leap 15.6:kernel-syms-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kselftests-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-rt-6.4.0-150600.10.61.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-24T12:42:49Z",
"details": "moderate"
}
],
"title": "CVE-2025-40198"
},
{
"cve": "CVE-2025-40200",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40200"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nSquashfs: reject negative file sizes in squashfs_read_inode()\n\nSyskaller reports a \"WARNING in ovl_copy_up_file\" in overlayfs.\n\nThis warning is ultimately caused because the underlying Squashfs file\nsystem returns a file with a negative file size.\n\nThis commit checks for a negative file size and returns EINVAL.\n\n[phillip@squashfs.org.uk: only need to check 64 bit quantity]",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_10_61-rt-1-150600.1.3.1.x86_64",
"SUSE Real Time Module 15 SP6:cluster-md-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:dlm-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:gfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-devel-rt-6.4.0-150600.10.61.1.noarch",
"SUSE Real Time Module 15 SP6:kernel-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-rt-devel-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-rt_debug-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-rt_debug-devel-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-source-rt-6.4.0-150600.10.61.1.noarch",
"SUSE Real Time Module 15 SP6:kernel-syms-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:ocfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:gfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-rt-6.4.0-150600.10.61.1.noarch",
"openSUSE Leap 15.6:kernel-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-devel-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-extra-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-livepatch-devel-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-optional-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-vdso-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt_debug-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt_debug-devel-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt_debug-vdso-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-source-rt-6.4.0-150600.10.61.1.noarch",
"openSUSE Leap 15.6:kernel-syms-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kselftests-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-rt-6.4.0-150600.10.61.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40200",
"url": "https://www.suse.com/security/cve/CVE-2025-40200"
},
{
"category": "external",
"summary": "SUSE Bug 1253448 for CVE-2025-40200",
"url": "https://bugzilla.suse.com/1253448"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_10_61-rt-1-150600.1.3.1.x86_64",
"SUSE Real Time Module 15 SP6:cluster-md-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:dlm-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:gfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-devel-rt-6.4.0-150600.10.61.1.noarch",
"SUSE Real Time Module 15 SP6:kernel-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-rt-devel-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-rt_debug-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-rt_debug-devel-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-source-rt-6.4.0-150600.10.61.1.noarch",
"SUSE Real Time Module 15 SP6:kernel-syms-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:ocfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:gfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-rt-6.4.0-150600.10.61.1.noarch",
"openSUSE Leap 15.6:kernel-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-devel-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-extra-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-livepatch-devel-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-optional-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-vdso-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt_debug-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt_debug-devel-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt_debug-vdso-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-source-rt-6.4.0-150600.10.61.1.noarch",
"openSUSE Leap 15.6:kernel-syms-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kselftests-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-rt-6.4.0-150600.10.61.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_10_61-rt-1-150600.1.3.1.x86_64",
"SUSE Real Time Module 15 SP6:cluster-md-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:dlm-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:gfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-devel-rt-6.4.0-150600.10.61.1.noarch",
"SUSE Real Time Module 15 SP6:kernel-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-rt-devel-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-rt_debug-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-rt_debug-devel-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-source-rt-6.4.0-150600.10.61.1.noarch",
"SUSE Real Time Module 15 SP6:kernel-syms-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:ocfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:gfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-rt-6.4.0-150600.10.61.1.noarch",
"openSUSE Leap 15.6:kernel-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-devel-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-extra-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-livepatch-devel-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-optional-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-vdso-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt_debug-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt_debug-devel-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt_debug-vdso-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-source-rt-6.4.0-150600.10.61.1.noarch",
"openSUSE Leap 15.6:kernel-syms-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kselftests-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-rt-6.4.0-150600.10.61.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-24T12:42:49Z",
"details": "moderate"
}
],
"title": "CVE-2025-40200"
},
{
"cve": "CVE-2025-40204",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40204"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nsctp: Fix MAC comparison to be constant-time\n\nTo prevent timing attacks, MACs need to be compared in constant time.\nUse the appropriate helper function for this.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_10_61-rt-1-150600.1.3.1.x86_64",
"SUSE Real Time Module 15 SP6:cluster-md-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:dlm-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:gfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-devel-rt-6.4.0-150600.10.61.1.noarch",
"SUSE Real Time Module 15 SP6:kernel-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-rt-devel-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-rt_debug-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-rt_debug-devel-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-source-rt-6.4.0-150600.10.61.1.noarch",
"SUSE Real Time Module 15 SP6:kernel-syms-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:ocfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:gfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-rt-6.4.0-150600.10.61.1.noarch",
"openSUSE Leap 15.6:kernel-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-devel-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-extra-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-livepatch-devel-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-optional-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-vdso-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt_debug-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt_debug-devel-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt_debug-vdso-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-source-rt-6.4.0-150600.10.61.1.noarch",
"openSUSE Leap 15.6:kernel-syms-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kselftests-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-rt-6.4.0-150600.10.61.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40204",
"url": "https://www.suse.com/security/cve/CVE-2025-40204"
},
{
"category": "external",
"summary": "SUSE Bug 1253436 for CVE-2025-40204",
"url": "https://bugzilla.suse.com/1253436"
},
{
"category": "external",
"summary": "SUSE Bug 1253437 for CVE-2025-40204",
"url": "https://bugzilla.suse.com/1253437"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_10_61-rt-1-150600.1.3.1.x86_64",
"SUSE Real Time Module 15 SP6:cluster-md-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:dlm-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:gfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-devel-rt-6.4.0-150600.10.61.1.noarch",
"SUSE Real Time Module 15 SP6:kernel-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-rt-devel-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-rt_debug-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-rt_debug-devel-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-source-rt-6.4.0-150600.10.61.1.noarch",
"SUSE Real Time Module 15 SP6:kernel-syms-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:ocfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:gfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-rt-6.4.0-150600.10.61.1.noarch",
"openSUSE Leap 15.6:kernel-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-devel-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-extra-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-livepatch-devel-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-optional-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-vdso-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt_debug-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt_debug-devel-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt_debug-vdso-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-source-rt-6.4.0-150600.10.61.1.noarch",
"openSUSE Leap 15.6:kernel-syms-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kselftests-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-rt-6.4.0-150600.10.61.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_10_61-rt-1-150600.1.3.1.x86_64",
"SUSE Real Time Module 15 SP6:cluster-md-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:dlm-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:gfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-devel-rt-6.4.0-150600.10.61.1.noarch",
"SUSE Real Time Module 15 SP6:kernel-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-rt-devel-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-rt_debug-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-rt_debug-devel-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-source-rt-6.4.0-150600.10.61.1.noarch",
"SUSE Real Time Module 15 SP6:kernel-syms-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:ocfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:gfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-rt-6.4.0-150600.10.61.1.noarch",
"openSUSE Leap 15.6:kernel-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-devel-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-extra-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-livepatch-devel-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-optional-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-vdso-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt_debug-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt_debug-devel-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt_debug-vdso-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-source-rt-6.4.0-150600.10.61.1.noarch",
"openSUSE Leap 15.6:kernel-syms-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kselftests-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-rt-6.4.0-150600.10.61.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-24T12:42:49Z",
"details": "important"
}
],
"title": "CVE-2025-40204"
},
{
"cve": "CVE-2025-40205",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40205"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nbtrfs: avoid potential out-of-bounds in btrfs_encode_fh()\n\nThe function btrfs_encode_fh() does not properly account for the three\ncases it handles.\n\nBefore writing to the file handle (fh), the function only returns to the\nuser BTRFS_FID_SIZE_NON_CONNECTABLE (5 dwords, 20 bytes) or\nBTRFS_FID_SIZE_CONNECTABLE (8 dwords, 32 bytes).\n\nHowever, when a parent exists and the root ID of the parent and the\ninode are different, the function writes BTRFS_FID_SIZE_CONNECTABLE_ROOT\n(10 dwords, 40 bytes).\n\nIf *max_len is not large enough, this write goes out of bounds because\nBTRFS_FID_SIZE_CONNECTABLE_ROOT is greater than\nBTRFS_FID_SIZE_CONNECTABLE originally returned.\n\nThis results in an 8-byte out-of-bounds write at\nfid-\u003eparent_root_objectid = parent_root_id.\n\nA previous attempt to fix this issue was made but was lost.\n\nhttps://lore.kernel.org/all/4CADAEEC020000780001B32C@vpn.id2.novell.com/\n\nAlthough this issue does not seem to be easily triggerable, it is a\npotential memory corruption bug that should be fixed. This patch\nresolves the issue by ensuring the function returns the appropriate size\nfor all three cases and validates that *max_len is large enough before\nwriting any data.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_10_61-rt-1-150600.1.3.1.x86_64",
"SUSE Real Time Module 15 SP6:cluster-md-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:dlm-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:gfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-devel-rt-6.4.0-150600.10.61.1.noarch",
"SUSE Real Time Module 15 SP6:kernel-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-rt-devel-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-rt_debug-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-rt_debug-devel-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-source-rt-6.4.0-150600.10.61.1.noarch",
"SUSE Real Time Module 15 SP6:kernel-syms-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:ocfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:gfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-rt-6.4.0-150600.10.61.1.noarch",
"openSUSE Leap 15.6:kernel-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-devel-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-extra-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-livepatch-devel-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-optional-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-vdso-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt_debug-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt_debug-devel-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt_debug-vdso-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-source-rt-6.4.0-150600.10.61.1.noarch",
"openSUSE Leap 15.6:kernel-syms-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kselftests-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-rt-6.4.0-150600.10.61.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40205",
"url": "https://www.suse.com/security/cve/CVE-2025-40205"
},
{
"category": "external",
"summary": "SUSE Bug 1253456 for CVE-2025-40205",
"url": "https://bugzilla.suse.com/1253456"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_10_61-rt-1-150600.1.3.1.x86_64",
"SUSE Real Time Module 15 SP6:cluster-md-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:dlm-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:gfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-devel-rt-6.4.0-150600.10.61.1.noarch",
"SUSE Real Time Module 15 SP6:kernel-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-rt-devel-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-rt_debug-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-rt_debug-devel-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-source-rt-6.4.0-150600.10.61.1.noarch",
"SUSE Real Time Module 15 SP6:kernel-syms-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:ocfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:gfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-rt-6.4.0-150600.10.61.1.noarch",
"openSUSE Leap 15.6:kernel-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-devel-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-extra-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-livepatch-devel-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-optional-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-vdso-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt_debug-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt_debug-devel-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt_debug-vdso-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-source-rt-6.4.0-150600.10.61.1.noarch",
"openSUSE Leap 15.6:kernel-syms-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kselftests-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-rt-6.4.0-150600.10.61.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_10_61-rt-1-150600.1.3.1.x86_64",
"SUSE Real Time Module 15 SP6:cluster-md-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:dlm-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:gfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-devel-rt-6.4.0-150600.10.61.1.noarch",
"SUSE Real Time Module 15 SP6:kernel-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-rt-devel-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-rt_debug-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-rt_debug-devel-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-source-rt-6.4.0-150600.10.61.1.noarch",
"SUSE Real Time Module 15 SP6:kernel-syms-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:ocfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:gfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-rt-6.4.0-150600.10.61.1.noarch",
"openSUSE Leap 15.6:kernel-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-devel-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-extra-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-livepatch-devel-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-optional-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-vdso-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt_debug-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt_debug-devel-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt_debug-vdso-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-source-rt-6.4.0-150600.10.61.1.noarch",
"openSUSE Leap 15.6:kernel-syms-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kselftests-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-rt-6.4.0-150600.10.61.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-24T12:42:49Z",
"details": "moderate"
}
],
"title": "CVE-2025-40205"
},
{
"cve": "CVE-2025-40206",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40206"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnetfilter: nft_objref: validate objref and objrefmap expressions\n\nReferencing a synproxy stateful object from OUTPUT hook causes kernel\ncrash due to infinite recursive calls:\n\nBUG: TASK stack guard page was hit at 000000008bda5b8c (stack is 000000003ab1c4a5..00000000494d8b12)\n[...]\nCall Trace:\n __find_rr_leaf+0x99/0x230\n fib6_table_lookup+0x13b/0x2d0\n ip6_pol_route+0xa4/0x400\n fib6_rule_lookup+0x156/0x240\n ip6_route_output_flags+0xc6/0x150\n __nf_ip6_route+0x23/0x50\n synproxy_send_tcp_ipv6+0x106/0x200\n synproxy_send_client_synack_ipv6+0x1aa/0x1f0\n nft_synproxy_do_eval+0x263/0x310\n nft_do_chain+0x5a8/0x5f0 [nf_tables\n nft_do_chain_inet+0x98/0x110\n nf_hook_slow+0x43/0xc0\n __ip6_local_out+0xf0/0x170\n ip6_local_out+0x17/0x70\n synproxy_send_tcp_ipv6+0x1a2/0x200\n synproxy_send_client_synack_ipv6+0x1aa/0x1f0\n[...]\n\nImplement objref and objrefmap expression validate functions.\n\nCurrently, only NFT_OBJECT_SYNPROXY object type requires validation.\nThis will also handle a jump to a chain using a synproxy object from the\nOUTPUT hook.\n\nNow when trying to reference a synproxy object in the OUTPUT hook, nft\nwill produce the following error:\n\nsynproxy_crash.nft: Error: Could not process rule: Operation not supported\n synproxy name mysynproxy\n ^^^^^^^^^^^^^^^^^^^^^^^^",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_10_61-rt-1-150600.1.3.1.x86_64",
"SUSE Real Time Module 15 SP6:cluster-md-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:dlm-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:gfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-devel-rt-6.4.0-150600.10.61.1.noarch",
"SUSE Real Time Module 15 SP6:kernel-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-rt-devel-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-rt_debug-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-rt_debug-devel-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-source-rt-6.4.0-150600.10.61.1.noarch",
"SUSE Real Time Module 15 SP6:kernel-syms-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:ocfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:gfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-rt-6.4.0-150600.10.61.1.noarch",
"openSUSE Leap 15.6:kernel-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-devel-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-extra-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-livepatch-devel-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-optional-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-vdso-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt_debug-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt_debug-devel-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt_debug-vdso-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-source-rt-6.4.0-150600.10.61.1.noarch",
"openSUSE Leap 15.6:kernel-syms-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kselftests-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-rt-6.4.0-150600.10.61.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40206",
"url": "https://www.suse.com/security/cve/CVE-2025-40206"
},
{
"category": "external",
"summary": "SUSE Bug 1253393 for CVE-2025-40206",
"url": "https://bugzilla.suse.com/1253393"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_10_61-rt-1-150600.1.3.1.x86_64",
"SUSE Real Time Module 15 SP6:cluster-md-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:dlm-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:gfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-devel-rt-6.4.0-150600.10.61.1.noarch",
"SUSE Real Time Module 15 SP6:kernel-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-rt-devel-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-rt_debug-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-rt_debug-devel-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-source-rt-6.4.0-150600.10.61.1.noarch",
"SUSE Real Time Module 15 SP6:kernel-syms-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:ocfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:gfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-rt-6.4.0-150600.10.61.1.noarch",
"openSUSE Leap 15.6:kernel-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-devel-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-extra-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-livepatch-devel-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-optional-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-vdso-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt_debug-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt_debug-devel-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt_debug-vdso-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-source-rt-6.4.0-150600.10.61.1.noarch",
"openSUSE Leap 15.6:kernel-syms-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kselftests-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-rt-6.4.0-150600.10.61.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.1,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_10_61-rt-1-150600.1.3.1.x86_64",
"SUSE Real Time Module 15 SP6:cluster-md-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:dlm-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:gfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-devel-rt-6.4.0-150600.10.61.1.noarch",
"SUSE Real Time Module 15 SP6:kernel-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-rt-devel-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-rt_debug-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-rt_debug-devel-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-source-rt-6.4.0-150600.10.61.1.noarch",
"SUSE Real Time Module 15 SP6:kernel-syms-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:ocfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:gfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-rt-6.4.0-150600.10.61.1.noarch",
"openSUSE Leap 15.6:kernel-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-devel-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-extra-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-livepatch-devel-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-optional-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-vdso-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt_debug-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt_debug-devel-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt_debug-vdso-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-source-rt-6.4.0-150600.10.61.1.noarch",
"openSUSE Leap 15.6:kernel-syms-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kselftests-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-rt-6.4.0-150600.10.61.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-24T12:42:49Z",
"details": "moderate"
}
],
"title": "CVE-2025-40206"
},
{
"cve": "CVE-2025-40207",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40207"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nmedia: v4l2-subdev: Fix alloc failure check in v4l2_subdev_call_state_try()\n\nv4l2_subdev_call_state_try() macro allocates a subdev state with\n__v4l2_subdev_state_alloc(), but does not check the returned value. If\n__v4l2_subdev_state_alloc fails, it returns an ERR_PTR, and that would\ncause v4l2_subdev_call_state_try() to crash.\n\nAdd proper error handling to v4l2_subdev_call_state_try().",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_10_61-rt-1-150600.1.3.1.x86_64",
"SUSE Real Time Module 15 SP6:cluster-md-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:dlm-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:gfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-devel-rt-6.4.0-150600.10.61.1.noarch",
"SUSE Real Time Module 15 SP6:kernel-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-rt-devel-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-rt_debug-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-rt_debug-devel-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-source-rt-6.4.0-150600.10.61.1.noarch",
"SUSE Real Time Module 15 SP6:kernel-syms-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:ocfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:gfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-rt-6.4.0-150600.10.61.1.noarch",
"openSUSE Leap 15.6:kernel-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-devel-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-extra-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-livepatch-devel-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-optional-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-vdso-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt_debug-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt_debug-devel-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt_debug-vdso-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-source-rt-6.4.0-150600.10.61.1.noarch",
"openSUSE Leap 15.6:kernel-syms-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kselftests-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-rt-6.4.0-150600.10.61.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40207",
"url": "https://www.suse.com/security/cve/CVE-2025-40207"
},
{
"category": "external",
"summary": "SUSE Bug 1253395 for CVE-2025-40207",
"url": "https://bugzilla.suse.com/1253395"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_10_61-rt-1-150600.1.3.1.x86_64",
"SUSE Real Time Module 15 SP6:cluster-md-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:dlm-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:gfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-devel-rt-6.4.0-150600.10.61.1.noarch",
"SUSE Real Time Module 15 SP6:kernel-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-rt-devel-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-rt_debug-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-rt_debug-devel-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-source-rt-6.4.0-150600.10.61.1.noarch",
"SUSE Real Time Module 15 SP6:kernel-syms-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:ocfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:gfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-rt-6.4.0-150600.10.61.1.noarch",
"openSUSE Leap 15.6:kernel-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-devel-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-extra-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-livepatch-devel-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-optional-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-vdso-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt_debug-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt_debug-devel-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt_debug-vdso-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-source-rt-6.4.0-150600.10.61.1.noarch",
"openSUSE Leap 15.6:kernel-syms-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kselftests-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-rt-6.4.0-150600.10.61.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_10_61-rt-1-150600.1.3.1.x86_64",
"SUSE Real Time Module 15 SP6:cluster-md-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:dlm-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:gfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-devel-rt-6.4.0-150600.10.61.1.noarch",
"SUSE Real Time Module 15 SP6:kernel-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-rt-devel-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-rt_debug-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-rt_debug-devel-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-source-rt-6.4.0-150600.10.61.1.noarch",
"SUSE Real Time Module 15 SP6:kernel-syms-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:ocfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:gfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-rt-6.4.0-150600.10.61.1.noarch",
"openSUSE Leap 15.6:kernel-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-devel-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-extra-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-livepatch-devel-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-optional-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-vdso-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt_debug-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt_debug-devel-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt_debug-vdso-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-source-rt-6.4.0-150600.10.61.1.noarch",
"openSUSE Leap 15.6:kernel-syms-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kselftests-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-rt-6.4.0-150600.10.61.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-24T12:42:49Z",
"details": "moderate"
}
],
"title": "CVE-2025-40207"
}
]
}
SUSE-SU-2025:4393-1
Vulnerability from csaf_suse - Published: 2025-12-15 11:09 - Updated: 2025-12-15 11:09Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Security update for the Linux Kernel",
"title": "Title of the patch"
},
{
"category": "description",
"text": "\nThe SUSE Linux Enterprise 15 SP7 kernel was updated to fix various security issues\n\nThe following security issues were fixed:\n\n- CVE-2022-50253: bpf: make sure skb-\u003elen != 0 when redirecting to a tunneling device (bsc#1249912).\n- CVE-2023-53676: scsi: target: iscsi: Fix buffer overflow in lio_target_nacl_info_show() (bsc#1251786).\n- CVE-2025-21710: tcp: correct handling of extreme memory squeeze (bsc#1237888).\n- CVE-2025-37916: pds_core: remove write-after-free of client_id (bsc#1243474).\n- CVE-2025-38359: s390/mm: Fix in_atomic() handling in do_secure_storage_access() (bsc#1247076).\n- CVE-2025-39788: scsi: ufs: exynos: Fix programming of HCI_UTRL_NEXUS_TYPE (bsc#1249547).\n- CVE-2025-39805: net: macb: fix unregister_netdev call order in macb_remove() (bsc#1249982).\n- CVE-2025-39819: fs/smb: Fix inconsistent refcnt update (bsc#1250176).\n- CVE-2025-39822: io_uring/kbuf: fix signedness in this_len calculation (bsc#1250034).\n- CVE-2025-39859: ptp: ocp: fix use-after-free bugs causing by ptp_ocp_watchdog (bsc#1250252).\n- CVE-2025-39944: octeontx2-pf: Fix use-after-free bugs in otx2_sync_tstamp() (bsc#1251120).\n- CVE-2025-39980: nexthop: Forbid FDB status change while nexthop is in a group (bsc#1252063).\n- CVE-2025-40001: scsi: mvsas: Fix use-after-free bugs in mvs_work_queue (bsc#1252303).\n- CVE-2025-40021: tracing: dynevent: Add a missing lockdown check on dynevent (bsc#1252681).\n- CVE-2025-40027: net/9p: fix double req put in p9_fd_cancelled (bsc#1252763).\n- CVE-2025-40030: pinctrl: check the return value of pinmux_ops::get_function_name() (bsc#1252773).\n- CVE-2025-40038: KVM: SVM: Skip fastpath emulation on VM-Exit if next RIP isn\u0027t valid (bsc#1252817).\n- CVE-2025-40040: mm/ksm: fix flag-dropping behavior in ksm_madvise (bsc#1252780).\n- CVE-2025-40047: io_uring/waitid: always prune wait queue entry in io_waitid_wait() (bsc#1252790).\n- CVE-2025-40048: uio_hv_generic: Let userspace take care of interrupt mask (bsc#1252862).\n- CVE-2025-40055: ocfs2: fix double free in user_cluster_connect() (bsc#1252821).\n- CVE-2025-40059: coresight: Fix incorrect handling for return value of devm_kzalloc (bsc#1252809).\n- CVE-2025-40064: smc: Fix use-after-free in __pnet_find_base_ndev() (bsc#1252845).\n- CVE-2025-40070: pps: fix warning in pps_register_cdev when register device fail (bsc#1252836).\n- CVE-2025-40074: ipv4: start using dst_dev_rcu() (bsc#1252794).\n- CVE-2025-40075: tcp_metrics: use dst_dev_net_rcu() (bsc#1252795).\n- CVE-2025-40080: nbd: restrict sockets to TCP and UDP (bsc#1252774).\n- CVE-2025-40083: net/sched: sch_qfq: Fix null-deref in agg_dequeue (bsc#1252912).\n- CVE-2025-40086: drm/xe: Don\u0027t allow evicting of BOs in same VM in array of VM binds (bsc#1252923).\n- CVE-2025-40098: ALSA: hda: cs35l41: Fix NULL pointer dereference in cs35l41_get_acpi_mute_state() (bsc#1252917).\n- CVE-2025-40105: vfs: Don\u0027t leak disconnected dentries on umount (bsc#1252928).\n- CVE-2025-40139: smc: Use __sk_dst_get() and dst_dev_rcu() in in smc_clc_prfx_set() (bsc#1253409).\n- CVE-2025-40149: tls: Use __sk_dst_get() and dst_dev_rcu() in get_netdev_for_sock() (bsc#1253355).\n- CVE-2025-40159: xsk: Harden userspace-supplied xdp_desc validation (bsc#1253403).\n- CVE-2025-40168: smc: Use __sk_dst_get() and dst_dev_rcu() in smc_clc_prfx_match() (bsc#1253427).\n- CVE-2025-40169: bpf: Reject negative offsets for ALU ops (bsc#1253416).\n- CVE-2025-40173: net/ip6_tunnel: Prevent perpetual tunnel growth (bsc#1253421).\n- CVE-2025-40176: tls: wait for pending async decryptions if tls_strp_msg_hold fails (bsc#1253425).\n- CVE-2025-40185: ice: ice_adapter: release xa entry on adapter allocation failure (bsc#1253394).\n- CVE-2025-40204: sctp: Fix MAC comparison to be constant-time (bsc#1253436).\n\nThe following non security issues were fixed:\n\n- ACPI: CPPC: Check _CPC validity for only the online CPUs (git-fixes).\n- ACPI: CPPC: Limit perf ctrs in PCC check only to online CPUs (git-fixes).\n- ACPI: CPPC: Perform fast check switch only for online CPUs (git-fixes).\n- ACPI: PRM: Skip handlers with NULL handler_address or NULL VA (stable-fixes).\n- ACPI: SBS: Fix present test in acpi_battery_read() (git-fixes).\n- ACPI: property: Return present device nodes only on fwnode interface (stable-fixes).\n- ACPI: scan: Add Intel CVS ACPI HIDs to acpi_ignore_dep_ids (stable-fixes).\n- ACPICA: Update dsmethod.c to get rid of unused variable warning (stable-fixes).\n- ACPICA: dispatcher: Use acpi_ds_clear_operands() in acpi_ds_call_control_method() (stable-fixes).\n- ALSA: hda: Fix missing pointer check in hda_component_manager_init function (git-fixes).\n- ALSA: serial-generic: remove shared static buffer (stable-fixes).\n- ALSA: usb-audio: Add validation of UAC2/UAC3 effect units (stable-fixes).\n- ALSA: usb-audio: Fix NULL pointer dereference in snd_usb_mixer_controls_badd (git-fixes).\n- ALSA: usb-audio: Fix potential overflow of PCM transfer buffer (stable-fixes).\n- ALSA: usb-audio: add mono main switch to Presonus S1824c (stable-fixes).\n- ALSA: usb-audio: apply quirk for MOONDROP Quark2 (stable-fixes).\n- ALSA: usb-audio: don\u0027t log messages meant for 1810c when initializing 1824c (git-fixes).\n- ASoC: codecs: va-macro: fix resource leak in probe error path (git-fixes).\n- ASoC: cs4271: Fix regulator leak on probe failure (git-fixes).\n- ASoC: max98090/91: fixed max98091 ALSA widget powering up/down (stable-fixes).\n- ASoC: meson: aiu-encoder-i2s: fix bit clock polarity (stable-fixes).\n- ASoC: qcom: sc8280xp: explicitly set S16LE format in sc8280xp_be_hw_params_fixup() (stable-fixes).\n- ASoC: stm32: sai: manage context in set_sysclk callback (stable-fixes).\n- ASoC: tas2781: fix getting the wrong device number (git-fixes).\n- ASoC: tlv320aic3x: Fix class-D initialization for tlv320aic3007 (stable-fixes).\n- Bluetooth: 6lowpan: Don\u0027t hold spin lock over sleeping functions (git-fixes).\n- Bluetooth: 6lowpan: add missing l2cap_chan_lock() (git-fixes).\n- Bluetooth: 6lowpan: fix BDADDR_LE vs ADDR_LE_DEV address type confusion (git-fixes).\n- Bluetooth: 6lowpan: reset link-local header on ipv6 recv path (git-fixes).\n- Bluetooth: L2CAP: export l2cap_chan_hold for modules (stable-fixes).\n- Bluetooth: MGMT: Fix OOB access in parse_adv_monitor_pattern() (git-fixes).\n- Bluetooth: MGMT: cancel mesh send timer when hdev removed (git-fixes).\n- Bluetooth: SCO: Fix UAF on sco_conn_free (stable-fixes).\n- Bluetooth: bcsp: receive data only if registered (stable-fixes).\n- Bluetooth: btrtl: Fix memory leak in rtlbt_parse_firmware_v2() (git-fixes).\n- Bluetooth: btusb: Check for unexpected bytes when defragmenting HCI frames (stable-fixes).\n- Bluetooth: btusb: reorder cleanup in btusb_disconnect to avoid UAF (git-fixes).\n- Bluetooth: hci_event: validate skb length for unknown CC opcode (git-fixes).\n- Drivers: hv: vmbus: Add utility function for querying ring size (git-fixes).\n- HID: amd_sfh: Stop sensor before starting (git-fixes).\n- HID: hid-ntrig: Prevent memory leak in ntrig_report_version() (git-fixes).\n- HID: quirks: avoid Cooler Master MM712 dongle wakeup bug (stable-fixes).\n- HID: quirks: work around VID/PID conflict for 0x4c4a/0x4155 (git-fixes).\n- HID: uclogic: Fix potential memory leak in error path (git-fixes).\n- Input: atmel_mxt_ts - allow reset GPIO to sleep (stable-fixes).\n- Input: imx_sc_key - fix memory corruption on unload (git-fixes).\n- Input: pegasus-notetaker - fix potential out-of-bounds access (git-fixes).\n- KVM: Pass new routing entries and irqfd when updating IRTEs (git-fixes).\n- KVM: SEV: Enforce minimum GHCB version requirement for SEV-SNP guests (git-fixes).\n- KVM: SVM: Delete IRTE link from previous vCPU before setting new IRTE (git-fixes).\n- KVM: SVM: Delete IRTE link from previous vCPU irrespective of new routing (git-fixes).\n- KVM: SVM: Emulate PERF_CNTR_GLOBAL_STATUS_SET for PerfMonV2 (git-fixes).\n- KVM: SVM: Mark VMCB_LBR dirty when MSR_IA32_DEBUGCTLMSR is updated (git-fixes).\n- KVM: SVM: Re-load current, not host, TSC_AUX on #VMEXIT from SEV-ES guest (git-fixes).\n- KVM: SVM: Track per-vCPU IRTEs using kvm_kernel_irqfd structure (git-fixes).\n- KVM: SVM: WARN if an invalid posted interrupt IRTE entry is added (git-fixes).\n- KVM: VMX: Allow guest to set DEBUGCTL.RTM_DEBUG if RTM is supported (git-fixes).\n- KVM: VMX: Apply MMIO Stale Data mitigation if KVM maps MMIO into the guest (git-fixes).\n- KVM: VMX: Fix check for valid GVA on an EPT violation (git-fixes).\n- KVM: VMX: Preserve host\u0027s DEBUGCTLMSR_FREEZE_IN_SMM while running the guest (git-fixes).\n- KVM: VMX: Wrap all accesses to IA32_DEBUGCTL with getter/setter APIs (git-fixes).\n- KVM: nVMX: Check vmcs12-\u003eguest_ia32_debugctl on nested VM-Enter (git-fixes).\n- KVM: s390: improve interrupt cpu for wakeup (bsc#1235463).\n- KVM: s390: kABI backport for \u0027last_sleep_cpu\u0027 (bsc#1252352).\n- KVM: x86/mmu: Locally cache whether a PFN is host MMIO when making a SPTE (git-fixes).\n- KVM: x86: Add helper to retrieve current value of user return MSR (git-fixes).\n- KVM: x86: Convert vcpu_run()\u0027s immediate exit param into a generic bitmap (git-fixes).\n- KVM: x86: Don\u0027t treat ENTER and LEAVE as branches, because they aren\u0027t (git-fixes).\n- KVM: x86: Drop kvm_x86_ops.set_dr6() in favor of a new KVM_RUN flag (git-fixes).\n- KVM: x86: Have all vendor neutral sub-configs depend on KVM_X86, not just KVM (git-fixes).\n- NFS4: Fix state renewals missing after boot (git-fixes).\n- NFS: check if suid/sgid was cleared after a write as needed (git-fixes).\n- NFSD: Never cache a COMPOUND when the SEQUENCE operation fails (git-fixes).\n- NFSD: Skip close replay processing if XDR encoding fails (git-fixes).\n- NFSD: free copynotify stateid in nfs4_free_ol_stateid() (git-fixes).\n- NFSv4.1: fix mount hang after CREATE_SESSION failure (git-fixes).\n- NFSv4: handle ERR_GRACE on delegation recalls (git-fixes).\n- PCI/P2PDMA: Fix incorrect pointer usage in devm_kfree() call (stable-fixes).\n- PCI/PM: Skip resuming to D0 if device is disconnected (stable-fixes).\n- PCI: Disable MSI on RDC PCI to PCIe bridges (stable-fixes).\n- PCI: cadence: Check for the existence of cdns_pcie::ops before using it (stable-fixes).\n- PCI: dwc: Verify the single eDMA IRQ in dw_pcie_edma_irq_verify() (stable-fixes).\n- PCI: j721e: Fix incorrect error message in probe() (git-fixes).\n- PCI: rcar-host: Convert struct rcar_msi mask_lock into raw spinlock (git-fixes).\n- PCI: tegra194: Reset BARs when running in PCIe endpoint mode (git-fixes).\n- RDMA/bnxt_re: Don\u0027t fail destroy QP and cleanup debugfs earlier (git-fixes).\n- RDMA/bnxt_re: Fix a potential memory leak in destroy_gsi_sqp (git-fixes).\n- RDMA/hns: Fix recv CQ and QP cache affinity (git-fixes).\n- RDMA/hns: Fix the modification of max_send_sge (git-fixes).\n- RDMA/hns: Fix wrong WQE data when QP wraps around (git-fixes).\n- RDMA/irdma: Fix SD index calculation (git-fixes).\n- RDMA/irdma: Set irdma_cq cq_num field during CQ create (git-fixes).\n- accel/habanalabs/gaudi2: fix BMON disable configuration (stable-fixes).\n- accel/habanalabs/gaudi2: read preboot status after recovering from dirty state (stable-fixes).\n- accel/habanalabs: return ENOMEM if less than requested pages were pinned (stable-fixes).\n- accel/habanalabs: support mapping cb with vmalloc-backed coherent memory (stable-fixes).\n- acpi,srat: Fix incorrect device handle check for Generic Initiator (git-fixes).\n- acpi/hmat: Fix lockdep warning for hmem_register_resource() (git-fixes).\n- amd/amdkfd: resolve a race in amdgpu_amdkfd_device_fini_sw (stable-fixes).\n- ata: libata-scsi: Add missing scsi_device_put() in ata_scsi_dev_rescan() (git-fixes).\n- block: avoid possible overflow for chunk_sectors check in blk_stack_limits() (git-fixes).\n- block: fix kobject double initialization in add_disk (git-fixes).\n- bpf: Fix test verif_scale_strobemeta_subprogs failure due to llvm19 (bsc#1252368).\n- bpf: improve error message for unsupported helper (bsc#1252370).\n- btrfs: abort transaction on failure to add link to inode (git-fixes).\n- btrfs: avoid page_lockend underflow in btrfs_punch_hole_lock_range() (git-fix).\n- btrfs: avoid using fixed char array size for tree names (git-fix).\n- btrfs: do not update last_log_commit when logging inode due to a new name (git-fixes).\n- btrfs: fix COW handling in run_delalloc_nocow() (git-fix).\n- btrfs: fix inode leak on failure to add link to inode (git-fixes).\n- btrfs: make btrfs_clear_delalloc_extent() free delalloc reserve (git-fix).\n- btrfs: mark dirty extent range for out of bound prealloc extents (git-fixes).\n- btrfs: qgroup: correctly model root qgroup rsv in convert (git-fix).\n- btrfs: rename err to ret in btrfs_link() (git-fixes).\n- btrfs: run btrfs_error_commit_super() early (git-fix).\n- btrfs: scrub: put bio after errors in scrub_raid56_parity_stripe() (git-fix).\n- btrfs: scrub: put bio after errors in scrub_raid56_parity_stripe() (git-fixes).\n- btrfs: send: fix duplicated rmdir operations when using extrefs (git-fixes).\n- btrfs: set inode flag BTRFS_INODE_COPY_EVERYTHING when logging new name (git-fixes).\n- btrfs: simplify error handling logic for btrfs_link() (git-fixes).\n- btrfs: tree-checker: add dev extent item checks (git-fix).\n- btrfs: tree-checker: add type and sequence check for inline backrefs (git-fix).\n- btrfs: tree-checker: fix the wrong output of data backref objectid (git-fix).\n- btrfs: tree-checker: reject BTRFS_FT_UNKNOWN dir type (git-fix).\n- btrfs: tree-checker: validate dref root and objectid (git-fix).\n- btrfs: use smp_mb__after_atomic() when forcing COW in create_pending_snapshot() (git-fixes).\n- cgroup/cpuset: Remove remote_partition_check() \u0026 make update_cpumasks_hier() handle remote partition (bsc#1241166).\n- char: misc: Does not request module for miscdevice with dynamic minor (stable-fixes).\n- char: misc: Make misc_register() reentry for miscdevice who wants dynamic minor (stable-fixes).\n- char: misc: restrict the dynamic range to exclude reserved minors (stable-fixes).\n- cpuset: Use new excpus for nocpu error check when enabling root partition (bsc#1241166).\n- cpuset: fix failure to enable isolated partition when containing isolcpus (bsc#1241166).\n- cramfs: Verify inode mode when loading from disk (git-fixes).\n- crypto: aspeed - fix double free caused by devm (git-fixes).\n- crypto: aspeed-acry - Convert to platform remove callback returning void (stable-fixes).\n- crypto: hisilicon/qm - Fix device reference leak in qm_get_qos_value (git-fixes).\n- crypto: iaa - Do not clobber req-\u003ebase.data (git-fixes).\n- crypto: qat - use kcalloc() in qat_uclo_map_objs_from_mof() (stable-fixes).\n- dmaengine: dw-edma: Set status for callback_result (stable-fixes).\n- dmaengine: mv_xor: match alloc_wc and free_wc (stable-fixes).\n- drm/amd/amdgpu: Release xcp drm memory after unplug (stable-fixes).\n- drm/amd/display/dml2: Guard dml21_map_dc_state_into_dml_display_cfg with DC_FP_START (stable-fixes).\n- drm/amd/display: Add AVI infoframe copy in copy_stream_update_to_stream (stable-fixes).\n- drm/amd/display: Add fallback path for YCBCR422 (stable-fixes).\n- drm/amd/display: Allow VRR params change if unsynced with the stream (git-fixes).\n- drm/amd/display: Disable VRR on DCE 6 (stable-fixes).\n- drm/amd/display: Enable mst when it\u0027s detected but yet to be initialized (git-fixes).\n- drm/amd/display: Fix DVI-D/HDMI adapters (stable-fixes).\n- drm/amd/display: Fix NULL deref in debugfs odm_combine_segments (git-fixes).\n- drm/amd/display: Fix black screen with HDMI outputs (git-fixes).\n- drm/amd/display: Fix for test crash due to power gating (stable-fixes).\n- drm/amd/display: Fix incorrect return of vblank enable on unconfigured crtc (stable-fixes).\n- drm/amd/display: Fix pbn_div Calculation Error (stable-fixes).\n- drm/amd/display: Increase AUX Intra-Hop Done Max Wait Duration (stable-fixes).\n- drm/amd/display: Increase minimum clock for TMDS 420 with pipe splitting (stable-fixes).\n- drm/amd/display: Init dispclk from bootup clock for DCN314 (stable-fixes).\n- drm/amd/display: Move setup_stream_attribute (stable-fixes).\n- drm/amd/display: Reject modes with too high pixel clock on DCE6-10 (git-fixes).\n- drm/amd/display: Reset apply_eamless_boot_optimization when dpms_off (stable-fixes).\n- drm/amd/display: Set up pixel encoding for YCBCR422 (stable-fixes).\n- drm/amd/display: Support HW cursor 180 rot for any number of pipe splits (stable-fixes).\n- drm/amd/display: Wait until OTG enable state is cleared (stable-fixes).\n- drm/amd/display: add more cyan skillfish devices (stable-fixes).\n- drm/amd/display: change dc stream color settings only in atomic commit (stable-fixes).\n- drm/amd/display: ensure committing streams is seamless (stable-fixes).\n- drm/amd/display: fix condition for setting timing_adjust_pending (stable-fixes).\n- drm/amd/display: fix dml ms order of operations (stable-fixes).\n- drm/amd/display: incorrect conditions for failing dto calculations (stable-fixes).\n- drm/amd/display: update color on atomic commit time (stable-fixes).\n- drm/amd/display: update dpp/disp clock from smu clock table (stable-fixes).\n- drm/amd/pm: Disable MCLK switching on SI at high pixel clocks (stable-fixes).\n- drm/amd/pm: Use cached metrics data on aldebaran (stable-fixes).\n- drm/amd/pm: Use cached metrics data on arcturus (stable-fixes).\n- drm/amd: Avoid evicting resources at S5 (stable-fixes).\n- drm/amd: Check that VPE has reached DPM0 in idle handler (stable-fixes).\n- drm/amd: Fix suspend failure with secure display TA (git-fixes).\n- drm/amd: add more cyan skillfish PCI ids (stable-fixes).\n- drm/amdgpu/atom: Check kcalloc() for WS buffer in amdgpu_atom_execute_table_locked() (stable-fixes).\n- drm/amdgpu/jpeg: Hold pg_lock before jpeg poweroff (stable-fixes).\n- drm/amdgpu/smu: Handle S0ix for vangogh (stable-fixes).\n- drm/amdgpu: Allow kfd CRIU with no buffer objects (stable-fixes).\n- drm/amdgpu: Check vcn sram load return value (stable-fixes).\n- drm/amdgpu: Correct the counts of nr_banks and nr_errors (stable-fixes).\n- drm/amdgpu: Fix NULL pointer dereference in VRAM logic for APU devices (stable-fixes).\n- drm/amdgpu: Fix function header names in amdgpu_connectors.c (git-fixes).\n- drm/amdgpu: Fix unintended error log in VCN5_0_0 (git-fixes).\n- drm/amdgpu: Respect max pixel clock for HDMI and DVI-D (v2) (stable-fixes).\n- drm/amdgpu: Skip poison aca bank from UE channel (stable-fixes).\n- drm/amdgpu: Use memdup_array_user in amdgpu_cs_wait_fences_ioctl (stable-fixes).\n- drm/amdgpu: add range check for RAS bad page address (stable-fixes).\n- drm/amdgpu: add support for cyan skillfish gpu_info (stable-fixes).\n- drm/amdgpu: disable peer-to-peer access for DCC-enabled GC12 VRAM surfaces (stable-fixes).\n- drm/amdgpu: don\u0027t enable SMU on cyan skillfish (stable-fixes).\n- drm/amdgpu: fix nullptr err of vm_handle_moved (stable-fixes).\n- drm/amdgpu: hide VRAM sysfs attributes on GPUs without VRAM (stable-fixes).\n- drm/amdgpu: reject gang submissions under SRIOV (stable-fixes).\n- drm/amdgpu: remove two invalid BUG_ON()s (stable-fixes).\n- drm/amdkfd: Handle lack of READ permissions in SVM mapping (stable-fixes).\n- drm/amdkfd: Tie UNMAP_LATENCY to queue_preemption (stable-fixes).\n- drm/amdkfd: fix vram allocation failure for a special case (stable-fixes).\n- drm/amdkfd: relax checks for over allocation of save area (stable-fixes).\n- drm/amdkfd: return -ENOTTY for unsupported IOCTLs (stable-fixes).\n- drm/ast: Blank with VGACR17 sync enable, always clear VGACRB6 sync off (git-fixes).\n- drm/bridge: cdns-dsi: Don\u0027t fail on MIPI_DSI_MODE_VIDEO_BURST (stable-fixes).\n- drm/bridge: cdns-dsi: Fix REG_WAKEUP_TIME value (stable-fixes).\n- drm/bridge: display-connector: don\u0027t set OP_DETECT for DisplayPorts (stable-fixes).\n- drm/exynos: exynos7_drm_decon: remove ctx-\u003esuspended (git-fixes).\n- drm/i915/dp_mst: Work around Thunderbolt sink disconnect after SINK_COUNT_ESI read (stable-fixes).\n- drm/i915: Avoid lock inversion when pinning to GGTT on CHV/BXT+VTD (git-fixes).\n- drm/i915: Fix conversion between clock ticks and nanoseconds (git-fixes).\n- drm/mediatek: Add pm_runtime support for GCE power control (git-fixes).\n- drm/mediatek: Disable AFBC support on Mediatek DRM driver (git-fixes).\n- drm/msm/a6xx: Fix PDC sleep sequence (git-fixes).\n- drm/msm/dsi/phy: Toggle back buffer resync after preparing PLL (stable-fixes).\n- drm/msm/dsi/phy_7nm: Fix missing initial VCO rate (stable-fixes).\n- drm/msm/registers: Generate _HI/LO builders for reg64 (stable-fixes).\n- drm/msm: make sure to not queue up recovery more than once (stable-fixes).\n- drm/nouveau: replace snprintf() with scnprintf() in nvkm_snprintbf() (stable-fixes).\n- drm/panthor: Serialize GPU cache flush operations (stable-fixes).\n- drm/panthor: check bo offset alignment in vm bind (stable-fixes).\n- drm/sched: Fix deadlock in drm_sched_entity_kill_jobs_cb (git-fixes).\n- drm/sched: Optimise drm_sched_entity_push_job (stable-fixes).\n- drm/sched: avoid killing parent entity on child SIGKILL (stable-fixes).\n- drm/tegra: Add call to put_pid() (git-fixes).\n- drm/tegra: dc: Fix reference leak in tegra_dc_couple() (git-fixes).\n- drm/tidss: Set crtc modesetting parameters with adjusted mode (stable-fixes).\n- drm/tidss: Use the crtc_* timings when programming the HW (stable-fixes).\n- drm/vmwgfx: Validate command header size against SVGA_CMD_MAX_DATASIZE (git-fixes).\n- drm/xe/guc: Add more GuC load error status codes (stable-fixes).\n- drm/xe/guc: Increase GuC crash dump buffer size (stable-fixes).\n- drm/xe/guc: Return an error code if the GuC load fails (stable-fixes).\n- drm/xe/guc: Set upper limit of H2G retries over CTB (stable-fixes).\n- drm/xe/guc: Synchronize Dead CT worker with unbind (git-fixes).\n- drm/xe: Do clean shutdown also when using flr (git-fixes).\n- drm/xe: Do not wake device during a GT reset (git-fixes).\n- drm/xe: Fix oops in xe_gem_fault when running core_hotunplug test (stable-fixes).\n- drm/xe: Move declarations under conditional branch (stable-fixes).\n- drm/xe: Remove duplicate DRM_EXEC selection from Kconfig (git-fixes).\n- drm: panel-backlight-quirks: Make EDID match optional (stable-fixes).\n- exfat: limit log print for IO error (git-fixes).\n- extcon: adc-jack: Cleanup wakeup source only if it was enabled (git-fixes).\n- extcon: adc-jack: Fix wakeup source leaks on device unbind (stable-fixes).\n- fbcon: Set fb_display[i]-\u003emode to NULL when the mode is released (stable-fixes).\n- fbdev: Add bounds checking in bit_putcs to fix vmalloc-out-of-bounds (stable-fixes).\n- fbdev: bitblit: bound-check glyph index in bit_putcs* (stable-fixes).\n- fbdev: pvr2fb: Fix leftover reference to ONCHIP_NR_DMA_CHANNELS (stable-fixes).\n- hwmon: (asus-ec-sensors) increase timeout for locking ACPI mutex (stable-fixes).\n- hwmon: (dell-smm) Add support for Dell OptiPlex 7040 (stable-fixes).\n- hwmon: (k10temp) Add device ID for Strix Halo (stable-fixes).\n- hwmon: (k10temp) Add thermal support for AMD Family 1Ah-based models (stable-fixes).\n- hwmon: (sbtsi_temp) AMD CPU extended temperature range support (stable-fixes).\n- hwmon: sy7636a: add alias (stable-fixes).\n- hyperv: Remove the spurious null directive line (git-fixes).\n- iio: adc: imx93_adc: load calibrated values even calibration failed (stable-fixes).\n- iio: adc: spear_adc: mask SPEAR_ADC_STATUS channel and avg sample before setting register (stable-fixes).\n- ima: don\u0027t clear IMA_DIGSIG flag when setting or removing non-IMA xattr (stable-fixes).\n- iommu/amd: Return an error if vCPU affinity is set for non-vCPU IRTE (git-fixes).\n- isdn: mISDN: hfcsusb: fix memory leak in hfcsusb_probe() (git-fixes).\n- ixgbe: fix memory leak and use-after-free in ixgbe_recovery_probe() (git-fixes).\n- jfs: Verify inode mode when loading from disk (git-fixes).\n- jfs: fix uninitialized waitqueue in transaction manager (git-fixes).\n- lib/crypto: curve25519-hacl64: Fix older clang KASAN workaround for GCC (git-fixes).\n- md/raid1: fix data lost for writemostly rdev (git-fixes).\n- md: fix mssing blktrace bio split events (git-fixes).\n- media: adv7180: Add missing lock in suspend callback (stable-fixes).\n- media: adv7180: Do not write format to device in set_fmt (stable-fixes).\n- media: adv7180: Only validate format in querystd (stable-fixes).\n- media: amphion: Delete v4l2_fh synchronously in .release() (stable-fixes).\n- media: fix uninitialized symbol warnings (stable-fixes).\n- media: i2c: Kconfig: Ensure a dependency on HAVE_CLK for VIDEO_CAMERA_SENSOR (stable-fixes).\n- media: i2c: og01a1b: Specify monochrome media bus format instead of Bayer (stable-fixes).\n- media: imon: make send_packet() more robust (stable-fixes).\n- media: ov08x40: Fix the horizontal flip control (stable-fixes).\n- media: redrat3: use int type to store negative error codes (stable-fixes).\n- media: uvcvideo: Use heuristic to find stream entity (git-fixes).\n- media: videobuf2: forbid remove_bufs when legacy fileio is active (git-fixes).\n- memstick: Add timeout to prevent indefinite waiting (stable-fixes).\n- mfd: da9063: Split chip variant reading in two bus transactions (stable-fixes).\n- mfd: madera: Work around false-positive -Wininitialized warning (stable-fixes).\n- mfd: stmpe-i2c: Add missing MODULE_LICENSE (stable-fixes).\n- mfd: stmpe: Remove IRQ domain upon removal (stable-fixes).\n- minixfs: Verify inode mode when loading from disk (git-fixes).\n- mm/mm_init: fix hash table order logging in alloc_large_system_hash() (git-fixes).\n- mm/secretmem: fix use-after-free race in fault handler (git-fixes).\n- mmc: host: renesas_sdhi: Fix the actual clock (stable-fixes).\n- mmc: sdhci-msm: Enable tuning for SDR50 mode for SD card (stable-fixes).\n- mmc: sdhci-of-dwcmshc: Change DLL_STRBIN_TAPNUM_DEFAULT to 0x4 (git-fixes).\n- mtd: onenand: Pass correct pointer to IRQ handler (git-fixes).\n- mtd: rawnand: cadence: fix DMA device NULL pointer dereference (git-fixes).\n- mtdchar: fix integer overflow in read/write ioctls (git-fixes).\n- net/mana: fix warning in the writer of client oob (git-fixes).\n- net/smc: Remove validation of reserved bits in CLC Decline message (bsc#1253779).\n- net: nfc: nci: Increase NCI_DATA_TIMEOUT to 3000 ms (stable-fixes).\n- net: phy: clear link parameters on admin link down (stable-fixes).\n- net: phy: fixed_phy: let fixed_phy_unregister free the phy_device (stable-fixes).\n- net: phy: marvell: Fix 88e1510 downshift counter errata (stable-fixes).\n- net: tcp: send zero-window ACK when no memory (bsc#1253779).\n- net: usb: qmi_wwan: initialize MAC header offset in qmimux_rx_fixup (git-fixes).\n- nfs4_setup_readdir(): insufficient locking for -\u003ed_parent-\u003ed_inode dereferencing (git-fixes).\n- nouveau/firmware: Add missing kfree() of nvkm_falcon_fw::boot (git-fixes).\n- nvme-auth: add hkdf_expand_label() (bsc#1247683).\n- nvme-auth: use hkdf_expand_label() (bsc#1247683).\n- phy: cadence: cdns-dphy: Enable lower resolutions in dphy (stable-fixes).\n- phy: renesas: r8a779f0-ether-serdes: add new step added to latest datasheet (stable-fixes).\n- phy: rockchip: phy-rockchip-inno-csidphy: allow writes to grf register 0 (stable-fixes).\n- pinctrl: s32cc: fix uninitialized memory in s32_pinctrl_desc (git-fixes).\n- pinctrl: s32cc: initialize gpio_pin_config::list after kmalloc() (git-fixes).\n- pinctrl: single: fix bias pull up/down handling in pin_config_set (stable-fixes).\n- platform/x86/intel/speed_select_if: Convert PCIBIOS_* return codes to errnos (git-fixes).\n- power: supply: qcom_battmgr: add OOI chemistry (stable-fixes).\n- power: supply: qcom_battmgr: handle charging state change notifications (stable-fixes).\n- power: supply: sbs-charger: Support multiple devices (stable-fixes).\n- powerpc: export MIN RMA size (bsc#1236743 ltc#211409).\n- powerpc: increase MIN RMA size for CAS negotiation (bsc#1236743 ltc#211409 bsc#1252269 ltc#215957).\n- regulator: fixed: fix GPIO descriptor leak on register failure (git-fixes).\n- rtc: rx8025: fix incorrect register reference (git-fixes).\n- s390/mm,fault: simplify kfence fault handling (bsc#1247076).\n- scsi: Fix sas_user_scan() to handle wildcard and multi-channel scans (git-fixes).\n- scsi: aacraid: Stop using PCI_IRQ_AFFINITY (git-fixes).\n- scsi: core: sysfs: Correct sysfs attributes access rights (git-fixes).\n- scsi: hpsa: Fix potential memory leak in hpsa_big_passthru_ioctl() (git-fixes).\n- scsi: libfc: Prevent integer overflow in fc_fcp_recv_data() (git-fixes).\n- scsi: mpi3mr: Correctly handle ATA device errors (git-fixes).\n- scsi: mpi3mr: Drop unnecessary volatile from __iomem pointers (git-fixes).\n- scsi: mpt3sas: Correctly handle ATA device errors (git-fixes).\n- scsi: mpt3sas: Fix crash in transport port remove by using ioc_info() (git-fixes).\n- scsi: pm80xx: Fix array-index-out-of-of-bounds on rmmod (git-fixes).\n- scsi: storvsc: Prefer returning channel with the same CPU as on the I/O issuing CPU (bsc#1252267).\n- selftests/bpf: Check for timeout in perf_link test (bsc#1253648).\n- selftests/bpf: Close fd in error path in drop_on_reuseport (git-fixes).\n- selftests/bpf: Close obj in error path in xdp_adjust_tail (git-fixes).\n- selftests/bpf: Fix missing ARRAY_SIZE() definition in bench.c (git-fixes).\n- selftests/bpf: Fix missing BUILD_BUG_ON() declaration (git-fixes).\n- selftests/bpf: Fix missing UINT_MAX definitions in benchmarks (git-fixes).\n- selftests/bpf: Fix string read in strncmp benchmark (git-fixes).\n- selftests/bpf: Mitigate sockmap_ktls disconnect_after_delete failure (git-fixes).\n- selftests/bpf: Remove sockmap_ktls disconnect_after_delete test (bsc#1252365).\n- selftests/bpf: Remove tests for zeroed-array kptr (bsc#1252366).\n- selftests/bpf: Use pid_t consistently in test_progs.c (git-fixes).\n- selftests/bpf: fix signedness bug in redir_partial() (git-fixes).\n- selftests/net/forwarding: add slowwait functions (bsc#1254235).\n- selftests/net/lib: no need to record ns name if it already exist (bsc#1254235).\n- selftests/net/lib: update busywait timeout value (bsc#1254235).\n- selftests/net: add lib.sh (bsc#1254235).\n- selftests/net: add variable NS_LIST for lib.sh (bsc#1254235).\n- selftests/net: use tc rule to filter the na packet (bsc#1254235).\n- selftests/run_kselftest.sh: Add `--skip` argument option (bsc#1254221).\n- selftests: forwarding.config.sample: Move overrides to lib.sh (bsc#1254235).\n- selftests: forwarding: Add a test for testing lib.sh functionality (bsc#1254235).\n- selftests: forwarding: Avoid failures to source net/lib.sh (bsc#1254235).\n- selftests: forwarding: Change inappropriate log_test_skip() calls (bsc#1254235).\n- selftests: forwarding: Convert log_test() to recognize RET values (bsc#1254235).\n- selftests: forwarding: Have RET track kselftest framework constants (bsc#1254235).\n- selftests: forwarding: Parametrize mausezahn delay (bsc#1254235).\n- selftests: forwarding: Redefine relative_path variable (bsc#1254235).\n- selftests: forwarding: Remove duplicated lib.sh content (bsc#1254235).\n- selftests: forwarding: Support for performance sensitive tests (bsc#1254235).\n- selftests: lib: Define more kselftest exit codes (bsc#1254235).\n- selftests: lib: tc_rule_stats_get(): Move default to argument definition (bsc#1254235).\n- selftests: net: List helper scripts in TEST_FILES Makefile variable (bsc#1254235).\n- selftests: net: Unify code of busywait() and slowwait() (bsc#1254235).\n- selftests: net: add helper for checking if nettest is available (bsc#1254235).\n- selftests: net: lib: Do not overwrite error messages (bsc#1254235).\n- selftests: net: lib: Move logging from forwarding/lib.sh here (bsc#1254235).\n- selftests: net: lib: avoid error removing empty netns name (bsc#1254235).\n- selftests: net: lib: do not set ns var as readonly (bsc#1254235).\n- selftests: net: lib: fix shift count out of range (bsc#1254235).\n- selftests: net: lib: ignore possible errors (bsc#1254235).\n- selftests: net: lib: kill PIDs before del netns (bsc#1254235).\n- selftests: net: lib: remove \u0027ns\u0027 var in setup_ns (bsc#1254235).\n- selftests: net: lib: remove ns from list after clean-up (bsc#1254235).\n- selftests: net: lib: set \u0027i\u0027 as local (bsc#1254235).\n- selftests: net: lib: support errexit with busywait (bsc#1254235).\n- selftests: net: libs: Change variable fallback syntax (bsc#1254235).\n- serial: 8250_exar: add support for Advantech 2 port card with Device ID 0x0018 (git-fixes).\n- serial: 8250_mtk: Enable baud clock and manage in runtime PM (git-fixes).\n- soc/tegra: fuse: Add Tegra114 nvmem cells and fuse lookups (stable-fixes).\n- soc: aspeed: socinfo: Add AST27xx silicon IDs (stable-fixes).\n- soc: qcom: smem: Fix endian-unaware access of num_entries (stable-fixes).\n- spi: Try to get ACPI GPIO IRQ earlier (git-fixes).\n- spi: loopback-test: Don\u0027t use %pK through printk (stable-fixes).\n- spi: rpc-if: Add resume support for RZ/G3E (stable-fixes).\n- strparser: Fix signed/unsigned mismatch bug (git-fixes).\n- tcp_bpf: Call sk_msg_free() when tcp_bpf_send_verdict() fails to allocate psock-\u003ecork (bsc#1250705).\n- thunderbolt: Use is_pciehp instead of is_hotplug_bridge (stable-fixes).\n- tools/cpupower: Fix incorrect size in cpuidle_state_disable() (stable-fixes).\n- tools/cpupower: fix error return value in cpupower_write_sysfs() (stable-fixes).\n- tools/hv: fcopy: Fix incorrect file path conversion (git-fixes).\n- tools/power x86_energy_perf_policy: Enhance HWP enable (stable-fixes).\n- tools/power x86_energy_perf_policy: Fix incorrect fopen mode usage (stable-fixes).\n- tools/power x86_energy_perf_policy: Prefer driver HWP limits (stable-fixes).\n- tools: lib: thermal: don\u0027t preserve owner in install (stable-fixes).\n- tools: lib: thermal: use pkg-config to locate libnl3 (stable-fixes).\n- uio_hv_generic: Query the ringbuffer size for device (git-fixes).\n- usb/core/quirks: Add Huawei ME906S to wakeup quirk (git-fixes).\n- usb: cdns3: gadget: Use-after-free during failed initialization and exit of cdnsp gadget (stable-fixes).\n- usb: gadget: f_fs: Fix epfile null pointer access after ep enable (stable-fixes).\n- usb: gadget: f_hid: Fix zero length packet transfer (stable-fixes).\n- usb: gadget: f_ncm: Fix MAC assignment NCM ethernet (stable-fixes).\n- usb: mon: Increase BUFF_MAX to 64 MiB to support multi-MB URBs (stable-fixes).\n- usb: xhci: plat: Facilitate using autosuspend for xhci plat devices (stable-fixes).\n- video: backlight: lp855x_bl: Set correct EPROM start for LP8556 (stable-fixes).\n- watchdog: s3c2410_wdt: Fix max_timeout being calculated larger (stable-fixes).\n- wifi: ath10k: Fix connection after GTK rekeying (stable-fixes).\n- wifi: ath11k: Add quirk entries for Thinkpad T14s Gen3 AMD (bsc#1254181).\n- wifi: ath11k: zero init info-\u003estatus in wmi_process_mgmt_tx_comp() (git-fixes).\n- wifi: ath12k: Increase DP_REO_CMD_RING_SIZE to 256 (stable-fixes).\n- wifi: iwlwifi: fw: Add ASUS to PPAG and TAS list (stable-fixes).\n- wifi: mac80211: Fix 6 GHz Band capabilities element advertisement in lower bands (stable-fixes).\n- wifi: mac80211: Fix HE capabilities element check (stable-fixes).\n- wifi: mac80211: Track NAN interface start/stop (stable-fixes).\n- wifi: mac80211: don\u0027t mark keys for inactive links as uploaded (stable-fixes).\n- wifi: mac80211: fix key tailroom accounting leak (git-fixes).\n- wifi: mac80211: reject address change while connecting (git-fixes).\n- wifi: mac80211: skip rate verification for not captured PSDUs (git-fixes).\n- wifi: mac80211_hwsim: Limit destroy_on_close radio removal to netgroup (git-fixes).\n- wifi: mt76: mt7921: Add 160MHz beamformee capability for mt7922 device (stable-fixes).\n- wifi: mt76: mt7996: Temporarily disable EPCS (stable-fixes).\n- wifi: mt76: mt7996: fix memory leak on mt7996_mcu_sta_key_tlv error (stable-fixes).\n- wifi: mwl8k: inject DSSS Parameter Set element into beacons if missing (git-fixes).\n- wifi: rtw88: sdio: use indirect IO for device registers before power-on (stable-fixes).\n- wifi: rtw89: print just once for unknown C2H events (stable-fixes).\n- wifi: zd1211rw: fix potential memory leak in __zd_usb_enable_rx() (git-fixes).\n- x86/CPU/AMD: Add RDSEED fix for Zen5 (git-fixes).\n- x86/CPU/AMD: Add additional fixed RDSEED microcode revisions (git-fixes).\n- x86/CPU/AMD: Add missing terminator for zen5_rdseed_microcode (git-fixes).\n- x86/CPU/AMD: Do the common init on future Zens too (git-fixes).\n- x86/amd_nb: Add new PCI IDs for AMD family 0x1a (stable-fixes).\n- x86/bugs: Fix reporting of LFENCE retpoline (git-fixes).\n- x86/bugs: Report correct retbleed mitigation status (git-fixes).\n- x86/vmscape: Add old Intel CPUs to affected list (git-fixes).\n- xe/oa: Fix query mode of operation for OAR/OAC (git-fixes).\n- xhci: dbc: Allow users to modify DbC poll interval via sysfs (stable-fixes).\n- xhci: dbc: Avoid event polling busyloop if pending rx transfers are inactive (git-fixes).\n- xhci: dbc: Improve performance by removing delay in transfer event polling (stable-fixes).\n- xhci: dbc: fix bogus 1024 byte prefix if ttyDBC read races with stall event (git-fixes).\n- xhci: dbc: poll at different rate depending on data transfer activity (stable-fixes).\n",
"title": "Description of the patch"
},
{
"category": "details",
"text": "SUSE-2025-4393,SUSE-SLE-Module-Basesystem-15-SP7-2025-4393,SUSE-SLE-Module-Development-Tools-15-SP7-2025-4393,SUSE-SLE-Module-Legacy-15-SP7-2025-4393,SUSE-SLE-Module-Live-Patching-15-SP7-2025-4393,SUSE-SLE-Product-HA-15-SP7-2025-4393,SUSE-SLE-Product-WE-15-SP7-2025-4393",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2025_4393-1.json"
},
{
"category": "self",
"summary": "URL for SUSE-SU-2025:4393-1",
"url": "https://www.suse.com/support/update/announcement/2025/suse-su-20254393-1/"
},
{
"category": "self",
"summary": "E-Mail link for SUSE-SU-2025:4393-1",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-December/023538.html"
},
{
"category": "self",
"summary": "SUSE Bug 1235463",
"url": "https://bugzilla.suse.com/1235463"
},
{
"category": "self",
"summary": "SUSE Bug 1236743",
"url": "https://bugzilla.suse.com/1236743"
},
{
"category": "self",
"summary": "SUSE Bug 1237888",
"url": "https://bugzilla.suse.com/1237888"
},
{
"category": "self",
"summary": "SUSE Bug 1241166",
"url": "https://bugzilla.suse.com/1241166"
},
{
"category": "self",
"summary": "SUSE Bug 1243474",
"url": "https://bugzilla.suse.com/1243474"
},
{
"category": "self",
"summary": "SUSE Bug 1245193",
"url": "https://bugzilla.suse.com/1245193"
},
{
"category": "self",
"summary": "SUSE Bug 1247076",
"url": "https://bugzilla.suse.com/1247076"
},
{
"category": "self",
"summary": "SUSE Bug 1247500",
"url": "https://bugzilla.suse.com/1247500"
},
{
"category": "self",
"summary": "SUSE Bug 1247509",
"url": "https://bugzilla.suse.com/1247509"
},
{
"category": "self",
"summary": "SUSE Bug 1247683",
"url": "https://bugzilla.suse.com/1247683"
},
{
"category": "self",
"summary": "SUSE Bug 1249547",
"url": "https://bugzilla.suse.com/1249547"
},
{
"category": "self",
"summary": "SUSE Bug 1249912",
"url": "https://bugzilla.suse.com/1249912"
},
{
"category": "self",
"summary": "SUSE Bug 1249982",
"url": "https://bugzilla.suse.com/1249982"
},
{
"category": "self",
"summary": "SUSE Bug 1250034",
"url": "https://bugzilla.suse.com/1250034"
},
{
"category": "self",
"summary": "SUSE Bug 1250176",
"url": "https://bugzilla.suse.com/1250176"
},
{
"category": "self",
"summary": "SUSE Bug 1250237",
"url": "https://bugzilla.suse.com/1250237"
},
{
"category": "self",
"summary": "SUSE Bug 1250252",
"url": "https://bugzilla.suse.com/1250252"
},
{
"category": "self",
"summary": "SUSE Bug 1250705",
"url": "https://bugzilla.suse.com/1250705"
},
{
"category": "self",
"summary": "SUSE Bug 1251120",
"url": "https://bugzilla.suse.com/1251120"
},
{
"category": "self",
"summary": "SUSE Bug 1251786",
"url": "https://bugzilla.suse.com/1251786"
},
{
"category": "self",
"summary": "SUSE Bug 1252063",
"url": "https://bugzilla.suse.com/1252063"
},
{
"category": "self",
"summary": "SUSE Bug 1252267",
"url": "https://bugzilla.suse.com/1252267"
},
{
"category": "self",
"summary": "SUSE Bug 1252269",
"url": "https://bugzilla.suse.com/1252269"
},
{
"category": "self",
"summary": "SUSE Bug 1252303",
"url": "https://bugzilla.suse.com/1252303"
},
{
"category": "self",
"summary": "SUSE Bug 1252352",
"url": "https://bugzilla.suse.com/1252352"
},
{
"category": "self",
"summary": "SUSE Bug 1252353",
"url": "https://bugzilla.suse.com/1252353"
},
{
"category": "self",
"summary": "SUSE Bug 1252365",
"url": "https://bugzilla.suse.com/1252365"
},
{
"category": "self",
"summary": "SUSE Bug 1252366",
"url": "https://bugzilla.suse.com/1252366"
},
{
"category": "self",
"summary": "SUSE Bug 1252368",
"url": "https://bugzilla.suse.com/1252368"
},
{
"category": "self",
"summary": "SUSE Bug 1252370",
"url": "https://bugzilla.suse.com/1252370"
},
{
"category": "self",
"summary": "SUSE Bug 1252681",
"url": "https://bugzilla.suse.com/1252681"
},
{
"category": "self",
"summary": "SUSE Bug 1252763",
"url": "https://bugzilla.suse.com/1252763"
},
{
"category": "self",
"summary": "SUSE Bug 1252773",
"url": "https://bugzilla.suse.com/1252773"
},
{
"category": "self",
"summary": "SUSE Bug 1252774",
"url": "https://bugzilla.suse.com/1252774"
},
{
"category": "self",
"summary": "SUSE Bug 1252780",
"url": "https://bugzilla.suse.com/1252780"
},
{
"category": "self",
"summary": "SUSE Bug 1252790",
"url": "https://bugzilla.suse.com/1252790"
},
{
"category": "self",
"summary": "SUSE Bug 1252794",
"url": "https://bugzilla.suse.com/1252794"
},
{
"category": "self",
"summary": "SUSE Bug 1252795",
"url": "https://bugzilla.suse.com/1252795"
},
{
"category": "self",
"summary": "SUSE Bug 1252809",
"url": "https://bugzilla.suse.com/1252809"
},
{
"category": "self",
"summary": "SUSE Bug 1252817",
"url": "https://bugzilla.suse.com/1252817"
},
{
"category": "self",
"summary": "SUSE Bug 1252821",
"url": "https://bugzilla.suse.com/1252821"
},
{
"category": "self",
"summary": "SUSE Bug 1252836",
"url": "https://bugzilla.suse.com/1252836"
},
{
"category": "self",
"summary": "SUSE Bug 1252845",
"url": "https://bugzilla.suse.com/1252845"
},
{
"category": "self",
"summary": "SUSE Bug 1252862",
"url": "https://bugzilla.suse.com/1252862"
},
{
"category": "self",
"summary": "SUSE Bug 1252912",
"url": "https://bugzilla.suse.com/1252912"
},
{
"category": "self",
"summary": "SUSE Bug 1252917",
"url": "https://bugzilla.suse.com/1252917"
},
{
"category": "self",
"summary": "SUSE Bug 1252923",
"url": "https://bugzilla.suse.com/1252923"
},
{
"category": "self",
"summary": "SUSE Bug 1252928",
"url": "https://bugzilla.suse.com/1252928"
},
{
"category": "self",
"summary": "SUSE Bug 1253018",
"url": "https://bugzilla.suse.com/1253018"
},
{
"category": "self",
"summary": "SUSE Bug 1253176",
"url": "https://bugzilla.suse.com/1253176"
},
{
"category": "self",
"summary": "SUSE Bug 1253275",
"url": "https://bugzilla.suse.com/1253275"
},
{
"category": "self",
"summary": "SUSE Bug 1253318",
"url": "https://bugzilla.suse.com/1253318"
},
{
"category": "self",
"summary": "SUSE Bug 1253324",
"url": "https://bugzilla.suse.com/1253324"
},
{
"category": "self",
"summary": "SUSE Bug 1253349",
"url": "https://bugzilla.suse.com/1253349"
},
{
"category": "self",
"summary": "SUSE Bug 1253352",
"url": "https://bugzilla.suse.com/1253352"
},
{
"category": "self",
"summary": "SUSE Bug 1253355",
"url": "https://bugzilla.suse.com/1253355"
},
{
"category": "self",
"summary": "SUSE Bug 1253360",
"url": "https://bugzilla.suse.com/1253360"
},
{
"category": "self",
"summary": "SUSE Bug 1253362",
"url": "https://bugzilla.suse.com/1253362"
},
{
"category": "self",
"summary": "SUSE Bug 1253363",
"url": "https://bugzilla.suse.com/1253363"
},
{
"category": "self",
"summary": "SUSE Bug 1253367",
"url": "https://bugzilla.suse.com/1253367"
},
{
"category": "self",
"summary": "SUSE Bug 1253369",
"url": "https://bugzilla.suse.com/1253369"
},
{
"category": "self",
"summary": "SUSE Bug 1253393",
"url": "https://bugzilla.suse.com/1253393"
},
{
"category": "self",
"summary": "SUSE Bug 1253394",
"url": "https://bugzilla.suse.com/1253394"
},
{
"category": "self",
"summary": "SUSE Bug 1253395",
"url": "https://bugzilla.suse.com/1253395"
},
{
"category": "self",
"summary": "SUSE Bug 1253403",
"url": "https://bugzilla.suse.com/1253403"
},
{
"category": "self",
"summary": "SUSE Bug 1253407",
"url": "https://bugzilla.suse.com/1253407"
},
{
"category": "self",
"summary": "SUSE Bug 1253409",
"url": "https://bugzilla.suse.com/1253409"
},
{
"category": "self",
"summary": "SUSE Bug 1253412",
"url": "https://bugzilla.suse.com/1253412"
},
{
"category": "self",
"summary": "SUSE Bug 1253416",
"url": "https://bugzilla.suse.com/1253416"
},
{
"category": "self",
"summary": "SUSE Bug 1253421",
"url": "https://bugzilla.suse.com/1253421"
},
{
"category": "self",
"summary": "SUSE Bug 1253423",
"url": "https://bugzilla.suse.com/1253423"
},
{
"category": "self",
"summary": "SUSE Bug 1253424",
"url": "https://bugzilla.suse.com/1253424"
},
{
"category": "self",
"summary": "SUSE Bug 1253425",
"url": "https://bugzilla.suse.com/1253425"
},
{
"category": "self",
"summary": "SUSE Bug 1253427",
"url": "https://bugzilla.suse.com/1253427"
},
{
"category": "self",
"summary": "SUSE Bug 1253428",
"url": "https://bugzilla.suse.com/1253428"
},
{
"category": "self",
"summary": "SUSE Bug 1253431",
"url": "https://bugzilla.suse.com/1253431"
},
{
"category": "self",
"summary": "SUSE Bug 1253436",
"url": "https://bugzilla.suse.com/1253436"
},
{
"category": "self",
"summary": "SUSE Bug 1253438",
"url": "https://bugzilla.suse.com/1253438"
},
{
"category": "self",
"summary": "SUSE Bug 1253440",
"url": "https://bugzilla.suse.com/1253440"
},
{
"category": "self",
"summary": "SUSE Bug 1253441",
"url": "https://bugzilla.suse.com/1253441"
},
{
"category": "self",
"summary": "SUSE Bug 1253445",
"url": "https://bugzilla.suse.com/1253445"
},
{
"category": "self",
"summary": "SUSE Bug 1253448",
"url": "https://bugzilla.suse.com/1253448"
},
{
"category": "self",
"summary": "SUSE Bug 1253449",
"url": "https://bugzilla.suse.com/1253449"
},
{
"category": "self",
"summary": "SUSE Bug 1253453",
"url": "https://bugzilla.suse.com/1253453"
},
{
"category": "self",
"summary": "SUSE Bug 1253456",
"url": "https://bugzilla.suse.com/1253456"
},
{
"category": "self",
"summary": "SUSE Bug 1253472",
"url": "https://bugzilla.suse.com/1253472"
},
{
"category": "self",
"summary": "SUSE Bug 1253648",
"url": "https://bugzilla.suse.com/1253648"
},
{
"category": "self",
"summary": "SUSE Bug 1253779",
"url": "https://bugzilla.suse.com/1253779"
},
{
"category": "self",
"summary": "SUSE Bug 1254181",
"url": "https://bugzilla.suse.com/1254181"
},
{
"category": "self",
"summary": "SUSE Bug 1254221",
"url": "https://bugzilla.suse.com/1254221"
},
{
"category": "self",
"summary": "SUSE Bug 1254235",
"url": "https://bugzilla.suse.com/1254235"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-50253 page",
"url": "https://www.suse.com/security/cve/CVE-2022-50253/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2023-53676 page",
"url": "https://www.suse.com/security/cve/CVE-2023-53676/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-21710 page",
"url": "https://www.suse.com/security/cve/CVE-2025-21710/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-37916 page",
"url": "https://www.suse.com/security/cve/CVE-2025-37916/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-38359 page",
"url": "https://www.suse.com/security/cve/CVE-2025-38359/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-39788 page",
"url": "https://www.suse.com/security/cve/CVE-2025-39788/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-39805 page",
"url": "https://www.suse.com/security/cve/CVE-2025-39805/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-39819 page",
"url": "https://www.suse.com/security/cve/CVE-2025-39819/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-39822 page",
"url": "https://www.suse.com/security/cve/CVE-2025-39822/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-39859 page",
"url": "https://www.suse.com/security/cve/CVE-2025-39859/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-39944 page",
"url": "https://www.suse.com/security/cve/CVE-2025-39944/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-39980 page",
"url": "https://www.suse.com/security/cve/CVE-2025-39980/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40001 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40001/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40021 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40021/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40027 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40027/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40030 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40030/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40038 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40038/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40040 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40040/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40047 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40047/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40048 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40048/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40055 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40055/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40059 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40059/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40064 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40064/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40070 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40070/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40074 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40074/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40075 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40075/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40080 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40080/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40083 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40083/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40086 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40086/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40098 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40098/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40105 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40105/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40107 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40107/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40109 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40109/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40110 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40110/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40111 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40111/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40115 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40115/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40116 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40116/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40118 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40118/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40120 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40120/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40121 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40121/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40127 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40127/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40129 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40129/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40139 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40139/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40140 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40140/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40141 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40141/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40149 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40149/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40154 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40154/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40156 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40156/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40157 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40157/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40159 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40159/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40164 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40164/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40168 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40168/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40169 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40169/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40171 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40171/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40172 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40172/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40173 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40173/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40176 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40176/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40180 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40180/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40183 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40183/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40185 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40185/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40186 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40186/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40188 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40188/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40194 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40194/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40198 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40198/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40200 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40200/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40204 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40204/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40205 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40205/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40206 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40206/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40207 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40207/"
}
],
"title": "Security update for the Linux Kernel",
"tracking": {
"current_release_date": "2025-12-15T11:09:08Z",
"generator": {
"date": "2025-12-15T11:09:08Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "SUSE-SU-2025:4393-1",
"initial_release_date": "2025-12-15T11:09:08Z",
"revision_history": [
{
"date": "2025-12-15T11:09:08Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "cluster-md-kmp-64kb-6.4.0-150700.53.25.1.aarch64",
"product": {
"name": "cluster-md-kmp-64kb-6.4.0-150700.53.25.1.aarch64",
"product_id": "cluster-md-kmp-64kb-6.4.0-150700.53.25.1.aarch64"
}
},
{
"category": "product_version",
"name": "cluster-md-kmp-default-6.4.0-150700.53.25.1.aarch64",
"product": {
"name": "cluster-md-kmp-default-6.4.0-150700.53.25.1.aarch64",
"product_id": "cluster-md-kmp-default-6.4.0-150700.53.25.1.aarch64"
}
},
{
"category": "product_version",
"name": "dlm-kmp-64kb-6.4.0-150700.53.25.1.aarch64",
"product": {
"name": "dlm-kmp-64kb-6.4.0-150700.53.25.1.aarch64",
"product_id": "dlm-kmp-64kb-6.4.0-150700.53.25.1.aarch64"
}
},
{
"category": "product_version",
"name": "dlm-kmp-default-6.4.0-150700.53.25.1.aarch64",
"product": {
"name": "dlm-kmp-default-6.4.0-150700.53.25.1.aarch64",
"product_id": "dlm-kmp-default-6.4.0-150700.53.25.1.aarch64"
}
},
{
"category": "product_version",
"name": "dtb-allwinner-6.4.0-150700.53.25.1.aarch64",
"product": {
"name": "dtb-allwinner-6.4.0-150700.53.25.1.aarch64",
"product_id": "dtb-allwinner-6.4.0-150700.53.25.1.aarch64"
}
},
{
"category": "product_version",
"name": "dtb-altera-6.4.0-150700.53.25.1.aarch64",
"product": {
"name": "dtb-altera-6.4.0-150700.53.25.1.aarch64",
"product_id": "dtb-altera-6.4.0-150700.53.25.1.aarch64"
}
},
{
"category": "product_version",
"name": "dtb-amazon-6.4.0-150700.53.25.1.aarch64",
"product": {
"name": "dtb-amazon-6.4.0-150700.53.25.1.aarch64",
"product_id": "dtb-amazon-6.4.0-150700.53.25.1.aarch64"
}
},
{
"category": "product_version",
"name": "dtb-amd-6.4.0-150700.53.25.1.aarch64",
"product": {
"name": "dtb-amd-6.4.0-150700.53.25.1.aarch64",
"product_id": "dtb-amd-6.4.0-150700.53.25.1.aarch64"
}
},
{
"category": "product_version",
"name": "dtb-amlogic-6.4.0-150700.53.25.1.aarch64",
"product": {
"name": "dtb-amlogic-6.4.0-150700.53.25.1.aarch64",
"product_id": "dtb-amlogic-6.4.0-150700.53.25.1.aarch64"
}
},
{
"category": "product_version",
"name": "dtb-apm-6.4.0-150700.53.25.1.aarch64",
"product": {
"name": "dtb-apm-6.4.0-150700.53.25.1.aarch64",
"product_id": "dtb-apm-6.4.0-150700.53.25.1.aarch64"
}
},
{
"category": "product_version",
"name": "dtb-apple-6.4.0-150700.53.25.1.aarch64",
"product": {
"name": "dtb-apple-6.4.0-150700.53.25.1.aarch64",
"product_id": "dtb-apple-6.4.0-150700.53.25.1.aarch64"
}
},
{
"category": "product_version",
"name": "dtb-arm-6.4.0-150700.53.25.1.aarch64",
"product": {
"name": "dtb-arm-6.4.0-150700.53.25.1.aarch64",
"product_id": "dtb-arm-6.4.0-150700.53.25.1.aarch64"
}
},
{
"category": "product_version",
"name": "dtb-broadcom-6.4.0-150700.53.25.1.aarch64",
"product": {
"name": "dtb-broadcom-6.4.0-150700.53.25.1.aarch64",
"product_id": "dtb-broadcom-6.4.0-150700.53.25.1.aarch64"
}
},
{
"category": "product_version",
"name": "dtb-cavium-6.4.0-150700.53.25.1.aarch64",
"product": {
"name": "dtb-cavium-6.4.0-150700.53.25.1.aarch64",
"product_id": "dtb-cavium-6.4.0-150700.53.25.1.aarch64"
}
},
{
"category": "product_version",
"name": "dtb-exynos-6.4.0-150700.53.25.1.aarch64",
"product": {
"name": "dtb-exynos-6.4.0-150700.53.25.1.aarch64",
"product_id": "dtb-exynos-6.4.0-150700.53.25.1.aarch64"
}
},
{
"category": "product_version",
"name": "dtb-freescale-6.4.0-150700.53.25.1.aarch64",
"product": {
"name": "dtb-freescale-6.4.0-150700.53.25.1.aarch64",
"product_id": "dtb-freescale-6.4.0-150700.53.25.1.aarch64"
}
},
{
"category": "product_version",
"name": "dtb-hisilicon-6.4.0-150700.53.25.1.aarch64",
"product": {
"name": "dtb-hisilicon-6.4.0-150700.53.25.1.aarch64",
"product_id": "dtb-hisilicon-6.4.0-150700.53.25.1.aarch64"
}
},
{
"category": "product_version",
"name": "dtb-lg-6.4.0-150700.53.25.1.aarch64",
"product": {
"name": "dtb-lg-6.4.0-150700.53.25.1.aarch64",
"product_id": "dtb-lg-6.4.0-150700.53.25.1.aarch64"
}
},
{
"category": "product_version",
"name": "dtb-marvell-6.4.0-150700.53.25.1.aarch64",
"product": {
"name": "dtb-marvell-6.4.0-150700.53.25.1.aarch64",
"product_id": "dtb-marvell-6.4.0-150700.53.25.1.aarch64"
}
},
{
"category": "product_version",
"name": "dtb-mediatek-6.4.0-150700.53.25.1.aarch64",
"product": {
"name": "dtb-mediatek-6.4.0-150700.53.25.1.aarch64",
"product_id": "dtb-mediatek-6.4.0-150700.53.25.1.aarch64"
}
},
{
"category": "product_version",
"name": "dtb-nvidia-6.4.0-150700.53.25.1.aarch64",
"product": {
"name": "dtb-nvidia-6.4.0-150700.53.25.1.aarch64",
"product_id": "dtb-nvidia-6.4.0-150700.53.25.1.aarch64"
}
},
{
"category": "product_version",
"name": "dtb-qcom-6.4.0-150700.53.25.1.aarch64",
"product": {
"name": "dtb-qcom-6.4.0-150700.53.25.1.aarch64",
"product_id": "dtb-qcom-6.4.0-150700.53.25.1.aarch64"
}
},
{
"category": "product_version",
"name": "dtb-renesas-6.4.0-150700.53.25.1.aarch64",
"product": {
"name": "dtb-renesas-6.4.0-150700.53.25.1.aarch64",
"product_id": "dtb-renesas-6.4.0-150700.53.25.1.aarch64"
}
},
{
"category": "product_version",
"name": "dtb-rockchip-6.4.0-150700.53.25.1.aarch64",
"product": {
"name": "dtb-rockchip-6.4.0-150700.53.25.1.aarch64",
"product_id": "dtb-rockchip-6.4.0-150700.53.25.1.aarch64"
}
},
{
"category": "product_version",
"name": "dtb-socionext-6.4.0-150700.53.25.1.aarch64",
"product": {
"name": "dtb-socionext-6.4.0-150700.53.25.1.aarch64",
"product_id": "dtb-socionext-6.4.0-150700.53.25.1.aarch64"
}
},
{
"category": "product_version",
"name": "dtb-sprd-6.4.0-150700.53.25.1.aarch64",
"product": {
"name": "dtb-sprd-6.4.0-150700.53.25.1.aarch64",
"product_id": "dtb-sprd-6.4.0-150700.53.25.1.aarch64"
}
},
{
"category": "product_version",
"name": "dtb-xilinx-6.4.0-150700.53.25.1.aarch64",
"product": {
"name": "dtb-xilinx-6.4.0-150700.53.25.1.aarch64",
"product_id": "dtb-xilinx-6.4.0-150700.53.25.1.aarch64"
}
},
{
"category": "product_version",
"name": "gfs2-kmp-64kb-6.4.0-150700.53.25.1.aarch64",
"product": {
"name": "gfs2-kmp-64kb-6.4.0-150700.53.25.1.aarch64",
"product_id": "gfs2-kmp-64kb-6.4.0-150700.53.25.1.aarch64"
}
},
{
"category": "product_version",
"name": "gfs2-kmp-default-6.4.0-150700.53.25.1.aarch64",
"product": {
"name": "gfs2-kmp-default-6.4.0-150700.53.25.1.aarch64",
"product_id": "gfs2-kmp-default-6.4.0-150700.53.25.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-64kb-6.4.0-150700.53.25.1.aarch64",
"product": {
"name": "kernel-64kb-6.4.0-150700.53.25.1.aarch64",
"product_id": "kernel-64kb-6.4.0-150700.53.25.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-64kb-devel-6.4.0-150700.53.25.1.aarch64",
"product": {
"name": "kernel-64kb-devel-6.4.0-150700.53.25.1.aarch64",
"product_id": "kernel-64kb-devel-6.4.0-150700.53.25.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-64kb-extra-6.4.0-150700.53.25.1.aarch64",
"product": {
"name": "kernel-64kb-extra-6.4.0-150700.53.25.1.aarch64",
"product_id": "kernel-64kb-extra-6.4.0-150700.53.25.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-64kb-optional-6.4.0-150700.53.25.1.aarch64",
"product": {
"name": "kernel-64kb-optional-6.4.0-150700.53.25.1.aarch64",
"product_id": "kernel-64kb-optional-6.4.0-150700.53.25.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-default-6.4.0-150700.53.25.1.aarch64",
"product": {
"name": "kernel-default-6.4.0-150700.53.25.1.aarch64",
"product_id": "kernel-default-6.4.0-150700.53.25.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-default-base-6.4.0-150700.53.25.1.150700.17.17.1.aarch64",
"product": {
"name": "kernel-default-base-6.4.0-150700.53.25.1.150700.17.17.1.aarch64",
"product_id": "kernel-default-base-6.4.0-150700.53.25.1.150700.17.17.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-default-base-rebuild-6.4.0-150700.53.25.1.150700.17.17.1.aarch64",
"product": {
"name": "kernel-default-base-rebuild-6.4.0-150700.53.25.1.150700.17.17.1.aarch64",
"product_id": "kernel-default-base-rebuild-6.4.0-150700.53.25.1.150700.17.17.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-default-devel-6.4.0-150700.53.25.1.aarch64",
"product": {
"name": "kernel-default-devel-6.4.0-150700.53.25.1.aarch64",
"product_id": "kernel-default-devel-6.4.0-150700.53.25.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-default-extra-6.4.0-150700.53.25.1.aarch64",
"product": {
"name": "kernel-default-extra-6.4.0-150700.53.25.1.aarch64",
"product_id": "kernel-default-extra-6.4.0-150700.53.25.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-default-livepatch-6.4.0-150700.53.25.1.aarch64",
"product": {
"name": "kernel-default-livepatch-6.4.0-150700.53.25.1.aarch64",
"product_id": "kernel-default-livepatch-6.4.0-150700.53.25.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-default-optional-6.4.0-150700.53.25.1.aarch64",
"product": {
"name": "kernel-default-optional-6.4.0-150700.53.25.1.aarch64",
"product_id": "kernel-default-optional-6.4.0-150700.53.25.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-kvmsmall-6.4.0-150700.53.25.1.aarch64",
"product": {
"name": "kernel-kvmsmall-6.4.0-150700.53.25.1.aarch64",
"product_id": "kernel-kvmsmall-6.4.0-150700.53.25.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-kvmsmall-devel-6.4.0-150700.53.25.1.aarch64",
"product": {
"name": "kernel-kvmsmall-devel-6.4.0-150700.53.25.1.aarch64",
"product_id": "kernel-kvmsmall-devel-6.4.0-150700.53.25.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-obs-build-6.4.0-150700.53.25.1.aarch64",
"product": {
"name": "kernel-obs-build-6.4.0-150700.53.25.1.aarch64",
"product_id": "kernel-obs-build-6.4.0-150700.53.25.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-obs-qa-6.4.0-150700.53.25.1.aarch64",
"product": {
"name": "kernel-obs-qa-6.4.0-150700.53.25.1.aarch64",
"product_id": "kernel-obs-qa-6.4.0-150700.53.25.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-syms-6.4.0-150700.53.25.1.aarch64",
"product": {
"name": "kernel-syms-6.4.0-150700.53.25.1.aarch64",
"product_id": "kernel-syms-6.4.0-150700.53.25.1.aarch64"
}
},
{
"category": "product_version",
"name": "kselftests-kmp-64kb-6.4.0-150700.53.25.1.aarch64",
"product": {
"name": "kselftests-kmp-64kb-6.4.0-150700.53.25.1.aarch64",
"product_id": "kselftests-kmp-64kb-6.4.0-150700.53.25.1.aarch64"
}
},
{
"category": "product_version",
"name": "kselftests-kmp-default-6.4.0-150700.53.25.1.aarch64",
"product": {
"name": "kselftests-kmp-default-6.4.0-150700.53.25.1.aarch64",
"product_id": "kselftests-kmp-default-6.4.0-150700.53.25.1.aarch64"
}
},
{
"category": "product_version",
"name": "ocfs2-kmp-64kb-6.4.0-150700.53.25.1.aarch64",
"product": {
"name": "ocfs2-kmp-64kb-6.4.0-150700.53.25.1.aarch64",
"product_id": "ocfs2-kmp-64kb-6.4.0-150700.53.25.1.aarch64"
}
},
{
"category": "product_version",
"name": "ocfs2-kmp-default-6.4.0-150700.53.25.1.aarch64",
"product": {
"name": "ocfs2-kmp-default-6.4.0-150700.53.25.1.aarch64",
"product_id": "ocfs2-kmp-default-6.4.0-150700.53.25.1.aarch64"
}
},
{
"category": "product_version",
"name": "reiserfs-kmp-64kb-6.4.0-150700.53.25.1.aarch64",
"product": {
"name": "reiserfs-kmp-64kb-6.4.0-150700.53.25.1.aarch64",
"product_id": "reiserfs-kmp-64kb-6.4.0-150700.53.25.1.aarch64"
}
},
{
"category": "product_version",
"name": "reiserfs-kmp-default-6.4.0-150700.53.25.1.aarch64",
"product": {
"name": "reiserfs-kmp-default-6.4.0-150700.53.25.1.aarch64",
"product_id": "reiserfs-kmp-default-6.4.0-150700.53.25.1.aarch64"
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-devel-6.4.0-150700.53.25.1.noarch",
"product": {
"name": "kernel-devel-6.4.0-150700.53.25.1.noarch",
"product_id": "kernel-devel-6.4.0-150700.53.25.1.noarch"
}
},
{
"category": "product_version",
"name": "kernel-docs-6.4.0-150700.53.25.2.noarch",
"product": {
"name": "kernel-docs-6.4.0-150700.53.25.2.noarch",
"product_id": "kernel-docs-6.4.0-150700.53.25.2.noarch"
}
},
{
"category": "product_version",
"name": "kernel-docs-html-6.4.0-150700.53.25.2.noarch",
"product": {
"name": "kernel-docs-html-6.4.0-150700.53.25.2.noarch",
"product_id": "kernel-docs-html-6.4.0-150700.53.25.2.noarch"
}
},
{
"category": "product_version",
"name": "kernel-macros-6.4.0-150700.53.25.1.noarch",
"product": {
"name": "kernel-macros-6.4.0-150700.53.25.1.noarch",
"product_id": "kernel-macros-6.4.0-150700.53.25.1.noarch"
}
},
{
"category": "product_version",
"name": "kernel-source-6.4.0-150700.53.25.1.noarch",
"product": {
"name": "kernel-source-6.4.0-150700.53.25.1.noarch",
"product_id": "kernel-source-6.4.0-150700.53.25.1.noarch"
}
},
{
"category": "product_version",
"name": "kernel-source-vanilla-6.4.0-150700.53.25.1.noarch",
"product": {
"name": "kernel-source-vanilla-6.4.0-150700.53.25.1.noarch",
"product_id": "kernel-source-vanilla-6.4.0-150700.53.25.1.noarch"
}
}
],
"category": "architecture",
"name": "noarch"
},
{
"branches": [
{
"category": "product_version",
"name": "cluster-md-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"product": {
"name": "cluster-md-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"product_id": "cluster-md-kmp-default-6.4.0-150700.53.25.1.ppc64le"
}
},
{
"category": "product_version",
"name": "dlm-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"product": {
"name": "dlm-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"product_id": "dlm-kmp-default-6.4.0-150700.53.25.1.ppc64le"
}
},
{
"category": "product_version",
"name": "gfs2-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"product": {
"name": "gfs2-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"product_id": "gfs2-kmp-default-6.4.0-150700.53.25.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-default-6.4.0-150700.53.25.1.ppc64le",
"product": {
"name": "kernel-default-6.4.0-150700.53.25.1.ppc64le",
"product_id": "kernel-default-6.4.0-150700.53.25.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-default-base-6.4.0-150700.53.25.1.150700.17.17.1.ppc64le",
"product": {
"name": "kernel-default-base-6.4.0-150700.53.25.1.150700.17.17.1.ppc64le",
"product_id": "kernel-default-base-6.4.0-150700.53.25.1.150700.17.17.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-default-base-rebuild-6.4.0-150700.53.25.1.150700.17.17.1.ppc64le",
"product": {
"name": "kernel-default-base-rebuild-6.4.0-150700.53.25.1.150700.17.17.1.ppc64le",
"product_id": "kernel-default-base-rebuild-6.4.0-150700.53.25.1.150700.17.17.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-default-devel-6.4.0-150700.53.25.1.ppc64le",
"product": {
"name": "kernel-default-devel-6.4.0-150700.53.25.1.ppc64le",
"product_id": "kernel-default-devel-6.4.0-150700.53.25.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-default-extra-6.4.0-150700.53.25.1.ppc64le",
"product": {
"name": "kernel-default-extra-6.4.0-150700.53.25.1.ppc64le",
"product_id": "kernel-default-extra-6.4.0-150700.53.25.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-default-livepatch-6.4.0-150700.53.25.1.ppc64le",
"product": {
"name": "kernel-default-livepatch-6.4.0-150700.53.25.1.ppc64le",
"product_id": "kernel-default-livepatch-6.4.0-150700.53.25.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-default-livepatch-devel-6.4.0-150700.53.25.1.ppc64le",
"product": {
"name": "kernel-default-livepatch-devel-6.4.0-150700.53.25.1.ppc64le",
"product_id": "kernel-default-livepatch-devel-6.4.0-150700.53.25.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-default-optional-6.4.0-150700.53.25.1.ppc64le",
"product": {
"name": "kernel-default-optional-6.4.0-150700.53.25.1.ppc64le",
"product_id": "kernel-default-optional-6.4.0-150700.53.25.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-kvmsmall-6.4.0-150700.53.25.1.ppc64le",
"product": {
"name": "kernel-kvmsmall-6.4.0-150700.53.25.1.ppc64le",
"product_id": "kernel-kvmsmall-6.4.0-150700.53.25.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-kvmsmall-devel-6.4.0-150700.53.25.1.ppc64le",
"product": {
"name": "kernel-kvmsmall-devel-6.4.0-150700.53.25.1.ppc64le",
"product_id": "kernel-kvmsmall-devel-6.4.0-150700.53.25.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-livepatch-6_4_0-150700_53_25-default-1-150700.15.3.1.ppc64le",
"product": {
"name": "kernel-livepatch-6_4_0-150700_53_25-default-1-150700.15.3.1.ppc64le",
"product_id": "kernel-livepatch-6_4_0-150700_53_25-default-1-150700.15.3.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-obs-build-6.4.0-150700.53.25.1.ppc64le",
"product": {
"name": "kernel-obs-build-6.4.0-150700.53.25.1.ppc64le",
"product_id": "kernel-obs-build-6.4.0-150700.53.25.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-obs-qa-6.4.0-150700.53.25.1.ppc64le",
"product": {
"name": "kernel-obs-qa-6.4.0-150700.53.25.1.ppc64le",
"product_id": "kernel-obs-qa-6.4.0-150700.53.25.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-syms-6.4.0-150700.53.25.1.ppc64le",
"product": {
"name": "kernel-syms-6.4.0-150700.53.25.1.ppc64le",
"product_id": "kernel-syms-6.4.0-150700.53.25.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kselftests-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"product": {
"name": "kselftests-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"product_id": "kselftests-kmp-default-6.4.0-150700.53.25.1.ppc64le"
}
},
{
"category": "product_version",
"name": "ocfs2-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"product": {
"name": "ocfs2-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"product_id": "ocfs2-kmp-default-6.4.0-150700.53.25.1.ppc64le"
}
},
{
"category": "product_version",
"name": "reiserfs-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"product": {
"name": "reiserfs-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"product_id": "reiserfs-kmp-default-6.4.0-150700.53.25.1.ppc64le"
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "cluster-md-kmp-default-6.4.0-150700.53.25.1.s390x",
"product": {
"name": "cluster-md-kmp-default-6.4.0-150700.53.25.1.s390x",
"product_id": "cluster-md-kmp-default-6.4.0-150700.53.25.1.s390x"
}
},
{
"category": "product_version",
"name": "dlm-kmp-default-6.4.0-150700.53.25.1.s390x",
"product": {
"name": "dlm-kmp-default-6.4.0-150700.53.25.1.s390x",
"product_id": "dlm-kmp-default-6.4.0-150700.53.25.1.s390x"
}
},
{
"category": "product_version",
"name": "gfs2-kmp-default-6.4.0-150700.53.25.1.s390x",
"product": {
"name": "gfs2-kmp-default-6.4.0-150700.53.25.1.s390x",
"product_id": "gfs2-kmp-default-6.4.0-150700.53.25.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-default-6.4.0-150700.53.25.1.s390x",
"product": {
"name": "kernel-default-6.4.0-150700.53.25.1.s390x",
"product_id": "kernel-default-6.4.0-150700.53.25.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-default-devel-6.4.0-150700.53.25.1.s390x",
"product": {
"name": "kernel-default-devel-6.4.0-150700.53.25.1.s390x",
"product_id": "kernel-default-devel-6.4.0-150700.53.25.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-default-extra-6.4.0-150700.53.25.1.s390x",
"product": {
"name": "kernel-default-extra-6.4.0-150700.53.25.1.s390x",
"product_id": "kernel-default-extra-6.4.0-150700.53.25.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-default-livepatch-6.4.0-150700.53.25.1.s390x",
"product": {
"name": "kernel-default-livepatch-6.4.0-150700.53.25.1.s390x",
"product_id": "kernel-default-livepatch-6.4.0-150700.53.25.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-default-livepatch-devel-6.4.0-150700.53.25.1.s390x",
"product": {
"name": "kernel-default-livepatch-devel-6.4.0-150700.53.25.1.s390x",
"product_id": "kernel-default-livepatch-devel-6.4.0-150700.53.25.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-default-optional-6.4.0-150700.53.25.1.s390x",
"product": {
"name": "kernel-default-optional-6.4.0-150700.53.25.1.s390x",
"product_id": "kernel-default-optional-6.4.0-150700.53.25.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-livepatch-6_4_0-150700_53_25-default-1-150700.15.3.1.s390x",
"product": {
"name": "kernel-livepatch-6_4_0-150700_53_25-default-1-150700.15.3.1.s390x",
"product_id": "kernel-livepatch-6_4_0-150700_53_25-default-1-150700.15.3.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-obs-build-6.4.0-150700.53.25.1.s390x",
"product": {
"name": "kernel-obs-build-6.4.0-150700.53.25.1.s390x",
"product_id": "kernel-obs-build-6.4.0-150700.53.25.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-obs-qa-6.4.0-150700.53.25.1.s390x",
"product": {
"name": "kernel-obs-qa-6.4.0-150700.53.25.1.s390x",
"product_id": "kernel-obs-qa-6.4.0-150700.53.25.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-syms-6.4.0-150700.53.25.1.s390x",
"product": {
"name": "kernel-syms-6.4.0-150700.53.25.1.s390x",
"product_id": "kernel-syms-6.4.0-150700.53.25.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-zfcpdump-6.4.0-150700.53.25.1.s390x",
"product": {
"name": "kernel-zfcpdump-6.4.0-150700.53.25.1.s390x",
"product_id": "kernel-zfcpdump-6.4.0-150700.53.25.1.s390x"
}
},
{
"category": "product_version",
"name": "kselftests-kmp-default-6.4.0-150700.53.25.1.s390x",
"product": {
"name": "kselftests-kmp-default-6.4.0-150700.53.25.1.s390x",
"product_id": "kselftests-kmp-default-6.4.0-150700.53.25.1.s390x"
}
},
{
"category": "product_version",
"name": "ocfs2-kmp-default-6.4.0-150700.53.25.1.s390x",
"product": {
"name": "ocfs2-kmp-default-6.4.0-150700.53.25.1.s390x",
"product_id": "ocfs2-kmp-default-6.4.0-150700.53.25.1.s390x"
}
},
{
"category": "product_version",
"name": "reiserfs-kmp-default-6.4.0-150700.53.25.1.s390x",
"product": {
"name": "reiserfs-kmp-default-6.4.0-150700.53.25.1.s390x",
"product_id": "reiserfs-kmp-default-6.4.0-150700.53.25.1.s390x"
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "cluster-md-kmp-default-6.4.0-150700.53.25.1.x86_64",
"product": {
"name": "cluster-md-kmp-default-6.4.0-150700.53.25.1.x86_64",
"product_id": "cluster-md-kmp-default-6.4.0-150700.53.25.1.x86_64"
}
},
{
"category": "product_version",
"name": "dlm-kmp-default-6.4.0-150700.53.25.1.x86_64",
"product": {
"name": "dlm-kmp-default-6.4.0-150700.53.25.1.x86_64",
"product_id": "dlm-kmp-default-6.4.0-150700.53.25.1.x86_64"
}
},
{
"category": "product_version",
"name": "gfs2-kmp-default-6.4.0-150700.53.25.1.x86_64",
"product": {
"name": "gfs2-kmp-default-6.4.0-150700.53.25.1.x86_64",
"product_id": "gfs2-kmp-default-6.4.0-150700.53.25.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-default-6.4.0-150700.53.25.1.x86_64",
"product": {
"name": "kernel-default-6.4.0-150700.53.25.1.x86_64",
"product_id": "kernel-default-6.4.0-150700.53.25.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-default-base-6.4.0-150700.53.25.1.150700.17.17.1.x86_64",
"product": {
"name": "kernel-default-base-6.4.0-150700.53.25.1.150700.17.17.1.x86_64",
"product_id": "kernel-default-base-6.4.0-150700.53.25.1.150700.17.17.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-default-base-rebuild-6.4.0-150700.53.25.1.150700.17.17.1.x86_64",
"product": {
"name": "kernel-default-base-rebuild-6.4.0-150700.53.25.1.150700.17.17.1.x86_64",
"product_id": "kernel-default-base-rebuild-6.4.0-150700.53.25.1.150700.17.17.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-default-devel-6.4.0-150700.53.25.1.x86_64",
"product": {
"name": "kernel-default-devel-6.4.0-150700.53.25.1.x86_64",
"product_id": "kernel-default-devel-6.4.0-150700.53.25.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-default-extra-6.4.0-150700.53.25.1.x86_64",
"product": {
"name": "kernel-default-extra-6.4.0-150700.53.25.1.x86_64",
"product_id": "kernel-default-extra-6.4.0-150700.53.25.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-default-livepatch-6.4.0-150700.53.25.1.x86_64",
"product": {
"name": "kernel-default-livepatch-6.4.0-150700.53.25.1.x86_64",
"product_id": "kernel-default-livepatch-6.4.0-150700.53.25.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-default-livepatch-devel-6.4.0-150700.53.25.1.x86_64",
"product": {
"name": "kernel-default-livepatch-devel-6.4.0-150700.53.25.1.x86_64",
"product_id": "kernel-default-livepatch-devel-6.4.0-150700.53.25.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-default-optional-6.4.0-150700.53.25.1.x86_64",
"product": {
"name": "kernel-default-optional-6.4.0-150700.53.25.1.x86_64",
"product_id": "kernel-default-optional-6.4.0-150700.53.25.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-default-vdso-6.4.0-150700.53.25.1.x86_64",
"product": {
"name": "kernel-default-vdso-6.4.0-150700.53.25.1.x86_64",
"product_id": "kernel-default-vdso-6.4.0-150700.53.25.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-kvmsmall-6.4.0-150700.53.25.1.x86_64",
"product": {
"name": "kernel-kvmsmall-6.4.0-150700.53.25.1.x86_64",
"product_id": "kernel-kvmsmall-6.4.0-150700.53.25.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-kvmsmall-devel-6.4.0-150700.53.25.1.x86_64",
"product": {
"name": "kernel-kvmsmall-devel-6.4.0-150700.53.25.1.x86_64",
"product_id": "kernel-kvmsmall-devel-6.4.0-150700.53.25.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-kvmsmall-vdso-6.4.0-150700.53.25.1.x86_64",
"product": {
"name": "kernel-kvmsmall-vdso-6.4.0-150700.53.25.1.x86_64",
"product_id": "kernel-kvmsmall-vdso-6.4.0-150700.53.25.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-livepatch-6_4_0-150700_53_25-default-1-150700.15.3.1.x86_64",
"product": {
"name": "kernel-livepatch-6_4_0-150700_53_25-default-1-150700.15.3.1.x86_64",
"product_id": "kernel-livepatch-6_4_0-150700_53_25-default-1-150700.15.3.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-obs-build-6.4.0-150700.53.25.1.x86_64",
"product": {
"name": "kernel-obs-build-6.4.0-150700.53.25.1.x86_64",
"product_id": "kernel-obs-build-6.4.0-150700.53.25.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-obs-qa-6.4.0-150700.53.25.1.x86_64",
"product": {
"name": "kernel-obs-qa-6.4.0-150700.53.25.1.x86_64",
"product_id": "kernel-obs-qa-6.4.0-150700.53.25.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-syms-6.4.0-150700.53.25.1.x86_64",
"product": {
"name": "kernel-syms-6.4.0-150700.53.25.1.x86_64",
"product_id": "kernel-syms-6.4.0-150700.53.25.1.x86_64"
}
},
{
"category": "product_version",
"name": "kselftests-kmp-default-6.4.0-150700.53.25.1.x86_64",
"product": {
"name": "kselftests-kmp-default-6.4.0-150700.53.25.1.x86_64",
"product_id": "kselftests-kmp-default-6.4.0-150700.53.25.1.x86_64"
}
},
{
"category": "product_version",
"name": "ocfs2-kmp-default-6.4.0-150700.53.25.1.x86_64",
"product": {
"name": "ocfs2-kmp-default-6.4.0-150700.53.25.1.x86_64",
"product_id": "ocfs2-kmp-default-6.4.0-150700.53.25.1.x86_64"
}
},
{
"category": "product_version",
"name": "reiserfs-kmp-default-6.4.0-150700.53.25.1.x86_64",
"product": {
"name": "reiserfs-kmp-default-6.4.0-150700.53.25.1.x86_64",
"product_id": "reiserfs-kmp-default-6.4.0-150700.53.25.1.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "SUSE Linux Enterprise Module for Basesystem 15 SP7",
"product": {
"name": "SUSE Linux Enterprise Module for Basesystem 15 SP7",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP7",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-module-basesystem:15:sp7"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Module for Development Tools 15 SP7",
"product": {
"name": "SUSE Linux Enterprise Module for Development Tools 15 SP7",
"product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP7",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-module-development-tools:15:sp7"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Module for Legacy 15 SP7",
"product": {
"name": "SUSE Linux Enterprise Module for Legacy 15 SP7",
"product_id": "SUSE Linux Enterprise Module for Legacy 15 SP7",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-module-legacy:15:sp7"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Live Patching 15 SP7",
"product": {
"name": "SUSE Linux Enterprise Live Patching 15 SP7",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP7",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-module-live-patching:15:sp7"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise High Availability Extension 15 SP7",
"product": {
"name": "SUSE Linux Enterprise High Availability Extension 15 SP7",
"product_id": "SUSE Linux Enterprise High Availability Extension 15 SP7",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-ha:15:sp7"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Workstation Extension 15 SP7",
"product": {
"name": "SUSE Linux Enterprise Workstation Extension 15 SP7",
"product_id": "SUSE Linux Enterprise Workstation Extension 15 SP7",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-we:15:sp7"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-64kb-6.4.0-150700.53.25.1.aarch64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP7",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.25.1.aarch64"
},
"product_reference": "kernel-64kb-6.4.0-150700.53.25.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-64kb-devel-6.4.0-150700.53.25.1.aarch64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP7",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.25.1.aarch64"
},
"product_reference": "kernel-64kb-devel-6.4.0-150700.53.25.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-6.4.0-150700.53.25.1.aarch64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP7",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.aarch64"
},
"product_reference": "kernel-default-6.4.0-150700.53.25.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-6.4.0-150700.53.25.1.ppc64le as component of SUSE Linux Enterprise Module for Basesystem 15 SP7",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.ppc64le"
},
"product_reference": "kernel-default-6.4.0-150700.53.25.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-6.4.0-150700.53.25.1.s390x as component of SUSE Linux Enterprise Module for Basesystem 15 SP7",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.s390x"
},
"product_reference": "kernel-default-6.4.0-150700.53.25.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-6.4.0-150700.53.25.1.x86_64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP7",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.x86_64"
},
"product_reference": "kernel-default-6.4.0-150700.53.25.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-6.4.0-150700.53.25.1.150700.17.17.1.aarch64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP7",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.25.1.150700.17.17.1.aarch64"
},
"product_reference": "kernel-default-base-6.4.0-150700.53.25.1.150700.17.17.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-6.4.0-150700.53.25.1.150700.17.17.1.ppc64le as component of SUSE Linux Enterprise Module for Basesystem 15 SP7",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.25.1.150700.17.17.1.ppc64le"
},
"product_reference": "kernel-default-base-6.4.0-150700.53.25.1.150700.17.17.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-6.4.0-150700.53.25.1.150700.17.17.1.x86_64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP7",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.25.1.150700.17.17.1.x86_64"
},
"product_reference": "kernel-default-base-6.4.0-150700.53.25.1.150700.17.17.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-devel-6.4.0-150700.53.25.1.aarch64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP7",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.aarch64"
},
"product_reference": "kernel-default-devel-6.4.0-150700.53.25.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-devel-6.4.0-150700.53.25.1.ppc64le as component of SUSE Linux Enterprise Module for Basesystem 15 SP7",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.ppc64le"
},
"product_reference": "kernel-default-devel-6.4.0-150700.53.25.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-devel-6.4.0-150700.53.25.1.s390x as component of SUSE Linux Enterprise Module for Basesystem 15 SP7",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.s390x"
},
"product_reference": "kernel-default-devel-6.4.0-150700.53.25.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-devel-6.4.0-150700.53.25.1.x86_64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP7",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.x86_64"
},
"product_reference": "kernel-default-devel-6.4.0-150700.53.25.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-6.4.0-150700.53.25.1.noarch as component of SUSE Linux Enterprise Module for Basesystem 15 SP7",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.25.1.noarch"
},
"product_reference": "kernel-devel-6.4.0-150700.53.25.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-macros-6.4.0-150700.53.25.1.noarch as component of SUSE Linux Enterprise Module for Basesystem 15 SP7",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.25.1.noarch"
},
"product_reference": "kernel-macros-6.4.0-150700.53.25.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-6.4.0-150700.53.25.1.s390x as component of SUSE Linux Enterprise Module for Basesystem 15 SP7",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.25.1.s390x"
},
"product_reference": "kernel-zfcpdump-6.4.0-150700.53.25.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-docs-6.4.0-150700.53.25.2.noarch as component of SUSE Linux Enterprise Module for Development Tools 15 SP7",
"product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.25.2.noarch"
},
"product_reference": "kernel-docs-6.4.0-150700.53.25.2.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-obs-build-6.4.0-150700.53.25.1.aarch64 as component of SUSE Linux Enterprise Module for Development Tools 15 SP7",
"product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.aarch64"
},
"product_reference": "kernel-obs-build-6.4.0-150700.53.25.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-obs-build-6.4.0-150700.53.25.1.ppc64le as component of SUSE Linux Enterprise Module for Development Tools 15 SP7",
"product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.ppc64le"
},
"product_reference": "kernel-obs-build-6.4.0-150700.53.25.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-obs-build-6.4.0-150700.53.25.1.s390x as component of SUSE Linux Enterprise Module for Development Tools 15 SP7",
"product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.s390x"
},
"product_reference": "kernel-obs-build-6.4.0-150700.53.25.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-obs-build-6.4.0-150700.53.25.1.x86_64 as component of SUSE Linux Enterprise Module for Development Tools 15 SP7",
"product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.x86_64"
},
"product_reference": "kernel-obs-build-6.4.0-150700.53.25.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-source-6.4.0-150700.53.25.1.noarch as component of SUSE Linux Enterprise Module for Development Tools 15 SP7",
"product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.25.1.noarch"
},
"product_reference": "kernel-source-6.4.0-150700.53.25.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-6.4.0-150700.53.25.1.aarch64 as component of SUSE Linux Enterprise Module for Development Tools 15 SP7",
"product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.aarch64"
},
"product_reference": "kernel-syms-6.4.0-150700.53.25.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-6.4.0-150700.53.25.1.ppc64le as component of SUSE Linux Enterprise Module for Development Tools 15 SP7",
"product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.ppc64le"
},
"product_reference": "kernel-syms-6.4.0-150700.53.25.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-6.4.0-150700.53.25.1.s390x as component of SUSE Linux Enterprise Module for Development Tools 15 SP7",
"product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.s390x"
},
"product_reference": "kernel-syms-6.4.0-150700.53.25.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-6.4.0-150700.53.25.1.x86_64 as component of SUSE Linux Enterprise Module for Development Tools 15 SP7",
"product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.x86_64"
},
"product_reference": "kernel-syms-6.4.0-150700.53.25.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "reiserfs-kmp-default-6.4.0-150700.53.25.1.aarch64 as component of SUSE Linux Enterprise Module for Legacy 15 SP7",
"product_id": "SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.aarch64"
},
"product_reference": "reiserfs-kmp-default-6.4.0-150700.53.25.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Legacy 15 SP7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "reiserfs-kmp-default-6.4.0-150700.53.25.1.ppc64le as component of SUSE Linux Enterprise Module for Legacy 15 SP7",
"product_id": "SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.ppc64le"
},
"product_reference": "reiserfs-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Legacy 15 SP7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "reiserfs-kmp-default-6.4.0-150700.53.25.1.s390x as component of SUSE Linux Enterprise Module for Legacy 15 SP7",
"product_id": "SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.s390x"
},
"product_reference": "reiserfs-kmp-default-6.4.0-150700.53.25.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Legacy 15 SP7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "reiserfs-kmp-default-6.4.0-150700.53.25.1.x86_64 as component of SUSE Linux Enterprise Module for Legacy 15 SP7",
"product_id": "SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.x86_64"
},
"product_reference": "reiserfs-kmp-default-6.4.0-150700.53.25.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Legacy 15 SP7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-livepatch-6.4.0-150700.53.25.1.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP7",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.25.1.ppc64le"
},
"product_reference": "kernel-default-livepatch-6.4.0-150700.53.25.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-livepatch-6.4.0-150700.53.25.1.s390x as component of SUSE Linux Enterprise Live Patching 15 SP7",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.25.1.s390x"
},
"product_reference": "kernel-default-livepatch-6.4.0-150700.53.25.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-livepatch-6.4.0-150700.53.25.1.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP7",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.25.1.x86_64"
},
"product_reference": "kernel-default-livepatch-6.4.0-150700.53.25.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-livepatch-devel-6.4.0-150700.53.25.1.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP7",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.25.1.ppc64le"
},
"product_reference": "kernel-default-livepatch-devel-6.4.0-150700.53.25.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-livepatch-devel-6.4.0-150700.53.25.1.s390x as component of SUSE Linux Enterprise Live Patching 15 SP7",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.25.1.s390x"
},
"product_reference": "kernel-default-livepatch-devel-6.4.0-150700.53.25.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-livepatch-devel-6.4.0-150700.53.25.1.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP7",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.25.1.x86_64"
},
"product_reference": "kernel-default-livepatch-devel-6.4.0-150700.53.25.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-6_4_0-150700_53_25-default-1-150700.15.3.1.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP7",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_25-default-1-150700.15.3.1.ppc64le"
},
"product_reference": "kernel-livepatch-6_4_0-150700_53_25-default-1-150700.15.3.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-6_4_0-150700_53_25-default-1-150700.15.3.1.s390x as component of SUSE Linux Enterprise Live Patching 15 SP7",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_25-default-1-150700.15.3.1.s390x"
},
"product_reference": "kernel-livepatch-6_4_0-150700_53_25-default-1-150700.15.3.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-6_4_0-150700_53_25-default-1-150700.15.3.1.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP7",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_25-default-1-150700.15.3.1.x86_64"
},
"product_reference": "kernel-livepatch-6_4_0-150700_53_25-default-1-150700.15.3.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cluster-md-kmp-default-6.4.0-150700.53.25.1.aarch64 as component of SUSE Linux Enterprise High Availability Extension 15 SP7",
"product_id": "SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.aarch64"
},
"product_reference": "cluster-md-kmp-default-6.4.0-150700.53.25.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cluster-md-kmp-default-6.4.0-150700.53.25.1.ppc64le as component of SUSE Linux Enterprise High Availability Extension 15 SP7",
"product_id": "SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.ppc64le"
},
"product_reference": "cluster-md-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cluster-md-kmp-default-6.4.0-150700.53.25.1.s390x as component of SUSE Linux Enterprise High Availability Extension 15 SP7",
"product_id": "SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.s390x"
},
"product_reference": "cluster-md-kmp-default-6.4.0-150700.53.25.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cluster-md-kmp-default-6.4.0-150700.53.25.1.x86_64 as component of SUSE Linux Enterprise High Availability Extension 15 SP7",
"product_id": "SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.x86_64"
},
"product_reference": "cluster-md-kmp-default-6.4.0-150700.53.25.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dlm-kmp-default-6.4.0-150700.53.25.1.aarch64 as component of SUSE Linux Enterprise High Availability Extension 15 SP7",
"product_id": "SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.aarch64"
},
"product_reference": "dlm-kmp-default-6.4.0-150700.53.25.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dlm-kmp-default-6.4.0-150700.53.25.1.ppc64le as component of SUSE Linux Enterprise High Availability Extension 15 SP7",
"product_id": "SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.ppc64le"
},
"product_reference": "dlm-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dlm-kmp-default-6.4.0-150700.53.25.1.s390x as component of SUSE Linux Enterprise High Availability Extension 15 SP7",
"product_id": "SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.s390x"
},
"product_reference": "dlm-kmp-default-6.4.0-150700.53.25.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dlm-kmp-default-6.4.0-150700.53.25.1.x86_64 as component of SUSE Linux Enterprise High Availability Extension 15 SP7",
"product_id": "SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.x86_64"
},
"product_reference": "dlm-kmp-default-6.4.0-150700.53.25.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gfs2-kmp-default-6.4.0-150700.53.25.1.aarch64 as component of SUSE Linux Enterprise High Availability Extension 15 SP7",
"product_id": "SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.aarch64"
},
"product_reference": "gfs2-kmp-default-6.4.0-150700.53.25.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gfs2-kmp-default-6.4.0-150700.53.25.1.ppc64le as component of SUSE Linux Enterprise High Availability Extension 15 SP7",
"product_id": "SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.ppc64le"
},
"product_reference": "gfs2-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gfs2-kmp-default-6.4.0-150700.53.25.1.s390x as component of SUSE Linux Enterprise High Availability Extension 15 SP7",
"product_id": "SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.s390x"
},
"product_reference": "gfs2-kmp-default-6.4.0-150700.53.25.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gfs2-kmp-default-6.4.0-150700.53.25.1.x86_64 as component of SUSE Linux Enterprise High Availability Extension 15 SP7",
"product_id": "SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.x86_64"
},
"product_reference": "gfs2-kmp-default-6.4.0-150700.53.25.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ocfs2-kmp-default-6.4.0-150700.53.25.1.aarch64 as component of SUSE Linux Enterprise High Availability Extension 15 SP7",
"product_id": "SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.aarch64"
},
"product_reference": "ocfs2-kmp-default-6.4.0-150700.53.25.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ocfs2-kmp-default-6.4.0-150700.53.25.1.ppc64le as component of SUSE Linux Enterprise High Availability Extension 15 SP7",
"product_id": "SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.ppc64le"
},
"product_reference": "ocfs2-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ocfs2-kmp-default-6.4.0-150700.53.25.1.s390x as component of SUSE Linux Enterprise High Availability Extension 15 SP7",
"product_id": "SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.s390x"
},
"product_reference": "ocfs2-kmp-default-6.4.0-150700.53.25.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ocfs2-kmp-default-6.4.0-150700.53.25.1.x86_64 as component of SUSE Linux Enterprise High Availability Extension 15 SP7",
"product_id": "SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.x86_64"
},
"product_reference": "ocfs2-kmp-default-6.4.0-150700.53.25.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-extra-6.4.0-150700.53.25.1.x86_64 as component of SUSE Linux Enterprise Workstation Extension 15 SP7",
"product_id": "SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.25.1.x86_64"
},
"product_reference": "kernel-default-extra-6.4.0-150700.53.25.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Workstation Extension 15 SP7"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2022-50253",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-50253"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nbpf: make sure skb-\u003elen != 0 when redirecting to a tunneling device\n\nsyzkaller managed to trigger another case where skb-\u003elen == 0\nwhen we enter __dev_queue_xmit:\n\nWARNING: CPU: 0 PID: 2470 at include/linux/skbuff.h:2576 skb_assert_len include/linux/skbuff.h:2576 [inline]\nWARNING: CPU: 0 PID: 2470 at include/linux/skbuff.h:2576 __dev_queue_xmit+0x2069/0x35e0 net/core/dev.c:4295\n\nCall Trace:\n dev_queue_xmit+0x17/0x20 net/core/dev.c:4406\n __bpf_tx_skb net/core/filter.c:2115 [inline]\n __bpf_redirect_no_mac net/core/filter.c:2140 [inline]\n __bpf_redirect+0x5fb/0xda0 net/core/filter.c:2163\n ____bpf_clone_redirect net/core/filter.c:2447 [inline]\n bpf_clone_redirect+0x247/0x390 net/core/filter.c:2419\n bpf_prog_48159a89cb4a9a16+0x59/0x5e\n bpf_dispatcher_nop_func include/linux/bpf.h:897 [inline]\n __bpf_prog_run include/linux/filter.h:596 [inline]\n bpf_prog_run include/linux/filter.h:603 [inline]\n bpf_test_run+0x46c/0x890 net/bpf/test_run.c:402\n bpf_prog_test_run_skb+0xbdc/0x14c0 net/bpf/test_run.c:1170\n bpf_prog_test_run+0x345/0x3c0 kernel/bpf/syscall.c:3648\n __sys_bpf+0x43a/0x6c0 kernel/bpf/syscall.c:5005\n __do_sys_bpf kernel/bpf/syscall.c:5091 [inline]\n __se_sys_bpf kernel/bpf/syscall.c:5089 [inline]\n __x64_sys_bpf+0x7c/0x90 kernel/bpf/syscall.c:5089\n do_syscall_64+0x54/0x70 arch/x86/entry/common.c:48\n entry_SYSCALL_64_after_hwframe+0x61/0xc6\n\nThe reproducer doesn\u0027t really reproduce outside of syzkaller\nenvironment, so I\u0027m taking a guess here. It looks like we\ndo generate correct ETH_HLEN-sized packet, but we redirect\nthe packet to the tunneling device. Before we do so, we\n__skb_pull l2 header and arrive again at skb-\u003elen == 0.\nDoesn\u0027t seem like we can do anything better than having\nan explicit check after __skb_pull?",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_25-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_25-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_25-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.25.1.150700.17.17.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.25.1.150700.17.17.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.25.1.150700.17.17.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.25.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.25.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.25.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.25.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.25.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-50253",
"url": "https://www.suse.com/security/cve/CVE-2022-50253"
},
{
"category": "external",
"summary": "SUSE Bug 1249912 for CVE-2022-50253",
"url": "https://bugzilla.suse.com/1249912"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_25-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_25-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_25-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.25.1.150700.17.17.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.25.1.150700.17.17.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.25.1.150700.17.17.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.25.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.25.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.25.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.25.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.25.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_25-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_25-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_25-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.25.1.150700.17.17.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.25.1.150700.17.17.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.25.1.150700.17.17.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.25.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.25.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.25.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.25.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.25.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-15T11:09:08Z",
"details": "moderate"
}
],
"title": "CVE-2022-50253"
},
{
"cve": "CVE-2023-53676",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2023-53676"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nscsi: target: iscsi: Fix buffer overflow in lio_target_nacl_info_show()\n\nThe function lio_target_nacl_info_show() uses sprintf() in a loop to print\ndetails for every iSCSI connection in a session without checking for the\nbuffer length. With enough iSCSI connections it\u0027s possible to overflow the\nbuffer provided by configfs and corrupt the memory.\n\nThis patch replaces sprintf() with sysfs_emit_at() that checks for buffer\nboundries.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_25-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_25-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_25-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.25.1.150700.17.17.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.25.1.150700.17.17.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.25.1.150700.17.17.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.25.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.25.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.25.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.25.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.25.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2023-53676",
"url": "https://www.suse.com/security/cve/CVE-2023-53676"
},
{
"category": "external",
"summary": "SUSE Bug 1251786 for CVE-2023-53676",
"url": "https://bugzilla.suse.com/1251786"
},
{
"category": "external",
"summary": "SUSE Bug 1251787 for CVE-2023-53676",
"url": "https://bugzilla.suse.com/1251787"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_25-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_25-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_25-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.25.1.150700.17.17.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.25.1.150700.17.17.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.25.1.150700.17.17.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.25.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.25.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.25.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.25.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.25.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_25-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_25-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_25-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.25.1.150700.17.17.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.25.1.150700.17.17.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.25.1.150700.17.17.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.25.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.25.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.25.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.25.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.25.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-15T11:09:08Z",
"details": "important"
}
],
"title": "CVE-2023-53676"
},
{
"cve": "CVE-2025-21710",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-21710"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\ntcp: correct handling of extreme memory squeeze\n\nTesting with iperf3 using the \"pasta\" protocol splicer has revealed\na problem in the way tcp handles window advertising in extreme memory\nsqueeze situations.\n\nUnder memory pressure, a socket endpoint may temporarily advertise\na zero-sized window, but this is not stored as part of the socket data.\nThe reasoning behind this is that it is considered a temporary setting\nwhich shouldn\u0027t influence any further calculations.\n\nHowever, if we happen to stall at an unfortunate value of the current\nwindow size, the algorithm selecting a new value will consistently fail\nto advertise a non-zero window once we have freed up enough memory.\nThis means that this side\u0027s notion of the current window size is\ndifferent from the one last advertised to the peer, causing the latter\nto not send any data to resolve the sitution.\n\nThe problem occurs on the iperf3 server side, and the socket in question\nis a completely regular socket with the default settings for the\nfedora40 kernel. We do not use SO_PEEK or SO_RCVBUF on the socket.\n\nThe following excerpt of a logging session, with own comments added,\nshows more in detail what is happening:\n\n// tcp_v4_rcv(-\u003e)\n// tcp_rcv_established(-\u003e)\n[5201\u003c-\u003e39222]: ==== Activating log @ net/ipv4/tcp_input.c/tcp_data_queue()/5257 ====\n[5201\u003c-\u003e39222]: tcp_data_queue(-\u003e)\n[5201\u003c-\u003e39222]: DROPPING skb [265600160..265665640], reason: SKB_DROP_REASON_PROTO_MEM\n [rcv_nxt 265600160, rcv_wnd 262144, snt_ack 265469200, win_now 131184]\n [copied_seq 259909392-\u003e260034360 (124968), unread 5565800, qlen 85, ofoq 0]\n [OFO queue: gap: 65480, len: 0]\n[5201\u003c-\u003e39222]: tcp_data_queue(\u003c-)\n[5201\u003c-\u003e39222]: __tcp_transmit_skb(-\u003e)\n [tp-\u003ercv_wup: 265469200, tp-\u003ercv_wnd: 262144, tp-\u003ercv_nxt 265600160]\n[5201\u003c-\u003e39222]: tcp_select_window(-\u003e)\n[5201\u003c-\u003e39222]: (inet_csk(sk)-\u003eicsk_ack.pending \u0026 ICSK_ACK_NOMEM) ? --\u003e TRUE\n [tp-\u003ercv_wup: 265469200, tp-\u003ercv_wnd: 262144, tp-\u003ercv_nxt 265600160]\n returning 0\n[5201\u003c-\u003e39222]: tcp_select_window(\u003c-)\n[5201\u003c-\u003e39222]: ADVERTISING WIN 0, ACK_SEQ: 265600160\n[5201\u003c-\u003e39222]: [__tcp_transmit_skb(\u003c-)\n[5201\u003c-\u003e39222]: tcp_rcv_established(\u003c-)\n[5201\u003c-\u003e39222]: tcp_v4_rcv(\u003c-)\n\n// Receive queue is at 85 buffers and we are out of memory.\n// We drop the incoming buffer, although it is in sequence, and decide\n// to send an advertisement with a window of zero.\n// We don\u0027t update tp-\u003ercv_wnd and tp-\u003ercv_wup accordingly, which means\n// we unconditionally shrink the window.\n\n[5201\u003c-\u003e39222]: tcp_recvmsg_locked(-\u003e)\n[5201\u003c-\u003e39222]: __tcp_cleanup_rbuf(-\u003e) tp-\u003ercv_wup: 265469200, tp-\u003ercv_wnd: 262144, tp-\u003ercv_nxt 265600160\n[5201\u003c-\u003e39222]: [new_win = 0, win_now = 131184, 2 * win_now = 262368]\n[5201\u003c-\u003e39222]: [new_win \u003e= (2 * win_now) ? --\u003e time_to_ack = 0]\n[5201\u003c-\u003e39222]: NOT calling tcp_send_ack()\n [tp-\u003ercv_wup: 265469200, tp-\u003ercv_wnd: 262144, tp-\u003ercv_nxt 265600160]\n[5201\u003c-\u003e39222]: __tcp_cleanup_rbuf(\u003c-)\n [rcv_nxt 265600160, rcv_wnd 262144, snt_ack 265469200, win_now 131184]\n [copied_seq 260040464-\u003e260040464 (0), unread 5559696, qlen 85, ofoq 0]\n returning 6104 bytes\n[5201\u003c-\u003e39222]: tcp_recvmsg_locked(\u003c-)\n\n// After each read, the algorithm for calculating the new receive\n// window in __tcp_cleanup_rbuf() finds it is too small to advertise\n// or to update tp-\u003ercv_wnd.\n// Meanwhile, the peer thinks the window is zero, and will not send\n// any more data to trigger an update from the interrupt mode side.\n\n[5201\u003c-\u003e39222]: tcp_recvmsg_locked(-\u003e)\n[5201\u003c-\u003e39222]: __tcp_cleanup_rbuf(-\u003e) tp-\u003ercv_wup: 265469200, tp-\u003ercv_wnd: 262144, tp-\u003ercv_nxt 265600160\n[5201\u003c-\u003e39222]: [new_win = 262144, win_now = 131184, 2 * win_n\n---truncated---",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_25-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_25-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_25-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.25.1.150700.17.17.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.25.1.150700.17.17.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.25.1.150700.17.17.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.25.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.25.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.25.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.25.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.25.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-21710",
"url": "https://www.suse.com/security/cve/CVE-2025-21710"
},
{
"category": "external",
"summary": "SUSE Bug 1237888 for CVE-2025-21710",
"url": "https://bugzilla.suse.com/1237888"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_25-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_25-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_25-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.25.1.150700.17.17.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.25.1.150700.17.17.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.25.1.150700.17.17.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.25.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.25.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.25.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.25.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.25.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_25-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_25-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_25-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.25.1.150700.17.17.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.25.1.150700.17.17.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.25.1.150700.17.17.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.25.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.25.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.25.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.25.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.25.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-15T11:09:08Z",
"details": "moderate"
}
],
"title": "CVE-2025-21710"
},
{
"cve": "CVE-2025-37916",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-37916"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\npds_core: remove write-after-free of client_id\n\nA use-after-free error popped up in stress testing:\n\n[Mon Apr 21 21:21:33 2025] BUG: KFENCE: use-after-free write in pdsc_auxbus_dev_del+0xef/0x160 [pds_core]\n[Mon Apr 21 21:21:33 2025] Use-after-free write at 0x000000007013ecd1 (in kfence-#47):\n[Mon Apr 21 21:21:33 2025] pdsc_auxbus_dev_del+0xef/0x160 [pds_core]\n[Mon Apr 21 21:21:33 2025] pdsc_remove+0xc0/0x1b0 [pds_core]\n[Mon Apr 21 21:21:33 2025] pci_device_remove+0x24/0x70\n[Mon Apr 21 21:21:33 2025] device_release_driver_internal+0x11f/0x180\n[Mon Apr 21 21:21:33 2025] driver_detach+0x45/0x80\n[Mon Apr 21 21:21:33 2025] bus_remove_driver+0x83/0xe0\n[Mon Apr 21 21:21:33 2025] pci_unregister_driver+0x1a/0x80\n\nThe actual device uninit usually happens on a separate thread\nscheduled after this code runs, but there is no guarantee of order\nof thread execution, so this could be a problem. There\u0027s no\nactual need to clear the client_id at this point, so simply\nremove the offending code.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_25-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_25-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_25-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.25.1.150700.17.17.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.25.1.150700.17.17.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.25.1.150700.17.17.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.25.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.25.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.25.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.25.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.25.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-37916",
"url": "https://www.suse.com/security/cve/CVE-2025-37916"
},
{
"category": "external",
"summary": "SUSE Bug 1243474 for CVE-2025-37916",
"url": "https://bugzilla.suse.com/1243474"
},
{
"category": "external",
"summary": "SUSE Bug 1243535 for CVE-2025-37916",
"url": "https://bugzilla.suse.com/1243535"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_25-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_25-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_25-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.25.1.150700.17.17.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.25.1.150700.17.17.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.25.1.150700.17.17.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.25.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.25.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.25.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.25.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.25.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_25-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_25-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_25-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.25.1.150700.17.17.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.25.1.150700.17.17.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.25.1.150700.17.17.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.25.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.25.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.25.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.25.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.25.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-15T11:09:08Z",
"details": "moderate"
}
],
"title": "CVE-2025-37916"
},
{
"cve": "CVE-2025-38359",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-38359"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\ns390/mm: Fix in_atomic() handling in do_secure_storage_access()\n\nKernel user spaces accesses to not exported pages in atomic context\nincorrectly try to resolve the page fault.\nWith debug options enabled call traces like this can be seen:\n\nBUG: sleeping function called from invalid context at kernel/locking/rwsem.c:1523\nin_atomic(): 1, irqs_disabled(): 0, non_block: 0, pid: 419074, name: qemu-system-s39\npreempt_count: 1, expected: 0\nRCU nest depth: 0, expected: 0\nINFO: lockdep is turned off.\nPreemption disabled at:\n[\u003c00000383ea47cfa2\u003e] copy_page_from_iter_atomic+0xa2/0x8a0\nCPU: 12 UID: 0 PID: 419074 Comm: qemu-system-s39\nTainted: G W 6.16.0-20250531.rc0.git0.69b3a602feac.63.fc42.s390x+debug #1 PREEMPT\nTainted: [W]=WARN\nHardware name: IBM 3931 A01 703 (LPAR)\nCall Trace:\n [\u003c00000383e990d282\u003e] dump_stack_lvl+0xa2/0xe8\n [\u003c00000383e99bf152\u003e] __might_resched+0x292/0x2d0\n [\u003c00000383eaa7c374\u003e] down_read+0x34/0x2d0\n [\u003c00000383e99432f8\u003e] do_secure_storage_access+0x108/0x360\n [\u003c00000383eaa724b0\u003e] __do_pgm_check+0x130/0x220\n [\u003c00000383eaa842e4\u003e] pgm_check_handler+0x114/0x160\n [\u003c00000383ea47d028\u003e] copy_page_from_iter_atomic+0x128/0x8a0\n([\u003c00000383ea47d016\u003e] copy_page_from_iter_atomic+0x116/0x8a0)\n [\u003c00000383e9c45eae\u003e] generic_perform_write+0x16e/0x310\n [\u003c00000383e9eb87f4\u003e] ext4_buffered_write_iter+0x84/0x160\n [\u003c00000383e9da0de4\u003e] vfs_write+0x1c4/0x460\n [\u003c00000383e9da123c\u003e] ksys_write+0x7c/0x100\n [\u003c00000383eaa7284e\u003e] __do_syscall+0x15e/0x280\n [\u003c00000383eaa8417e\u003e] system_call+0x6e/0x90\nINFO: lockdep is turned off.\n\nIt is not allowed to take the mmap_lock while in atomic context. Therefore\nhandle such a secure storage access fault as if the accessed page is not\nmapped: the uaccess function will return -EFAULT, and the caller has to\ndeal with this. Usually this means that the access is retried in process\ncontext, which allows to resolve the page fault (or in this case export the\npage).",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_25-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_25-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_25-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.25.1.150700.17.17.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.25.1.150700.17.17.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.25.1.150700.17.17.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.25.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.25.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.25.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.25.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.25.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-38359",
"url": "https://www.suse.com/security/cve/CVE-2025-38359"
},
{
"category": "external",
"summary": "SUSE Bug 1247076 for CVE-2025-38359",
"url": "https://bugzilla.suse.com/1247076"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_25-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_25-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_25-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.25.1.150700.17.17.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.25.1.150700.17.17.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.25.1.150700.17.17.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.25.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.25.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.25.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.25.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.25.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_25-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_25-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_25-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.25.1.150700.17.17.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.25.1.150700.17.17.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.25.1.150700.17.17.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.25.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.25.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.25.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.25.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.25.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-15T11:09:08Z",
"details": "moderate"
}
],
"title": "CVE-2025-38359"
},
{
"cve": "CVE-2025-39788",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-39788"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nscsi: ufs: exynos: Fix programming of HCI_UTRL_NEXUS_TYPE\n\nOn Google gs101, the number of UTP transfer request slots (nutrs) is 32,\nand in this case the driver ends up programming the UTRL_NEXUS_TYPE\nincorrectly as 0.\n\nThis is because the left hand side of the shift is 1, which is of type\nint, i.e. 31 bits wide. Shifting by more than that width results in\nundefined behaviour.\n\nFix this by switching to the BIT() macro, which applies correct type\ncasting as required. This ensures the correct value is written to\nUTRL_NEXUS_TYPE (0xffffffff on gs101), and it also fixes a UBSAN shift\nwarning:\n\n UBSAN: shift-out-of-bounds in drivers/ufs/host/ufs-exynos.c:1113:21\n shift exponent 32 is too large for 32-bit type \u0027int\u0027\n\nFor consistency, apply the same change to the nutmrs / UTMRL_NEXUS_TYPE\nwrite.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_25-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_25-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_25-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.25.1.150700.17.17.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.25.1.150700.17.17.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.25.1.150700.17.17.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.25.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.25.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.25.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.25.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.25.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-39788",
"url": "https://www.suse.com/security/cve/CVE-2025-39788"
},
{
"category": "external",
"summary": "SUSE Bug 1249547 for CVE-2025-39788",
"url": "https://bugzilla.suse.com/1249547"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_25-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_25-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_25-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.25.1.150700.17.17.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.25.1.150700.17.17.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.25.1.150700.17.17.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.25.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.25.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.25.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.25.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.25.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_25-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_25-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_25-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.25.1.150700.17.17.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.25.1.150700.17.17.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.25.1.150700.17.17.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.25.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.25.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.25.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.25.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.25.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-15T11:09:08Z",
"details": "moderate"
}
],
"title": "CVE-2025-39788"
},
{
"cve": "CVE-2025-39805",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-39805"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnet: macb: fix unregister_netdev call order in macb_remove()\n\nWhen removing a macb device, the driver calls phy_exit() before\nunregister_netdev(). This leads to a WARN from kernfs:\n\n ------------[ cut here ]------------\n kernfs: can not remove \u0027attached_dev\u0027, no directory\n WARNING: CPU: 1 PID: 27146 at fs/kernfs/dir.c:1683\n Call trace:\n kernfs_remove_by_name_ns+0xd8/0xf0\n sysfs_remove_link+0x24/0x58\n phy_detach+0x5c/0x168\n phy_disconnect+0x4c/0x70\n phylink_disconnect_phy+0x6c/0xc0 [phylink]\n macb_close+0x6c/0x170 [macb]\n ...\n macb_remove+0x60/0x168 [macb]\n platform_remove+0x5c/0x80\n ...\n\nThe warning happens because the PHY is being exited while the netdev\nis still registered. The correct order is to unregister the netdev\nbefore shutting down the PHY and cleaning up the MDIO bus.\n\nFix this by moving unregister_netdev() ahead of phy_exit() in\nmacb_remove().",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_25-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_25-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_25-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.25.1.150700.17.17.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.25.1.150700.17.17.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.25.1.150700.17.17.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.25.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.25.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.25.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.25.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.25.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-39805",
"url": "https://www.suse.com/security/cve/CVE-2025-39805"
},
{
"category": "external",
"summary": "SUSE Bug 1249982 for CVE-2025-39805",
"url": "https://bugzilla.suse.com/1249982"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_25-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_25-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_25-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.25.1.150700.17.17.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.25.1.150700.17.17.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.25.1.150700.17.17.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.25.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.25.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.25.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.25.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.25.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_25-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_25-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_25-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.25.1.150700.17.17.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.25.1.150700.17.17.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.25.1.150700.17.17.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.25.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.25.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.25.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.25.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.25.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-15T11:09:08Z",
"details": "moderate"
}
],
"title": "CVE-2025-39805"
},
{
"cve": "CVE-2025-39819",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-39819"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nfs/smb: Fix inconsistent refcnt update\n\nA possible inconsistent update of refcount was identified in `smb2_compound_op`.\nSuch inconsistent update could lead to possible resource leaks.\n\nWhy it is a possible bug:\n1. In the comment section of the function, it clearly states that the\nreference to `cfile` should be dropped after calling this function.\n2. Every control flow path would check and drop the reference to\n`cfile`, except the patched one.\n3. Existing callers would not handle refcount update of `cfile` if\n-ENOMEM is returned.\n\nTo fix the bug, an extra goto label \"out\" is added, to make sure that the\ncleanup logic would always be respected. As the problem is caused by the\nallocation failure of `vars`, the cleanup logic between label \"finished\"\nand \"out\" can be safely ignored. According to the definition of function\n`is_replayable_error`, the error code of \"-ENOMEM\" is not recoverable.\nTherefore, the replay logic also gets ignored.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_25-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_25-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_25-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.25.1.150700.17.17.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.25.1.150700.17.17.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.25.1.150700.17.17.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.25.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.25.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.25.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.25.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.25.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-39819",
"url": "https://www.suse.com/security/cve/CVE-2025-39819"
},
{
"category": "external",
"summary": "SUSE Bug 1250176 for CVE-2025-39819",
"url": "https://bugzilla.suse.com/1250176"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_25-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_25-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_25-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.25.1.150700.17.17.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.25.1.150700.17.17.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.25.1.150700.17.17.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.25.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.25.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.25.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.25.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.25.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_25-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_25-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_25-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.25.1.150700.17.17.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.25.1.150700.17.17.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.25.1.150700.17.17.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.25.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.25.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.25.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.25.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.25.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-15T11:09:08Z",
"details": "moderate"
}
],
"title": "CVE-2025-39819"
},
{
"cve": "CVE-2025-39822",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-39822"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nio_uring/kbuf: fix signedness in this_len calculation\n\nWhen importing and using buffers, buf-\u003elen is considered unsigned.\nHowever, buf-\u003elen is converted to signed int when committing. This can\nlead to unexpected behavior if the buffer is large enough to be\ninterpreted as a negative value. Make min_t calculation unsigned.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_25-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_25-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_25-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.25.1.150700.17.17.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.25.1.150700.17.17.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.25.1.150700.17.17.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.25.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.25.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.25.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.25.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.25.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-39822",
"url": "https://www.suse.com/security/cve/CVE-2025-39822"
},
{
"category": "external",
"summary": "SUSE Bug 1250034 for CVE-2025-39822",
"url": "https://bugzilla.suse.com/1250034"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_25-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_25-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_25-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.25.1.150700.17.17.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.25.1.150700.17.17.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.25.1.150700.17.17.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.25.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.25.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.25.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.25.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.25.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_25-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_25-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_25-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.25.1.150700.17.17.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.25.1.150700.17.17.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.25.1.150700.17.17.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.25.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.25.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.25.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.25.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.25.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-15T11:09:08Z",
"details": "moderate"
}
],
"title": "CVE-2025-39822"
},
{
"cve": "CVE-2025-39859",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-39859"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nptp: ocp: fix use-after-free bugs causing by ptp_ocp_watchdog\n\nThe ptp_ocp_detach() only shuts down the watchdog timer if it is\npending. However, if the timer handler is already running, the\ntimer_delete_sync() is not called. This leads to race conditions\nwhere the devlink that contains the ptp_ocp is deallocated while\nthe timer handler is still accessing it, resulting in use-after-free\nbugs. The following details one of the race scenarios.\n\n(thread 1) | (thread 2)\nptp_ocp_remove() |\n ptp_ocp_detach() | ptp_ocp_watchdog()\n if (timer_pending(\u0026bp-\u003ewatchdog))| bp = timer_container_of()\n timer_delete_sync() |\n |\n devlink_free(devlink) //free |\n | bp-\u003e //use\n\nResolve this by unconditionally calling timer_delete_sync() to ensure\nthe timer is reliably deactivated, preventing any access after free.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_25-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_25-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_25-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.25.1.150700.17.17.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.25.1.150700.17.17.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.25.1.150700.17.17.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.25.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.25.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.25.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.25.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.25.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-39859",
"url": "https://www.suse.com/security/cve/CVE-2025-39859"
},
{
"category": "external",
"summary": "SUSE Bug 1250252 for CVE-2025-39859",
"url": "https://bugzilla.suse.com/1250252"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_25-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_25-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_25-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.25.1.150700.17.17.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.25.1.150700.17.17.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.25.1.150700.17.17.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.25.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.25.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.25.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.25.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.25.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_25-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_25-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_25-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.25.1.150700.17.17.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.25.1.150700.17.17.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.25.1.150700.17.17.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.25.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.25.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.25.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.25.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.25.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-15T11:09:08Z",
"details": "moderate"
}
],
"title": "CVE-2025-39859"
},
{
"cve": "CVE-2025-39944",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-39944"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nocteontx2-pf: Fix use-after-free bugs in otx2_sync_tstamp()\n\nThe original code relies on cancel_delayed_work() in otx2_ptp_destroy(),\nwhich does not ensure that the delayed work item synctstamp_work has fully\ncompleted if it was already running. This leads to use-after-free scenarios\nwhere otx2_ptp is deallocated by otx2_ptp_destroy(), while synctstamp_work\nremains active and attempts to dereference otx2_ptp in otx2_sync_tstamp().\nFurthermore, the synctstamp_work is cyclic, the likelihood of triggering\nthe bug is nonnegligible.\n\nA typical race condition is illustrated below:\n\nCPU 0 (cleanup) | CPU 1 (delayed work callback)\notx2_remove() |\n otx2_ptp_destroy() | otx2_sync_tstamp()\n cancel_delayed_work() |\n kfree(ptp) |\n | ptp = container_of(...); //UAF\n | ptp-\u003e //UAF\n\nThis is confirmed by a KASAN report:\n\nBUG: KASAN: slab-use-after-free in __run_timer_base.part.0+0x7d7/0x8c0\nWrite of size 8 at addr ffff88800aa09a18 by task bash/136\n...\nCall Trace:\n \u003cIRQ\u003e\n dump_stack_lvl+0x55/0x70\n print_report+0xcf/0x610\n ? __run_timer_base.part.0+0x7d7/0x8c0\n kasan_report+0xb8/0xf0\n ? __run_timer_base.part.0+0x7d7/0x8c0\n __run_timer_base.part.0+0x7d7/0x8c0\n ? __pfx___run_timer_base.part.0+0x10/0x10\n ? __pfx_read_tsc+0x10/0x10\n ? ktime_get+0x60/0x140\n ? lapic_next_event+0x11/0x20\n ? clockevents_program_event+0x1d4/0x2a0\n run_timer_softirq+0xd1/0x190\n handle_softirqs+0x16a/0x550\n irq_exit_rcu+0xaf/0xe0\n sysvec_apic_timer_interrupt+0x70/0x80\n \u003c/IRQ\u003e\n...\nAllocated by task 1:\n kasan_save_stack+0x24/0x50\n kasan_save_track+0x14/0x30\n __kasan_kmalloc+0x7f/0x90\n otx2_ptp_init+0xb1/0x860\n otx2_probe+0x4eb/0xc30\n local_pci_probe+0xdc/0x190\n pci_device_probe+0x2fe/0x470\n really_probe+0x1ca/0x5c0\n __driver_probe_device+0x248/0x310\n driver_probe_device+0x44/0x120\n __driver_attach+0xd2/0x310\n bus_for_each_dev+0xed/0x170\n bus_add_driver+0x208/0x500\n driver_register+0x132/0x460\n do_one_initcall+0x89/0x300\n kernel_init_freeable+0x40d/0x720\n kernel_init+0x1a/0x150\n ret_from_fork+0x10c/0x1a0\n ret_from_fork_asm+0x1a/0x30\n\nFreed by task 136:\n kasan_save_stack+0x24/0x50\n kasan_save_track+0x14/0x30\n kasan_save_free_info+0x3a/0x60\n __kasan_slab_free+0x3f/0x50\n kfree+0x137/0x370\n otx2_ptp_destroy+0x38/0x80\n otx2_remove+0x10d/0x4c0\n pci_device_remove+0xa6/0x1d0\n device_release_driver_internal+0xf8/0x210\n pci_stop_bus_device+0x105/0x150\n pci_stop_and_remove_bus_device_locked+0x15/0x30\n remove_store+0xcc/0xe0\n kernfs_fop_write_iter+0x2c3/0x440\n vfs_write+0x871/0xd70\n ksys_write+0xee/0x1c0\n do_syscall_64+0xac/0x280\n entry_SYSCALL_64_after_hwframe+0x77/0x7f\n...\n\nReplace cancel_delayed_work() with cancel_delayed_work_sync() to ensure\nthat the delayed work item is properly canceled before the otx2_ptp is\ndeallocated.\n\nThis bug was initially identified through static analysis. To reproduce\nand test it, I simulated the OcteonTX2 PCI device in QEMU and introduced\nartificial delays within the otx2_sync_tstamp() function to increase the\nlikelihood of triggering the bug.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_25-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_25-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_25-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.25.1.150700.17.17.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.25.1.150700.17.17.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.25.1.150700.17.17.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.25.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.25.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.25.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.25.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.25.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-39944",
"url": "https://www.suse.com/security/cve/CVE-2025-39944"
},
{
"category": "external",
"summary": "SUSE Bug 1251120 for CVE-2025-39944",
"url": "https://bugzilla.suse.com/1251120"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_25-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_25-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_25-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.25.1.150700.17.17.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.25.1.150700.17.17.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.25.1.150700.17.17.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.25.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.25.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.25.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.25.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.25.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_25-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_25-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_25-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.25.1.150700.17.17.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.25.1.150700.17.17.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.25.1.150700.17.17.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.25.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.25.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.25.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.25.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.25.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-15T11:09:08Z",
"details": "moderate"
}
],
"title": "CVE-2025-39944"
},
{
"cve": "CVE-2025-39980",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-39980"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnexthop: Forbid FDB status change while nexthop is in a group\n\nThe kernel forbids the creation of non-FDB nexthop groups with FDB\nnexthops:\n\n # ip nexthop add id 1 via 192.0.2.1 fdb\n # ip nexthop add id 2 group 1\n Error: Non FDB nexthop group cannot have fdb nexthops.\n\nAnd vice versa:\n\n # ip nexthop add id 3 via 192.0.2.2 dev dummy1\n # ip nexthop add id 4 group 3 fdb\n Error: FDB nexthop group can only have fdb nexthops.\n\nHowever, as long as no routes are pointing to a non-FDB nexthop group,\nthe kernel allows changing the type of a nexthop from FDB to non-FDB and\nvice versa:\n\n # ip nexthop add id 5 via 192.0.2.2 dev dummy1\n # ip nexthop add id 6 group 5\n # ip nexthop replace id 5 via 192.0.2.2 fdb\n # echo $?\n 0\n\nThis configuration is invalid and can result in a NPD [1] since FDB\nnexthops are not associated with a nexthop device:\n\n # ip route add 198.51.100.1/32 nhid 6\n # ping 198.51.100.1\n\nFix by preventing nexthop FDB status change while the nexthop is in a\ngroup:\n\n # ip nexthop add id 7 via 192.0.2.2 dev dummy1\n # ip nexthop add id 8 group 7\n # ip nexthop replace id 7 via 192.0.2.2 fdb\n Error: Cannot change nexthop FDB status while in a group.\n\n[1]\nBUG: kernel NULL pointer dereference, address: 00000000000003c0\n[...]\nOops: Oops: 0000 [#1] SMP\nCPU: 6 UID: 0 PID: 367 Comm: ping Not tainted 6.17.0-rc6-virtme-gb65678cacc03 #1 PREEMPT(voluntary)\nHardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.17.0-4.fc41 04/01/2014\nRIP: 0010:fib_lookup_good_nhc+0x1e/0x80\n[...]\nCall Trace:\n \u003cTASK\u003e\n fib_table_lookup+0x541/0x650\n ip_route_output_key_hash_rcu+0x2ea/0x970\n ip_route_output_key_hash+0x55/0x80\n __ip4_datagram_connect+0x250/0x330\n udp_connect+0x2b/0x60\n __sys_connect+0x9c/0xd0\n __x64_sys_connect+0x18/0x20\n do_syscall_64+0xa4/0x2a0\n entry_SYSCALL_64_after_hwframe+0x4b/0x53",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_25-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_25-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_25-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.25.1.150700.17.17.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.25.1.150700.17.17.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.25.1.150700.17.17.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.25.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.25.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.25.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.25.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.25.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-39980",
"url": "https://www.suse.com/security/cve/CVE-2025-39980"
},
{
"category": "external",
"summary": "SUSE Bug 1252063 for CVE-2025-39980",
"url": "https://bugzilla.suse.com/1252063"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_25-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_25-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_25-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.25.1.150700.17.17.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.25.1.150700.17.17.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.25.1.150700.17.17.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.25.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.25.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.25.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.25.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.25.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_25-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_25-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_25-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.25.1.150700.17.17.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.25.1.150700.17.17.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.25.1.150700.17.17.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.25.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.25.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.25.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.25.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.25.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-15T11:09:08Z",
"details": "moderate"
}
],
"title": "CVE-2025-39980"
},
{
"cve": "CVE-2025-40001",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40001"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nscsi: mvsas: Fix use-after-free bugs in mvs_work_queue\n\nDuring the detaching of Marvell\u0027s SAS/SATA controller, the original code\ncalls cancel_delayed_work() in mvs_free() to cancel the delayed work\nitem mwq-\u003ework_q. However, if mwq-\u003ework_q is already running, the\ncancel_delayed_work() may fail to cancel it. This can lead to\nuse-after-free scenarios where mvs_free() frees the mvs_info while\nmvs_work_queue() is still executing and attempts to access the\nalready-freed mvs_info.\n\nA typical race condition is illustrated below:\n\nCPU 0 (remove) | CPU 1 (delayed work callback)\nmvs_pci_remove() |\n mvs_free() | mvs_work_queue()\n cancel_delayed_work() |\n kfree(mvi) |\n | mvi-\u003e // UAF\n\nReplace cancel_delayed_work() with cancel_delayed_work_sync() to ensure\nthat the delayed work item is properly canceled and any executing\ndelayed work item completes before the mvs_info is deallocated.\n\nThis bug was found by static analysis.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_25-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_25-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_25-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.25.1.150700.17.17.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.25.1.150700.17.17.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.25.1.150700.17.17.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.25.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.25.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.25.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.25.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.25.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40001",
"url": "https://www.suse.com/security/cve/CVE-2025-40001"
},
{
"category": "external",
"summary": "SUSE Bug 1252303 for CVE-2025-40001",
"url": "https://bugzilla.suse.com/1252303"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_25-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_25-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_25-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.25.1.150700.17.17.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.25.1.150700.17.17.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.25.1.150700.17.17.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.25.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.25.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.25.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.25.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.25.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.8,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_25-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_25-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_25-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.25.1.150700.17.17.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.25.1.150700.17.17.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.25.1.150700.17.17.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.25.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.25.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.25.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.25.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.25.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-15T11:09:08Z",
"details": "moderate"
}
],
"title": "CVE-2025-40001"
},
{
"cve": "CVE-2025-40021",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40021"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\ntracing: dynevent: Add a missing lockdown check on dynevent\n\nSince dynamic_events interface on tracefs is compatible with\nkprobe_events and uprobe_events, it should also check the lockdown\nstatus and reject if it is set.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_25-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_25-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_25-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.25.1.150700.17.17.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.25.1.150700.17.17.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.25.1.150700.17.17.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.25.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.25.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.25.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.25.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.25.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40021",
"url": "https://www.suse.com/security/cve/CVE-2025-40021"
},
{
"category": "external",
"summary": "SUSE Bug 1252681 for CVE-2025-40021",
"url": "https://bugzilla.suse.com/1252681"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_25-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_25-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_25-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.25.1.150700.17.17.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.25.1.150700.17.17.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.25.1.150700.17.17.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.25.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.25.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.25.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.25.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.25.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_25-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_25-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_25-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.25.1.150700.17.17.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.25.1.150700.17.17.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.25.1.150700.17.17.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.25.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.25.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.25.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.25.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.25.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-15T11:09:08Z",
"details": "moderate"
}
],
"title": "CVE-2025-40021"
},
{
"cve": "CVE-2025-40027",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40027"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnet/9p: fix double req put in p9_fd_cancelled\n\nSyzkaller reports a KASAN issue as below:\n\ngeneral protection fault, probably for non-canonical address 0xfbd59c0000000021: 0000 [#1] PREEMPT SMP KASAN NOPTI\nKASAN: maybe wild-memory-access in range [0xdead000000000108-0xdead00000000010f]\nCPU: 0 PID: 5083 Comm: syz-executor.2 Not tainted 6.1.134-syzkaller-00037-g855bd1d7d838 #0\nHardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014\nRIP: 0010:__list_del include/linux/list.h:114 [inline]\nRIP: 0010:__list_del_entry include/linux/list.h:137 [inline]\nRIP: 0010:list_del include/linux/list.h:148 [inline]\nRIP: 0010:p9_fd_cancelled+0xe9/0x200 net/9p/trans_fd.c:734\n\nCall Trace:\n \u003cTASK\u003e\n p9_client_flush+0x351/0x440 net/9p/client.c:614\n p9_client_rpc+0xb6b/0xc70 net/9p/client.c:734\n p9_client_version net/9p/client.c:920 [inline]\n p9_client_create+0xb51/0x1240 net/9p/client.c:1027\n v9fs_session_init+0x1f0/0x18f0 fs/9p/v9fs.c:408\n v9fs_mount+0xba/0xcb0 fs/9p/vfs_super.c:126\n legacy_get_tree+0x108/0x220 fs/fs_context.c:632\n vfs_get_tree+0x8e/0x300 fs/super.c:1573\n do_new_mount fs/namespace.c:3056 [inline]\n path_mount+0x6a6/0x1e90 fs/namespace.c:3386\n do_mount fs/namespace.c:3399 [inline]\n __do_sys_mount fs/namespace.c:3607 [inline]\n __se_sys_mount fs/namespace.c:3584 [inline]\n __x64_sys_mount+0x283/0x300 fs/namespace.c:3584\n do_syscall_x64 arch/x86/entry/common.c:51 [inline]\n do_syscall_64+0x35/0x80 arch/x86/entry/common.c:81\n entry_SYSCALL_64_after_hwframe+0x6e/0xd8\n\nThis happens because of a race condition between:\n\n- The 9p client sending an invalid flush request and later cleaning it up;\n- The 9p client in p9_read_work() canceled all pending requests.\n\n Thread 1 Thread 2\n ...\n p9_client_create()\n ...\n p9_fd_create()\n ...\n p9_conn_create()\n ...\n // start Thread 2\n INIT_WORK(\u0026m-\u003erq, p9_read_work);\n p9_read_work()\n ...\n p9_client_rpc()\n ...\n ...\n p9_conn_cancel()\n ...\n spin_lock(\u0026m-\u003ereq_lock);\n ...\n p9_fd_cancelled()\n ...\n ...\n spin_unlock(\u0026m-\u003ereq_lock);\n // status rewrite\n p9_client_cb(m-\u003eclient, req, REQ_STATUS_ERROR)\n // first remove\n list_del(\u0026req-\u003ereq_list);\n ...\n\n spin_lock(\u0026m-\u003ereq_lock)\n ...\n // second remove\n list_del(\u0026req-\u003ereq_list);\n spin_unlock(\u0026m-\u003ereq_lock)\n ...\n\nCommit 74d6a5d56629 (\"9p/trans_fd: Fix concurrency del of req_list in\np9_fd_cancelled/p9_read_work\") fixes a concurrency issue in the 9p filesystem\nclient where the req_list could be deleted simultaneously by both\np9_read_work and p9_fd_cancelled functions, but for the case where req-\u003estatus\nequals REQ_STATUS_RCVD.\n\nUpdate the check for req-\u003estatus in p9_fd_cancelled to skip processing not\njust received requests, but anything that is not SENT, as whatever\nchanged the state from SENT also removed the request from its list.\n\nFound by Linux Verification Center (linuxtesting.org) with Syzkaller.\n\n[updated the check from status == RECV || status == ERROR to status != SENT]",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_25-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_25-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_25-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.25.1.150700.17.17.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.25.1.150700.17.17.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.25.1.150700.17.17.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.25.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.25.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.25.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.25.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.25.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40027",
"url": "https://www.suse.com/security/cve/CVE-2025-40027"
},
{
"category": "external",
"summary": "SUSE Bug 1252763 for CVE-2025-40027",
"url": "https://bugzilla.suse.com/1252763"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_25-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_25-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_25-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.25.1.150700.17.17.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.25.1.150700.17.17.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.25.1.150700.17.17.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.25.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.25.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.25.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.25.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.25.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_25-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_25-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_25-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.25.1.150700.17.17.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.25.1.150700.17.17.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.25.1.150700.17.17.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.25.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.25.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.25.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.25.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.25.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-15T11:09:08Z",
"details": "moderate"
}
],
"title": "CVE-2025-40027"
},
{
"cve": "CVE-2025-40030",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40030"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\npinctrl: check the return value of pinmux_ops::get_function_name()\n\nWhile the API contract in docs doesn\u0027t specify it explicitly, the\ngeneric implementation of the get_function_name() callback from struct\npinmux_ops - pinmux_generic_get_function_name() - can fail and return\nNULL. This is already checked in pinmux_check_ops() so add a similar\ncheck in pinmux_func_name_to_selector() instead of passing the returned\npointer right down to strcmp() where the NULL can get dereferenced. This\nis normal operation when adding new pinfunctions.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_25-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_25-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_25-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.25.1.150700.17.17.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.25.1.150700.17.17.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.25.1.150700.17.17.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.25.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.25.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.25.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.25.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.25.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40030",
"url": "https://www.suse.com/security/cve/CVE-2025-40030"
},
{
"category": "external",
"summary": "SUSE Bug 1252773 for CVE-2025-40030",
"url": "https://bugzilla.suse.com/1252773"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_25-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_25-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_25-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.25.1.150700.17.17.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.25.1.150700.17.17.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.25.1.150700.17.17.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.25.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.25.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.25.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.25.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.25.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_25-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_25-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_25-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.25.1.150700.17.17.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.25.1.150700.17.17.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.25.1.150700.17.17.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.25.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.25.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.25.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.25.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.25.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-15T11:09:08Z",
"details": "moderate"
}
],
"title": "CVE-2025-40030"
},
{
"cve": "CVE-2025-40038",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40038"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nKVM: SVM: Skip fastpath emulation on VM-Exit if next RIP isn\u0027t valid\n\nSkip the WRMSR and HLT fastpaths in SVM\u0027s VM-Exit handler if the next RIP\nisn\u0027t valid, e.g. because KVM is running with nrips=false. SVM must\ndecode and emulate to skip the instruction if the CPU doesn\u0027t provide the\nnext RIP, and getting the instruction bytes to decode requires reading\nguest memory. Reading guest memory through the emulator can fault, i.e.\ncan sleep, which is disallowed since the fastpath handlers run with IRQs\ndisabled.\n\n BUG: sleeping function called from invalid context at ./include/linux/uaccess.h:106\n in_atomic(): 1, irqs_disabled(): 1, non_block: 0, pid: 32611, name: qemu\n preempt_count: 1, expected: 0\n INFO: lockdep is turned off.\n irq event stamp: 30580\n hardirqs last enabled at (30579): [\u003cffffffffc08b2527\u003e] vcpu_run+0x1787/0x1db0 [kvm]\n hardirqs last disabled at (30580): [\u003cffffffffb4f62e32\u003e] __schedule+0x1e2/0xed0\n softirqs last enabled at (30570): [\u003cffffffffb4247a64\u003e] fpu_swap_kvm_fpstate+0x44/0x210\n softirqs last disabled at (30568): [\u003cffffffffb4247a64\u003e] fpu_swap_kvm_fpstate+0x44/0x210\n CPU: 298 UID: 0 PID: 32611 Comm: qemu Tainted: G U 6.16.0-smp--e6c618b51cfe-sleep #782 NONE\n Tainted: [U]=USER\n Hardware name: Google Astoria-Turin/astoria, BIOS 0.20241223.2-0 01/17/2025\n Call Trace:\n \u003cTASK\u003e\n dump_stack_lvl+0x7d/0xb0\n __might_resched+0x271/0x290\n __might_fault+0x28/0x80\n kvm_vcpu_read_guest_page+0x8d/0xc0 [kvm]\n kvm_fetch_guest_virt+0x92/0xc0 [kvm]\n __do_insn_fetch_bytes+0xf3/0x1e0 [kvm]\n x86_decode_insn+0xd1/0x1010 [kvm]\n x86_emulate_instruction+0x105/0x810 [kvm]\n __svm_skip_emulated_instruction+0xc4/0x140 [kvm_amd]\n handle_fastpath_invd+0xc4/0x1a0 [kvm]\n vcpu_run+0x11a1/0x1db0 [kvm]\n kvm_arch_vcpu_ioctl_run+0x5cc/0x730 [kvm]\n kvm_vcpu_ioctl+0x578/0x6a0 [kvm]\n __se_sys_ioctl+0x6d/0xb0\n do_syscall_64+0x8a/0x2c0\n entry_SYSCALL_64_after_hwframe+0x4b/0x53\n RIP: 0033:0x7f479d57a94b\n \u003c/TASK\u003e\n\nNote, this is essentially a reapply of commit 5c30e8101e8d (\"KVM: SVM:\nSkip WRMSR fastpath on VM-Exit if next RIP isn\u0027t valid\"), but with\ndifferent justification (KVM now grabs SRCU when skipping the instruction\nfor other reasons).",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_25-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_25-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_25-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.25.1.150700.17.17.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.25.1.150700.17.17.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.25.1.150700.17.17.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.25.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.25.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.25.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.25.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.25.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40038",
"url": "https://www.suse.com/security/cve/CVE-2025-40038"
},
{
"category": "external",
"summary": "SUSE Bug 1252817 for CVE-2025-40038",
"url": "https://bugzilla.suse.com/1252817"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_25-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_25-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_25-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.25.1.150700.17.17.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.25.1.150700.17.17.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.25.1.150700.17.17.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.25.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.25.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.25.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.25.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.25.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_25-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_25-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_25-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.25.1.150700.17.17.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.25.1.150700.17.17.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.25.1.150700.17.17.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.25.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.25.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.25.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.25.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.25.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-15T11:09:08Z",
"details": "moderate"
}
],
"title": "CVE-2025-40038"
},
{
"cve": "CVE-2025-40040",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40040"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nmm/ksm: fix flag-dropping behavior in ksm_madvise\n\nsyzkaller discovered the following crash: (kernel BUG)\n\n[ 44.607039] ------------[ cut here ]------------\n[ 44.607422] kernel BUG at mm/userfaultfd.c:2067!\n[ 44.608148] Oops: invalid opcode: 0000 [#1] SMP DEBUG_PAGEALLOC KASAN NOPTI\n[ 44.608814] CPU: 1 UID: 0 PID: 2475 Comm: reproducer Not tainted 6.16.0-rc6 #1 PREEMPT(none)\n[ 44.609635] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.16.3-0-ga6ed6b701f0a-prebuilt.qemu.org 04/01/2014\n[ 44.610695] RIP: 0010:userfaultfd_release_all+0x3a8/0x460\n\n\u003csnip other registers, drop unreliable trace\u003e\n\n[ 44.617726] Call Trace:\n[ 44.617926] \u003cTASK\u003e\n[ 44.619284] userfaultfd_release+0xef/0x1b0\n[ 44.620976] __fput+0x3f9/0xb60\n[ 44.621240] fput_close_sync+0x110/0x210\n[ 44.622222] __x64_sys_close+0x8f/0x120\n[ 44.622530] do_syscall_64+0x5b/0x2f0\n[ 44.622840] entry_SYSCALL_64_after_hwframe+0x76/0x7e\n[ 44.623244] RIP: 0033:0x7f365bb3f227\n\nKernel panics because it detects UFFD inconsistency during\nuserfaultfd_release_all(). Specifically, a VMA which has a valid pointer\nto vma-\u003evm_userfaultfd_ctx, but no UFFD flags in vma-\u003evm_flags.\n\nThe inconsistency is caused in ksm_madvise(): when user calls madvise()\nwith MADV_UNMEARGEABLE on a VMA that is registered for UFFD in MINOR mode,\nit accidentally clears all flags stored in the upper 32 bits of\nvma-\u003evm_flags.\n\nAssuming x86_64 kernel build, unsigned long is 64-bit and unsigned int and\nint are 32-bit wide. This setup causes the following mishap during the \u0026=\n~VM_MERGEABLE assignment.\n\nVM_MERGEABLE is a 32-bit constant of type unsigned int, 0x8000\u00270000. \nAfter ~ is applied, it becomes 0x7fff\u0027ffff unsigned int, which is then\npromoted to unsigned long before the \u0026 operation. This promotion fills\nupper 32 bits with leading 0s, as we\u0027re doing unsigned conversion (and\neven for a signed conversion, this wouldn\u0027t help as the leading bit is 0).\n\u0026 operation thus ends up AND-ing vm_flags with 0x0000\u00270000\u00277fff\u0027ffff\ninstead of intended 0xffff\u0027ffff\u00277fff\u0027ffff and hence accidentally clears\nthe upper 32-bits of its value.\n\nFix it by changing `VM_MERGEABLE` constant to unsigned long, using the\nBIT() macro.\n\nNote: other VM_* flags are not affected: This only happens to the\nVM_MERGEABLE flag, as the other VM_* flags are all constants of type int\nand after ~ operation, they end up with leading 1 and are thus converted\nto unsigned long with leading 1s.\n\nNote 2:\nAfter commit 31defc3b01d9 (\"userfaultfd: remove (VM_)BUG_ON()s\"), this is\nno longer a kernel BUG, but a WARNING at the same place:\n\n[ 45.595973] WARNING: CPU: 1 PID: 2474 at mm/userfaultfd.c:2067\n\nbut the root-cause (flag-drop) remains the same.\n\n[akpm@linux-foundation.org: rust bindgen wasn\u0027t able to handle BIT(), from Miguel]",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_25-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_25-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_25-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.25.1.150700.17.17.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.25.1.150700.17.17.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.25.1.150700.17.17.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.25.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.25.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.25.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.25.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.25.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40040",
"url": "https://www.suse.com/security/cve/CVE-2025-40040"
},
{
"category": "external",
"summary": "SUSE Bug 1252780 for CVE-2025-40040",
"url": "https://bugzilla.suse.com/1252780"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_25-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_25-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_25-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.25.1.150700.17.17.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.25.1.150700.17.17.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.25.1.150700.17.17.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.25.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.25.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.25.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.25.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.25.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_25-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_25-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_25-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.25.1.150700.17.17.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.25.1.150700.17.17.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.25.1.150700.17.17.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.25.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.25.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.25.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.25.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.25.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-15T11:09:08Z",
"details": "moderate"
}
],
"title": "CVE-2025-40040"
},
{
"cve": "CVE-2025-40047",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40047"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nio_uring/waitid: always prune wait queue entry in io_waitid_wait()\n\nFor a successful return, always remove our entry from the wait queue\nentry list. Previously this was skipped if a cancelation was in\nprogress, but this can race with another invocation of the wait queue\nentry callback.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_25-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_25-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_25-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.25.1.150700.17.17.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.25.1.150700.17.17.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.25.1.150700.17.17.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.25.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.25.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.25.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.25.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.25.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40047",
"url": "https://www.suse.com/security/cve/CVE-2025-40047"
},
{
"category": "external",
"summary": "SUSE Bug 1252790 for CVE-2025-40047",
"url": "https://bugzilla.suse.com/1252790"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_25-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_25-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_25-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.25.1.150700.17.17.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.25.1.150700.17.17.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.25.1.150700.17.17.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.25.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.25.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.25.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.25.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.25.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.7,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_25-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_25-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_25-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.25.1.150700.17.17.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.25.1.150700.17.17.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.25.1.150700.17.17.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.25.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.25.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.25.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.25.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.25.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-15T11:09:08Z",
"details": "moderate"
}
],
"title": "CVE-2025-40047"
},
{
"cve": "CVE-2025-40048",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40048"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nuio_hv_generic: Let userspace take care of interrupt mask\n\nRemove the logic to set interrupt mask by default in uio_hv_generic\ndriver as the interrupt mask value is supposed to be controlled\ncompletely by the user space. If the mask bit gets changed\nby the driver, concurrently with user mode operating on the ring,\nthe mask bit may be set when it is supposed to be clear, and the\nuser-mode driver will miss an interrupt which will cause a hang.\n\nFor eg- when the driver sets inbound ring buffer interrupt mask to 1,\nthe host does not interrupt the guest on the UIO VMBus channel.\nHowever, setting the mask does not prevent the host from putting a\nmessage in the inbound ring buffer. So let\u0027s assume that happens,\nthe host puts a message into the ring buffer but does not interrupt.\n\nSubsequently, the user space code in the guest sets the inbound ring\nbuffer interrupt mask to 0, saying \"Hey, I\u0027m ready for interrupts\".\nUser space code then calls pread() to wait for an interrupt.\nThen one of two things happens:\n\n* The host never sends another message. So the pread() waits forever.\n* The host does send another message. But because there\u0027s already a\n message in the ring buffer, it doesn\u0027t generate an interrupt.\n This is the correct behavior, because the host should only send an\n interrupt when the inbound ring buffer transitions from empty to\n not-empty. Adding an additional message to a ring buffer that is not\n empty is not supposed to generate an interrupt on the guest.\n Since the guest is waiting in pread() and not removing messages from\n the ring buffer, the pread() waits forever.\n\nThis could be easily reproduced in hv_fcopy_uio_daemon if we delay\nsetting interrupt mask to 0.\n\nSimilarly if hv_uio_channel_cb() sets the interrupt_mask to 1,\nthere\u0027s a race condition. Once user space empties the inbound ring\nbuffer, but before user space sets interrupt_mask to 0, the host could\nput another message in the ring buffer but it wouldn\u0027t interrupt.\nThen the next pread() would hang.\n\nFix these by removing all instances where interrupt_mask is changed,\nwhile keeping the one in set_event() unchanged to enable userspace\ncontrol the interrupt mask by writing 0/1 to /dev/uioX.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_25-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_25-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_25-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.25.1.150700.17.17.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.25.1.150700.17.17.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.25.1.150700.17.17.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.25.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.25.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.25.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.25.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.25.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40048",
"url": "https://www.suse.com/security/cve/CVE-2025-40048"
},
{
"category": "external",
"summary": "SUSE Bug 1252862 for CVE-2025-40048",
"url": "https://bugzilla.suse.com/1252862"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_25-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_25-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_25-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.25.1.150700.17.17.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.25.1.150700.17.17.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.25.1.150700.17.17.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.25.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.25.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.25.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.25.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.25.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_25-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_25-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_25-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.25.1.150700.17.17.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.25.1.150700.17.17.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.25.1.150700.17.17.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.25.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.25.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.25.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.25.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.25.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-15T11:09:08Z",
"details": "moderate"
}
],
"title": "CVE-2025-40048"
},
{
"cve": "CVE-2025-40055",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40055"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nocfs2: fix double free in user_cluster_connect()\n\nuser_cluster_disconnect() frees \"conn-\u003ecc_private\" which is \"lc\" but then\nthe error handling frees \"lc\" a second time. Set \"lc\" to NULL on this\npath to avoid a double free.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_25-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_25-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_25-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.25.1.150700.17.17.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.25.1.150700.17.17.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.25.1.150700.17.17.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.25.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.25.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.25.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.25.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.25.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40055",
"url": "https://www.suse.com/security/cve/CVE-2025-40055"
},
{
"category": "external",
"summary": "SUSE Bug 1252821 for CVE-2025-40055",
"url": "https://bugzilla.suse.com/1252821"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_25-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_25-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_25-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.25.1.150700.17.17.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.25.1.150700.17.17.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.25.1.150700.17.17.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.25.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.25.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.25.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.25.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.25.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_25-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_25-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_25-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.25.1.150700.17.17.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.25.1.150700.17.17.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.25.1.150700.17.17.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.25.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.25.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.25.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.25.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.25.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-15T11:09:08Z",
"details": "moderate"
}
],
"title": "CVE-2025-40055"
},
{
"cve": "CVE-2025-40059",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40059"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\ncoresight: Fix incorrect handling for return value of devm_kzalloc\n\nThe return value of devm_kzalloc could be an null pointer,\nuse \"!desc.pdata\" to fix incorrect handling return value\nof devm_kzalloc.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_25-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_25-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_25-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.25.1.150700.17.17.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.25.1.150700.17.17.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.25.1.150700.17.17.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.25.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.25.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.25.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.25.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.25.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40059",
"url": "https://www.suse.com/security/cve/CVE-2025-40059"
},
{
"category": "external",
"summary": "SUSE Bug 1252809 for CVE-2025-40059",
"url": "https://bugzilla.suse.com/1252809"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_25-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_25-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_25-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.25.1.150700.17.17.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.25.1.150700.17.17.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.25.1.150700.17.17.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.25.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.25.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.25.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.25.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.25.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_25-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_25-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_25-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.25.1.150700.17.17.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.25.1.150700.17.17.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.25.1.150700.17.17.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.25.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.25.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.25.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.25.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.25.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-15T11:09:08Z",
"details": "moderate"
}
],
"title": "CVE-2025-40059"
},
{
"cve": "CVE-2025-40064",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40064"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nsmc: Fix use-after-free in __pnet_find_base_ndev().\n\nsyzbot reported use-after-free of net_device in __pnet_find_base_ndev(),\nwhich was called during connect(). [0]\n\nsmc_pnet_find_ism_resource() fetches sk_dst_get(sk)-\u003edev and passes\ndown to pnet_find_base_ndev(), where RTNL is held. Then, UAF happened\nat __pnet_find_base_ndev() when the dev is first used.\n\nThis means dev had already been freed before acquiring RTNL in\npnet_find_base_ndev().\n\nWhile dev is going away, dst-\u003edev could be swapped with blackhole_netdev,\nand the dev\u0027s refcnt by dst will be released.\n\nWe must hold dev\u0027s refcnt before calling smc_pnet_find_ism_resource().\n\nAlso, smc_pnet_find_roce_resource() has the same problem.\n\nLet\u0027s use __sk_dst_get() and dst_dev_rcu() in the two functions.\n\n[0]:\nBUG: KASAN: use-after-free in __pnet_find_base_ndev+0x1b1/0x1c0 net/smc/smc_pnet.c:926\nRead of size 1 at addr ffff888036bac33a by task syz.0.3632/18609\n\nCPU: 1 UID: 0 PID: 18609 Comm: syz.0.3632 Not tainted syzkaller #0 PREEMPT(full)\nHardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/18/2025\nCall Trace:\n \u003cTASK\u003e\n dump_stack_lvl+0x189/0x250 lib/dump_stack.c:120\n print_address_description mm/kasan/report.c:378 [inline]\n print_report+0xca/0x240 mm/kasan/report.c:482\n kasan_report+0x118/0x150 mm/kasan/report.c:595\n __pnet_find_base_ndev+0x1b1/0x1c0 net/smc/smc_pnet.c:926\n pnet_find_base_ndev net/smc/smc_pnet.c:946 [inline]\n smc_pnet_find_ism_by_pnetid net/smc/smc_pnet.c:1103 [inline]\n smc_pnet_find_ism_resource+0xef/0x390 net/smc/smc_pnet.c:1154\n smc_find_ism_device net/smc/af_smc.c:1030 [inline]\n smc_find_proposal_devices net/smc/af_smc.c:1115 [inline]\n __smc_connect+0x372/0x1890 net/smc/af_smc.c:1545\n smc_connect+0x877/0xd90 net/smc/af_smc.c:1715\n __sys_connect_file net/socket.c:2086 [inline]\n __sys_connect+0x313/0x440 net/socket.c:2105\n __do_sys_connect net/socket.c:2111 [inline]\n __se_sys_connect net/socket.c:2108 [inline]\n __x64_sys_connect+0x7a/0x90 net/socket.c:2108\n do_syscall_x64 arch/x86/entry/syscall_64.c:63 [inline]\n do_syscall_64+0xfa/0x3b0 arch/x86/entry/syscall_64.c:94\n entry_SYSCALL_64_after_hwframe+0x77/0x7f\nRIP: 0033:0x7f47cbf8eba9\nCode: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 \u003c48\u003e 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48\nRSP: 002b:00007f47ccdb1038 EFLAGS: 00000246 ORIG_RAX: 000000000000002a\nRAX: ffffffffffffffda RBX: 00007f47cc1d5fa0 RCX: 00007f47cbf8eba9\nRDX: 0000000000000010 RSI: 0000200000000280 RDI: 000000000000000b\nRBP: 00007f47cc011e19 R08: 0000000000000000 R09: 0000000000000000\nR10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000\nR13: 00007f47cc1d6038 R14: 00007f47cc1d5fa0 R15: 00007ffc512f8aa8\n \u003c/TASK\u003e\n\nThe buggy address belongs to the physical page:\npage: refcount:0 mapcount:0 mapping:0000000000000000 index:0xffff888036bacd00 pfn:0x36bac\nflags: 0xfff00000000000(node=0|zone=1|lastcpupid=0x7ff)\nraw: 00fff00000000000 ffffea0001243d08 ffff8880b863fdc0 0000000000000000\nraw: ffff888036bacd00 0000000000000000 00000000ffffffff 0000000000000000\npage dumped because: kasan: bad access detected\npage_owner tracks the page as freed\npage last allocated via order 2, migratetype Unmovable, gfp_mask 0x446dc0(GFP_KERNEL_ACCOUNT|__GFP_ZERO|__GFP_NOWARN|__GFP_RETRY_MAYFAIL|__GFP_COMP), pid 16741, tgid 16741 (syz-executor), ts 343313197788, free_ts 380670750466\n set_page_owner include/linux/page_owner.h:32 [inline]\n post_alloc_hook+0x240/0x2a0 mm/page_alloc.c:1851\n prep_new_page mm/page_alloc.c:1859 [inline]\n get_page_from_freelist+0x21e4/0x22c0 mm/page_alloc.c:3858\n __alloc_frozen_pages_noprof+0x181/0x370 mm/page_alloc.c:5148\n alloc_pages_mpol+0x232/0x4a0 mm/mempolicy.c:2416\n ___kmalloc_large_node+0x5f/0x1b0 mm/slub.c:4317\n __kmalloc_large_node_noprof+0x18/0x90 mm/slub.c:4348\n __do_kmalloc_node mm/slub.c:4364 [inline]\n __kvmalloc_node\n---truncated---",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_25-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_25-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_25-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.25.1.150700.17.17.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.25.1.150700.17.17.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.25.1.150700.17.17.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.25.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.25.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.25.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.25.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.25.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40064",
"url": "https://www.suse.com/security/cve/CVE-2025-40064"
},
{
"category": "external",
"summary": "SUSE Bug 1252845 for CVE-2025-40064",
"url": "https://bugzilla.suse.com/1252845"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_25-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_25-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_25-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.25.1.150700.17.17.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.25.1.150700.17.17.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.25.1.150700.17.17.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.25.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.25.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.25.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.25.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.25.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_25-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_25-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_25-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.25.1.150700.17.17.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.25.1.150700.17.17.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.25.1.150700.17.17.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.25.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.25.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.25.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.25.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.25.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-15T11:09:08Z",
"details": "moderate"
}
],
"title": "CVE-2025-40064"
},
{
"cve": "CVE-2025-40070",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40070"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\npps: fix warning in pps_register_cdev when register device fail\n\nSimilar to previous commit 2a934fdb01db (\"media: v4l2-dev: fix error\nhandling in __video_register_device()\"), the release hook should be set\nbefore device_register(). Otherwise, when device_register() return error\nand put_device() try to callback the release function, the below warning\nmay happen.\n\n ------------[ cut here ]------------\n WARNING: CPU: 1 PID: 4760 at drivers/base/core.c:2567 device_release+0x1bd/0x240 drivers/base/core.c:2567\n Modules linked in:\n CPU: 1 UID: 0 PID: 4760 Comm: syz.4.914 Not tainted 6.17.0-rc3+ #1 NONE\n RIP: 0010:device_release+0x1bd/0x240 drivers/base/core.c:2567\n Call Trace:\n \u003cTASK\u003e\n kobject_cleanup+0x136/0x410 lib/kobject.c:689\n kobject_release lib/kobject.c:720 [inline]\n kref_put include/linux/kref.h:65 [inline]\n kobject_put+0xe9/0x130 lib/kobject.c:737\n put_device+0x24/0x30 drivers/base/core.c:3797\n pps_register_cdev+0x2da/0x370 drivers/pps/pps.c:402\n pps_register_source+0x2f6/0x480 drivers/pps/kapi.c:108\n pps_tty_open+0x190/0x310 drivers/pps/clients/pps-ldisc.c:57\n tty_ldisc_open+0xa7/0x120 drivers/tty/tty_ldisc.c:432\n tty_set_ldisc+0x333/0x780 drivers/tty/tty_ldisc.c:563\n tiocsetd drivers/tty/tty_io.c:2429 [inline]\n tty_ioctl+0x5d1/0x1700 drivers/tty/tty_io.c:2728\n vfs_ioctl fs/ioctl.c:51 [inline]\n __do_sys_ioctl fs/ioctl.c:598 [inline]\n __se_sys_ioctl fs/ioctl.c:584 [inline]\n __x64_sys_ioctl+0x194/0x210 fs/ioctl.c:584\n do_syscall_x64 arch/x86/entry/syscall_64.c:63 [inline]\n do_syscall_64+0x5f/0x2a0 arch/x86/entry/syscall_64.c:94\n entry_SYSCALL_64_after_hwframe+0x76/0x7e\n \u003c/TASK\u003e\n\nBefore commit c79a39dc8d06 (\"pps: Fix a use-after-free\"),\npps_register_cdev() call device_create() to create pps-\u003edev, which will\ninit dev-\u003erelease to device_create_release(). Now the comment is outdated,\njust remove it.\n\nThanks for the reminder from Calvin Owens, \u0027kfree_pps\u0027 should be removed\nin pps_register_source() to avoid a double free in the failure case.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_25-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_25-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_25-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.25.1.150700.17.17.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.25.1.150700.17.17.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.25.1.150700.17.17.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.25.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.25.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.25.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.25.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.25.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40070",
"url": "https://www.suse.com/security/cve/CVE-2025-40070"
},
{
"category": "external",
"summary": "SUSE Bug 1252836 for CVE-2025-40070",
"url": "https://bugzilla.suse.com/1252836"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_25-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_25-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_25-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.25.1.150700.17.17.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.25.1.150700.17.17.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.25.1.150700.17.17.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.25.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.25.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.25.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.25.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.25.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_25-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_25-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_25-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.25.1.150700.17.17.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.25.1.150700.17.17.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.25.1.150700.17.17.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.25.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.25.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.25.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.25.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.25.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-15T11:09:08Z",
"details": "moderate"
}
],
"title": "CVE-2025-40070"
},
{
"cve": "CVE-2025-40074",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40074"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nipv4: start using dst_dev_rcu()\n\nChange icmpv4_xrlim_allow(), ip_defrag() to prevent possible UAF.\n\nChange ipmr_prepare_xmit(), ipmr_queue_fwd_xmit(), ip_mr_output(),\nipv4_neigh_lookup() to use lockdep enabled dst_dev_rcu().",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_25-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_25-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_25-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.25.1.150700.17.17.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.25.1.150700.17.17.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.25.1.150700.17.17.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.25.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.25.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.25.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.25.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.25.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40074",
"url": "https://www.suse.com/security/cve/CVE-2025-40074"
},
{
"category": "external",
"summary": "SUSE Bug 1252794 for CVE-2025-40074",
"url": "https://bugzilla.suse.com/1252794"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_25-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_25-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_25-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.25.1.150700.17.17.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.25.1.150700.17.17.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.25.1.150700.17.17.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.25.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.25.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.25.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.25.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.25.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_25-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_25-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_25-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.25.1.150700.17.17.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.25.1.150700.17.17.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.25.1.150700.17.17.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.25.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.25.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.25.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.25.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.25.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-15T11:09:08Z",
"details": "moderate"
}
],
"title": "CVE-2025-40074"
},
{
"cve": "CVE-2025-40075",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40075"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\ntcp_metrics: use dst_dev_net_rcu()\n\nReplace three dst_dev() with a lockdep enabled helper.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_25-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_25-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_25-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.25.1.150700.17.17.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.25.1.150700.17.17.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.25.1.150700.17.17.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.25.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.25.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.25.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.25.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.25.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40075",
"url": "https://www.suse.com/security/cve/CVE-2025-40075"
},
{
"category": "external",
"summary": "SUSE Bug 1252795 for CVE-2025-40075",
"url": "https://bugzilla.suse.com/1252795"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_25-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_25-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_25-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.25.1.150700.17.17.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.25.1.150700.17.17.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.25.1.150700.17.17.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.25.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.25.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.25.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.25.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.25.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_25-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_25-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_25-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.25.1.150700.17.17.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.25.1.150700.17.17.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.25.1.150700.17.17.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.25.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.25.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.25.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.25.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.25.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-15T11:09:08Z",
"details": "moderate"
}
],
"title": "CVE-2025-40075"
},
{
"cve": "CVE-2025-40080",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40080"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnbd: restrict sockets to TCP and UDP\n\nRecently, syzbot started to abuse NBD with all kinds of sockets.\n\nCommit cf1b2326b734 (\"nbd: verify socket is supported during setup\")\nmade sure the socket supported a shutdown() method.\n\nExplicitely accept TCP and UNIX stream sockets.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_25-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_25-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_25-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.25.1.150700.17.17.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.25.1.150700.17.17.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.25.1.150700.17.17.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.25.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.25.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.25.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.25.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.25.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40080",
"url": "https://www.suse.com/security/cve/CVE-2025-40080"
},
{
"category": "external",
"summary": "SUSE Bug 1252774 for CVE-2025-40080",
"url": "https://bugzilla.suse.com/1252774"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_25-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_25-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_25-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.25.1.150700.17.17.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.25.1.150700.17.17.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.25.1.150700.17.17.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.25.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.25.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.25.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.25.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.25.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_25-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_25-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_25-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.25.1.150700.17.17.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.25.1.150700.17.17.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.25.1.150700.17.17.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.25.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.25.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.25.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.25.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.25.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-15T11:09:08Z",
"details": "moderate"
}
],
"title": "CVE-2025-40080"
},
{
"cve": "CVE-2025-40083",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40083"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnet/sched: sch_qfq: Fix null-deref in agg_dequeue\n\nTo prevent a potential crash in agg_dequeue (net/sched/sch_qfq.c)\nwhen cl-\u003eqdisc-\u003eops-\u003epeek(cl-\u003eqdisc) returns NULL, we check the return\nvalue before using it, similar to the existing approach in sch_hfsc.c.\n\nTo avoid code duplication, the following changes are made:\n\n1. Changed qdisc_warn_nonwc(include/net/pkt_sched.h) into a static\ninline function.\n\n2. Moved qdisc_peek_len from net/sched/sch_hfsc.c to\ninclude/net/pkt_sched.h so that sch_qfq can reuse it.\n\n3. Applied qdisc_peek_len in agg_dequeue to avoid crashing.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_25-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_25-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_25-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.25.1.150700.17.17.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.25.1.150700.17.17.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.25.1.150700.17.17.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.25.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.25.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.25.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.25.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.25.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40083",
"url": "https://www.suse.com/security/cve/CVE-2025-40083"
},
{
"category": "external",
"summary": "SUSE Bug 1252912 for CVE-2025-40083",
"url": "https://bugzilla.suse.com/1252912"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_25-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_25-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_25-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.25.1.150700.17.17.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.25.1.150700.17.17.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.25.1.150700.17.17.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.25.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.25.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.25.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.25.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.25.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_25-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_25-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_25-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.25.1.150700.17.17.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.25.1.150700.17.17.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.25.1.150700.17.17.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.25.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.25.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.25.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.25.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.25.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-15T11:09:08Z",
"details": "moderate"
}
],
"title": "CVE-2025-40083"
},
{
"cve": "CVE-2025-40086",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40086"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\ndrm/xe: Don\u0027t allow evicting of BOs in same VM in array of VM binds\n\nAn array of VM binds can potentially evict other buffer objects (BOs)\nwithin the same VM under certain conditions, which may lead to NULL\npointer dereferences later in the bind pipeline. To prevent this, clear\nthe allow_res_evict flag in the xe_bo_validate call.\n\nv2:\n - Invert polarity of no_res_evict (Thomas)\n - Add comment in code explaining issue (Thomas)\n\n(cherry picked from commit 8b9ba8d6d95fe75fed6b0480bb03da4b321bea08)",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_25-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_25-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_25-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.25.1.150700.17.17.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.25.1.150700.17.17.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.25.1.150700.17.17.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.25.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.25.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.25.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.25.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.25.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40086",
"url": "https://www.suse.com/security/cve/CVE-2025-40086"
},
{
"category": "external",
"summary": "SUSE Bug 1252923 for CVE-2025-40086",
"url": "https://bugzilla.suse.com/1252923"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_25-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_25-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_25-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.25.1.150700.17.17.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.25.1.150700.17.17.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.25.1.150700.17.17.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.25.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.25.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.25.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.25.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.25.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.1,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_25-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_25-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_25-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.25.1.150700.17.17.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.25.1.150700.17.17.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.25.1.150700.17.17.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.25.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.25.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.25.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.25.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.25.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-15T11:09:08Z",
"details": "moderate"
}
],
"title": "CVE-2025-40086"
},
{
"cve": "CVE-2025-40098",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40098"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nALSA: hda: cs35l41: Fix NULL pointer dereference in cs35l41_get_acpi_mute_state()\n\nReturn value of a function acpi_evaluate_dsm() is dereferenced without\nchecking for NULL, but it is usually checked for this function.\n\nacpi_evaluate_dsm() may return NULL, when acpi_evaluate_object() returns\nacpi_status other than ACPI_SUCCESS, so add a check to prevent the crach.\n\nFound by Linux Verification Center (linuxtesting.org) with SVACE.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_25-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_25-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_25-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.25.1.150700.17.17.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.25.1.150700.17.17.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.25.1.150700.17.17.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.25.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.25.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.25.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.25.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.25.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40098",
"url": "https://www.suse.com/security/cve/CVE-2025-40098"
},
{
"category": "external",
"summary": "SUSE Bug 1252917 for CVE-2025-40098",
"url": "https://bugzilla.suse.com/1252917"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_25-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_25-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_25-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.25.1.150700.17.17.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.25.1.150700.17.17.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.25.1.150700.17.17.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.25.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.25.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.25.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.25.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.25.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_25-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_25-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_25-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.25.1.150700.17.17.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.25.1.150700.17.17.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.25.1.150700.17.17.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.25.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.25.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.25.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.25.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.25.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-15T11:09:08Z",
"details": "moderate"
}
],
"title": "CVE-2025-40098"
},
{
"cve": "CVE-2025-40105",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40105"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nvfs: Don\u0027t leak disconnected dentries on umount\n\nWhen user calls open_by_handle_at() on some inode that is not cached, we\nwill create disconnected dentry for it. If such dentry is a directory,\nexportfs_decode_fh_raw() will then try to connect this dentry to the\ndentry tree through reconnect_path(). It may happen for various reasons\n(such as corrupted fs or race with rename) that the call to\nlookup_one_unlocked() in reconnect_one() will fail to find the dentry we\nare trying to reconnect and instead create a new dentry under the\nparent. Now this dentry will not be marked as disconnected although the\nparent still may well be disconnected (at least in case this\ninconsistency happened because the fs is corrupted and .. doesn\u0027t point\nto the real parent directory). This creates inconsistency in\ndisconnected flags but AFAICS it was mostly harmless. At least until\ncommit f1ee616214cb (\"VFS: don\u0027t keep disconnected dentries on d_anon\")\nwhich removed adding of most disconnected dentries to sb-\u003es_anon list.\nThus after this commit cleanup of disconnected dentries implicitely\nrelies on the fact that dput() will immediately reclaim such dentries.\nHowever when some leaf dentry isn\u0027t marked as disconnected, as in the\nscenario described above, the reclaim doesn\u0027t happen and the dentries\nare \"leaked\". Memory reclaim can eventually reclaim them but otherwise\nthey stay in memory and if umount comes first, we hit infamous \"Busy\ninodes after unmount\" bug. Make sure all dentries created under a\ndisconnected parent are marked as disconnected as well.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_25-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_25-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_25-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.25.1.150700.17.17.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.25.1.150700.17.17.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.25.1.150700.17.17.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.25.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.25.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.25.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.25.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.25.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40105",
"url": "https://www.suse.com/security/cve/CVE-2025-40105"
},
{
"category": "external",
"summary": "SUSE Bug 1252928 for CVE-2025-40105",
"url": "https://bugzilla.suse.com/1252928"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_25-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_25-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_25-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.25.1.150700.17.17.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.25.1.150700.17.17.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.25.1.150700.17.17.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.25.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.25.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.25.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.25.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.25.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.3,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_25-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_25-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_25-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.25.1.150700.17.17.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.25.1.150700.17.17.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.25.1.150700.17.17.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.25.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.25.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.25.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.25.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.25.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-15T11:09:08Z",
"details": "low"
}
],
"title": "CVE-2025-40105"
},
{
"cve": "CVE-2025-40107",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40107"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\ncan: hi311x: fix null pointer dereference when resuming from sleep before interface was enabled\n\nThis issue is similar to the vulnerability in the `mcp251x` driver,\nwhich was fixed in commit 03c427147b2d (\"can: mcp251x: fix resume from\nsleep before interface was brought up\").\n\nIn the `hi311x` driver, when the device resumes from sleep, the driver\nschedules `priv-\u003erestart_work`. However, if the network interface was\nnot previously enabled, the `priv-\u003ewq` (workqueue) is not allocated and\ninitialized, leading to a null pointer dereference.\n\nTo fix this, we move the allocation and initialization of the workqueue\nfrom the `hi3110_open` function to the `hi3110_can_probe` function.\nThis ensures that the workqueue is properly initialized before it is\nused during device resume. And added logic to destroy the workqueue\nin the error handling paths of `hi3110_can_probe` and in the\n`hi3110_can_remove` function to prevent resource leaks.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_25-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_25-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_25-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.25.1.150700.17.17.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.25.1.150700.17.17.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.25.1.150700.17.17.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.25.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.25.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.25.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.25.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.25.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40107",
"url": "https://www.suse.com/security/cve/CVE-2025-40107"
},
{
"category": "external",
"summary": "SUSE Bug 1253018 for CVE-2025-40107",
"url": "https://bugzilla.suse.com/1253018"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_25-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_25-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_25-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.25.1.150700.17.17.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.25.1.150700.17.17.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.25.1.150700.17.17.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.25.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.25.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.25.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.25.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.25.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_25-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_25-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_25-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.25.1.150700.17.17.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.25.1.150700.17.17.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.25.1.150700.17.17.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.25.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.25.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.25.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.25.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.25.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-15T11:09:08Z",
"details": "moderate"
}
],
"title": "CVE-2025-40107"
},
{
"cve": "CVE-2025-40109",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40109"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\ncrypto: rng - Ensure set_ent is always present\n\nEnsure that set_ent is always set since only drbg provides it.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_25-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_25-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_25-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.25.1.150700.17.17.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.25.1.150700.17.17.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.25.1.150700.17.17.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.25.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.25.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.25.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.25.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.25.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40109",
"url": "https://www.suse.com/security/cve/CVE-2025-40109"
},
{
"category": "external",
"summary": "SUSE Bug 1253176 for CVE-2025-40109",
"url": "https://bugzilla.suse.com/1253176"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_25-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_25-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_25-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.25.1.150700.17.17.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.25.1.150700.17.17.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.25.1.150700.17.17.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.25.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.25.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.25.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.25.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.25.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_25-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_25-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_25-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.25.1.150700.17.17.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.25.1.150700.17.17.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.25.1.150700.17.17.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.25.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.25.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.25.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.25.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.25.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-15T11:09:08Z",
"details": "moderate"
}
],
"title": "CVE-2025-40109"
},
{
"cve": "CVE-2025-40110",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40110"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\ndrm/vmwgfx: Fix a null-ptr access in the cursor snooper\n\nCheck that the resource which is converted to a surface exists before\ntrying to use the cursor snooper on it.\n\nvmw_cmd_res_check allows explicit invalid (SVGA3D_INVALID_ID) identifiers\nbecause some svga commands accept SVGA3D_INVALID_ID to mean \"no surface\",\nunfortunately functions that accept the actual surfaces as objects might\n(and in case of the cursor snooper, do not) be able to handle null\nobjects. Make sure that we validate not only the identifier (via the\nvmw_cmd_res_check) but also check that the actual resource exists before\ntrying to do something with it.\n\nFixes unchecked null-ptr reference in the snooping code.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_25-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_25-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_25-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.25.1.150700.17.17.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.25.1.150700.17.17.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.25.1.150700.17.17.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.25.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.25.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.25.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.25.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.25.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40110",
"url": "https://www.suse.com/security/cve/CVE-2025-40110"
},
{
"category": "external",
"summary": "SUSE Bug 1253275 for CVE-2025-40110",
"url": "https://bugzilla.suse.com/1253275"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_25-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_25-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_25-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.25.1.150700.17.17.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.25.1.150700.17.17.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.25.1.150700.17.17.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.25.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.25.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.25.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.25.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.25.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.1,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_25-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_25-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_25-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.25.1.150700.17.17.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.25.1.150700.17.17.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.25.1.150700.17.17.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.25.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.25.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.25.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.25.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.25.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-15T11:09:08Z",
"details": "moderate"
}
],
"title": "CVE-2025-40110"
},
{
"cve": "CVE-2025-40111",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40111"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\ndrm/vmwgfx: Fix Use-after-free in validation\n\nNodes stored in the validation duplicates hashtable come from an arena\nallocator that is cleared at the end of vmw_execbuf_process. All nodes\nare expected to be cleared in vmw_validation_drop_ht but this node escaped\nbecause its resource was destroyed prematurely.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_25-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_25-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_25-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.25.1.150700.17.17.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.25.1.150700.17.17.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.25.1.150700.17.17.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.25.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.25.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.25.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.25.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.25.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40111",
"url": "https://www.suse.com/security/cve/CVE-2025-40111"
},
{
"category": "external",
"summary": "SUSE Bug 1253362 for CVE-2025-40111",
"url": "https://bugzilla.suse.com/1253362"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_25-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_25-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_25-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.25.1.150700.17.17.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.25.1.150700.17.17.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.25.1.150700.17.17.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.25.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.25.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.25.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.25.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.25.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.7,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:L/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_25-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_25-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_25-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.25.1.150700.17.17.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.25.1.150700.17.17.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.25.1.150700.17.17.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.25.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.25.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.25.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.25.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.25.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-15T11:09:08Z",
"details": "moderate"
}
],
"title": "CVE-2025-40111"
},
{
"cve": "CVE-2025-40115",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40115"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nscsi: mpt3sas: Fix crash in transport port remove by using ioc_info()\n\nDuring mpt3sas_transport_port_remove(), messages were logged with\ndev_printk() against \u0026mpt3sas_port-\u003eport-\u003edev. At this point the SAS\ntransport device may already be partially unregistered or freed, leading\nto a crash when accessing its struct device.\n\nUsing ioc_info(), which logs via the PCI device (ioc-\u003epdev-\u003edev),\nguaranteed to remain valid until driver removal.\n\n[83428.295776] Oops: general protection fault, probably for non-canonical address 0x6f702f323a33312d: 0000 [#1] SMP NOPTI\n[83428.295785] CPU: 145 UID: 0 PID: 113296 Comm: rmmod Kdump: loaded Tainted: G OE 6.16.0-rc1+ #1 PREEMPT(voluntary)\n[83428.295792] Tainted: [O]=OOT_MODULE, [E]=UNSIGNED_MODULE\n[83428.295795] Hardware name: Dell Inc. Precision 7875 Tower/, BIOS 89.1.67 02/23/2024\n[83428.295799] RIP: 0010:__dev_printk+0x1f/0x70\n[83428.295805] Code: 90 90 90 90 90 90 90 90 90 90 90 0f 1f 44 00 00 49 89 d1 48 85 f6 74 52 4c 8b 46 50 4d 85 c0 74 1f 48 8b 46 68 48 85 c0 74 22 \u003c48\u003e 8b 08 0f b6 7f 01 48 c7 c2 db e8 42 ad 83 ef 30 e9 7b f8 ff ff\n[83428.295813] RSP: 0018:ff85aeafc3137bb0 EFLAGS: 00010206\n[83428.295817] RAX: 6f702f323a33312d RBX: ff4290ee81292860 RCX: 5000cca25103be32\n[83428.295820] RDX: ff85aeafc3137bb8 RSI: ff4290eeb1966c00 RDI: ffffffffc1560845\n[83428.295823] RBP: ff85aeafc3137c18 R08: 74726f702f303a33 R09: ff85aeafc3137bb8\n[83428.295826] R10: ff85aeafc3137b18 R11: ff4290f5bd60fe68 R12: ff4290ee81290000\n[83428.295830] R13: ff4290ee6e345de0 R14: ff4290ee81290000 R15: ff4290ee6e345e30\n[83428.295833] FS: 00007fd9472a6740(0000) GS:ff4290f5ce96b000(0000) knlGS:0000000000000000\n[83428.295837] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033\n[83428.295840] CR2: 00007f242b4db238 CR3: 00000002372b8006 CR4: 0000000000771ef0\n[83428.295844] PKRU: 55555554\n[83428.295846] Call Trace:\n[83428.295848] \u003cTASK\u003e\n[83428.295850] _dev_printk+0x5c/0x80\n[83428.295857] ? srso_alias_return_thunk+0x5/0xfbef5\n[83428.295863] mpt3sas_transport_port_remove+0x1c7/0x420 [mpt3sas]\n[83428.295882] _scsih_remove_device+0x21b/0x280 [mpt3sas]\n[83428.295894] ? _scsih_expander_node_remove+0x108/0x140 [mpt3sas]\n[83428.295906] ? srso_alias_return_thunk+0x5/0xfbef5\n[83428.295910] mpt3sas_device_remove_by_sas_address.part.0+0x8f/0x110 [mpt3sas]\n[83428.295921] _scsih_expander_node_remove+0x129/0x140 [mpt3sas]\n[83428.295933] _scsih_expander_node_remove+0x6a/0x140 [mpt3sas]\n[83428.295944] scsih_remove+0x3f0/0x4a0 [mpt3sas]\n[83428.295957] pci_device_remove+0x3b/0xb0\n[83428.295962] device_release_driver_internal+0x193/0x200\n[83428.295968] driver_detach+0x44/0x90\n[83428.295971] bus_remove_driver+0x69/0xf0\n[83428.295975] pci_unregister_driver+0x2a/0xb0\n[83428.295979] _mpt3sas_exit+0x1f/0x300 [mpt3sas]\n[83428.295991] __do_sys_delete_module.constprop.0+0x174/0x310\n[83428.295997] ? srso_alias_return_thunk+0x5/0xfbef5\n[83428.296000] ? __x64_sys_getdents64+0x9a/0x110\n[83428.296005] ? srso_alias_return_thunk+0x5/0xfbef5\n[83428.296009] ? syscall_trace_enter+0xf6/0x1b0\n[83428.296014] do_syscall_64+0x7b/0x2c0\n[83428.296019] ? srso_alias_return_thunk+0x5/0xfbef5\n[83428.296023] entry_SYSCALL_64_after_hwframe+0x76/0x7e",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_25-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_25-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_25-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.25.1.150700.17.17.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.25.1.150700.17.17.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.25.1.150700.17.17.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.25.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.25.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.25.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.25.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.25.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40115",
"url": "https://www.suse.com/security/cve/CVE-2025-40115"
},
{
"category": "external",
"summary": "SUSE Bug 1253318 for CVE-2025-40115",
"url": "https://bugzilla.suse.com/1253318"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_25-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_25-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_25-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.25.1.150700.17.17.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.25.1.150700.17.17.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.25.1.150700.17.17.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.25.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.25.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.25.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.25.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.25.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_25-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_25-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_25-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.25.1.150700.17.17.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.25.1.150700.17.17.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.25.1.150700.17.17.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.25.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.25.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.25.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.25.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.25.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-15T11:09:08Z",
"details": "moderate"
}
],
"title": "CVE-2025-40115"
},
{
"cve": "CVE-2025-40116",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40116"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nusb: host: max3421-hcd: Fix error pointer dereference in probe cleanup\n\nThe kthread_run() function returns error pointers so the\nmax3421_hcd-\u003espi_thread pointer can be either error pointers or NULL.\nCheck for both before dereferencing it.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_25-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_25-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_25-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.25.1.150700.17.17.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.25.1.150700.17.17.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.25.1.150700.17.17.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.25.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.25.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.25.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.25.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.25.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40116",
"url": "https://www.suse.com/security/cve/CVE-2025-40116"
},
{
"category": "external",
"summary": "SUSE Bug 1253324 for CVE-2025-40116",
"url": "https://bugzilla.suse.com/1253324"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_25-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_25-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_25-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.25.1.150700.17.17.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.25.1.150700.17.17.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.25.1.150700.17.17.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.25.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.25.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.25.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.25.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.25.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_25-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_25-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_25-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.25.1.150700.17.17.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.25.1.150700.17.17.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.25.1.150700.17.17.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.25.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.25.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.25.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.25.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.25.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-15T11:09:08Z",
"details": "moderate"
}
],
"title": "CVE-2025-40116"
},
{
"cve": "CVE-2025-40118",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40118"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nscsi: pm80xx: Fix array-index-out-of-of-bounds on rmmod\n\nSince commit f7b705c238d1 (\"scsi: pm80xx: Set phy_attached to zero when\ndevice is gone\") UBSAN reports:\n\n UBSAN: array-index-out-of-bounds in drivers/scsi/pm8001/pm8001_sas.c:786:17\n index 28 is out of range for type \u0027pm8001_phy [16]\u0027\n\non rmmod when using an expander.\n\nFor a direct attached device, attached_phy contains the local phy id.\nFor a device behind an expander, attached_phy contains the remote phy\nid, not the local phy id.\n\nI.e. while pm8001_ha will have pm8001_ha-\u003echip-\u003en_phy local phys, for a\ndevice behind an expander, attached_phy can be much larger than\npm8001_ha-\u003echip-\u003en_phy (depending on the amount of phys of the\nexpander).\n\nE.g. on my system pm8001_ha has 8 phys with phy ids 0-7. One of the\nports has an expander connected. The expander has 31 phys with phy ids\n0-30.\n\nThe pm8001_ha-\u003ephy array only contains the phys of the HBA. It does not\ncontain the phys of the expander. Thus, it is wrong to use attached_phy\nto index the pm8001_ha-\u003ephy array for a device behind an expander.\n\nThus, we can only clear phy_attached for devices that are directly\nattached.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_25-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_25-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_25-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.25.1.150700.17.17.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.25.1.150700.17.17.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.25.1.150700.17.17.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.25.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.25.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.25.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.25.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.25.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40118",
"url": "https://www.suse.com/security/cve/CVE-2025-40118"
},
{
"category": "external",
"summary": "SUSE Bug 1253363 for CVE-2025-40118",
"url": "https://bugzilla.suse.com/1253363"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_25-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_25-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_25-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.25.1.150700.17.17.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.25.1.150700.17.17.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.25.1.150700.17.17.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.25.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.25.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.25.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.25.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.25.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.1,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_25-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_25-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_25-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.25.1.150700.17.17.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.25.1.150700.17.17.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.25.1.150700.17.17.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.25.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.25.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.25.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.25.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.25.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-15T11:09:08Z",
"details": "moderate"
}
],
"title": "CVE-2025-40118"
},
{
"cve": "CVE-2025-40120",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40120"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnet: usb: asix: hold PM usage ref to avoid PM/MDIO + RTNL deadlock\n\nPrevent USB runtime PM (autosuspend) for AX88772* in bind.\n\nusbnet enables runtime PM (autosuspend) by default, so disabling it via\nthe usb_driver flag is ineffective. On AX88772B, autosuspend shows no\nmeasurable power saving with current driver (no link partner, admin\nup/down). The ~0.453 W -\u003e ~0.248 W drop on v6.1 comes from phylib powering\nthe PHY off on admin-down, not from USB autosuspend.\n\nThe real hazard is that with runtime PM enabled, ndo_open() (under RTNL)\nmay synchronously trigger autoresume (usb_autopm_get_interface()) into\nasix_resume() while the USB PM lock is held. Resume paths then invoke\nphylink/phylib and MDIO, which also expect RTNL, leading to possible\ndeadlocks or PM lock vs MDIO wake issues.\n\nTo avoid this, keep the device runtime-PM active by taking a usage\nreference in ax88772_bind() and dropping it in unbind(). A non-zero PM\nusage count blocks runtime suspend regardless of userspace policy\n(.../power/control - pm_runtime_allow/forbid), making this approach\nrobust against sysfs overrides.\n\nHolding a runtime-PM usage ref does not affect system-wide suspend;\nsystem sleep/resume callbacks continue to run as before.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_25-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_25-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_25-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.25.1.150700.17.17.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.25.1.150700.17.17.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.25.1.150700.17.17.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.25.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.25.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.25.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.25.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.25.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40120",
"url": "https://www.suse.com/security/cve/CVE-2025-40120"
},
{
"category": "external",
"summary": "SUSE Bug 1253360 for CVE-2025-40120",
"url": "https://bugzilla.suse.com/1253360"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_25-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_25-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_25-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.25.1.150700.17.17.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.25.1.150700.17.17.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.25.1.150700.17.17.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.25.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.25.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.25.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.25.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.25.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_25-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_25-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_25-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.25.1.150700.17.17.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.25.1.150700.17.17.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.25.1.150700.17.17.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.25.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.25.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.25.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.25.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.25.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-15T11:09:08Z",
"details": "moderate"
}
],
"title": "CVE-2025-40120"
},
{
"cve": "CVE-2025-40121",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40121"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nASoC: Intel: bytcr_rt5651: Fix invalid quirk input mapping\n\nWhen an invalid value is passed via quirk option, currently\nbytcr_rt5640 driver just ignores and leaves as is, which may lead to\nunepxected results like OOB access.\n\nThis patch adds the sanity check and corrects the input mapping to the\ncertain default value if an invalid value is passed.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_25-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_25-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_25-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.25.1.150700.17.17.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.25.1.150700.17.17.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.25.1.150700.17.17.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.25.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.25.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.25.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.25.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.25.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40121",
"url": "https://www.suse.com/security/cve/CVE-2025-40121"
},
{
"category": "external",
"summary": "SUSE Bug 1253367 for CVE-2025-40121",
"url": "https://bugzilla.suse.com/1253367"
},
{
"category": "external",
"summary": "SUSE Bug 1253430 for CVE-2025-40121",
"url": "https://bugzilla.suse.com/1253430"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_25-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_25-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_25-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.25.1.150700.17.17.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.25.1.150700.17.17.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.25.1.150700.17.17.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.25.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.25.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.25.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.25.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.25.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_25-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_25-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_25-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.25.1.150700.17.17.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.25.1.150700.17.17.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.25.1.150700.17.17.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.25.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.25.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.25.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.25.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.25.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-15T11:09:08Z",
"details": "moderate"
}
],
"title": "CVE-2025-40121"
},
{
"cve": "CVE-2025-40127",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40127"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nhwrng: ks-sa - fix division by zero in ks_sa_rng_init\n\nFix division by zero in ks_sa_rng_init caused by missing clock\npointer initialization. The clk_get_rate() call is performed on\nan uninitialized clk pointer, resulting in division by zero when\ncalculating delay values.\n\nAdd clock initialization code before using the clock.\n\n\n drivers/char/hw_random/ks-sa-rng.c | 7 +++++++\n 1 file changed, 7 insertions(+)",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_25-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_25-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_25-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.25.1.150700.17.17.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.25.1.150700.17.17.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.25.1.150700.17.17.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.25.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.25.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.25.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.25.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.25.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40127",
"url": "https://www.suse.com/security/cve/CVE-2025-40127"
},
{
"category": "external",
"summary": "SUSE Bug 1253369 for CVE-2025-40127",
"url": "https://bugzilla.suse.com/1253369"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_25-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_25-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_25-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.25.1.150700.17.17.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.25.1.150700.17.17.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.25.1.150700.17.17.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.25.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.25.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.25.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.25.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.25.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_25-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_25-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_25-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.25.1.150700.17.17.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.25.1.150700.17.17.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.25.1.150700.17.17.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.25.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.25.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.25.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.25.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.25.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-15T11:09:08Z",
"details": "moderate"
}
],
"title": "CVE-2025-40127"
},
{
"cve": "CVE-2025-40129",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40129"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nsunrpc: fix null pointer dereference on zero-length checksum\n\nIn xdr_stream_decode_opaque_auth(), zero-length checksum.len causes\nchecksum.data to be set to NULL. This triggers a NPD when accessing\nchecksum.data in gss_krb5_verify_mic_v2(). This patch ensures that\nthe value of checksum.len is not less than XDR_UNIT.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_25-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_25-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_25-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.25.1.150700.17.17.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.25.1.150700.17.17.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.25.1.150700.17.17.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.25.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.25.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.25.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.25.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.25.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40129",
"url": "https://www.suse.com/security/cve/CVE-2025-40129"
},
{
"category": "external",
"summary": "SUSE Bug 1253472 for CVE-2025-40129",
"url": "https://bugzilla.suse.com/1253472"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_25-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_25-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_25-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.25.1.150700.17.17.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.25.1.150700.17.17.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.25.1.150700.17.17.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.25.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.25.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.25.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.25.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.25.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_25-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_25-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_25-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.25.1.150700.17.17.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.25.1.150700.17.17.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.25.1.150700.17.17.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.25.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.25.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.25.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.25.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.25.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-15T11:09:08Z",
"details": "important"
}
],
"title": "CVE-2025-40129"
},
{
"cve": "CVE-2025-40139",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40139"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nsmc: Use __sk_dst_get() and dst_dev_rcu() in in smc_clc_prfx_set().\n\nsmc_clc_prfx_set() is called during connect() and not under RCU\nnor RTNL.\n\nUsing sk_dst_get(sk)-\u003edev could trigger UAF.\n\nLet\u0027s use __sk_dst_get() and dev_dst_rcu() under rcu_read_lock()\nafter kernel_getsockname().\n\nNote that the returned value of smc_clc_prfx_set() is not used\nin the caller.\n\nWhile at it, we change the 1st arg of smc_clc_prfx_set[46]_rcu()\nnot to touch dst there.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_25-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_25-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_25-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.25.1.150700.17.17.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.25.1.150700.17.17.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.25.1.150700.17.17.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.25.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.25.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.25.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.25.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.25.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40139",
"url": "https://www.suse.com/security/cve/CVE-2025-40139"
},
{
"category": "external",
"summary": "SUSE Bug 1253409 for CVE-2025-40139",
"url": "https://bugzilla.suse.com/1253409"
},
{
"category": "external",
"summary": "SUSE Bug 1253411 for CVE-2025-40139",
"url": "https://bugzilla.suse.com/1253411"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_25-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_25-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_25-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.25.1.150700.17.17.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.25.1.150700.17.17.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.25.1.150700.17.17.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.25.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.25.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.25.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.25.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.25.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_25-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_25-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_25-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.25.1.150700.17.17.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.25.1.150700.17.17.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.25.1.150700.17.17.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.25.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.25.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.25.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.25.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.25.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-15T11:09:08Z",
"details": "important"
}
],
"title": "CVE-2025-40139"
},
{
"cve": "CVE-2025-40140",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40140"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnet: usb: Remove disruptive netif_wake_queue in rtl8150_set_multicast\n\nsyzbot reported WARNING in rtl8150_start_xmit/usb_submit_urb.\nThis is the sequence of events that leads to the warning:\n\nrtl8150_start_xmit() {\n\tnetif_stop_queue();\n\tusb_submit_urb(dev-\u003etx_urb);\n}\n\nrtl8150_set_multicast() {\n\tnetif_stop_queue();\n\tnetif_wake_queue();\t\t\u003c-- wakes up TX queue before URB is done\n}\n\nrtl8150_start_xmit() {\n\tnetif_stop_queue();\n\tusb_submit_urb(dev-\u003etx_urb);\t\u003c-- double submission\n}\n\nrtl8150_set_multicast being the ndo_set_rx_mode callback should not be\ncalling netif_stop_queue and notif_start_queue as these handle\nTX queue synchronization.\n\nThe net core function dev_set_rx_mode handles the synchronization\nfor rtl8150_set_multicast making it safe to remove these locks.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_25-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_25-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_25-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.25.1.150700.17.17.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.25.1.150700.17.17.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.25.1.150700.17.17.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.25.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.25.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.25.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.25.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.25.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40140",
"url": "https://www.suse.com/security/cve/CVE-2025-40140"
},
{
"category": "external",
"summary": "SUSE Bug 1253349 for CVE-2025-40140",
"url": "https://bugzilla.suse.com/1253349"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_25-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_25-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_25-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.25.1.150700.17.17.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.25.1.150700.17.17.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.25.1.150700.17.17.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.25.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.25.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.25.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.25.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.25.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.3,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_25-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_25-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_25-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.25.1.150700.17.17.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.25.1.150700.17.17.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.25.1.150700.17.17.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.25.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.25.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.25.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.25.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.25.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-15T11:09:08Z",
"details": "low"
}
],
"title": "CVE-2025-40140"
},
{
"cve": "CVE-2025-40141",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40141"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nBluetooth: ISO: Fix possible UAF on iso_conn_free\n\nThis attempt to fix similar issue to sco_conn_free where if the\nconn-\u003esk is not set to NULL may lead to UAF on iso_conn_free.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_25-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_25-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_25-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.25.1.150700.17.17.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.25.1.150700.17.17.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.25.1.150700.17.17.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.25.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.25.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.25.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.25.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.25.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40141",
"url": "https://www.suse.com/security/cve/CVE-2025-40141"
},
{
"category": "external",
"summary": "SUSE Bug 1253352 for CVE-2025-40141",
"url": "https://bugzilla.suse.com/1253352"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_25-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_25-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_25-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.25.1.150700.17.17.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.25.1.150700.17.17.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.25.1.150700.17.17.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.25.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.25.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.25.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.25.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.25.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_25-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_25-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_25-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.25.1.150700.17.17.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.25.1.150700.17.17.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.25.1.150700.17.17.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.25.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.25.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.25.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.25.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.25.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-15T11:09:08Z",
"details": "moderate"
}
],
"title": "CVE-2025-40141"
},
{
"cve": "CVE-2025-40149",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40149"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\ntls: Use __sk_dst_get() and dst_dev_rcu() in get_netdev_for_sock().\n\nget_netdev_for_sock() is called during setsockopt(),\nso not under RCU.\n\nUsing sk_dst_get(sk)-\u003edev could trigger UAF.\n\nLet\u0027s use __sk_dst_get() and dst_dev_rcu().\n\nNote that the only -\u003endo_sk_get_lower_dev() user is\nbond_sk_get_lower_dev(), which uses RCU.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_25-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_25-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_25-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.25.1.150700.17.17.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.25.1.150700.17.17.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.25.1.150700.17.17.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.25.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.25.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.25.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.25.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.25.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40149",
"url": "https://www.suse.com/security/cve/CVE-2025-40149"
},
{
"category": "external",
"summary": "SUSE Bug 1253355 for CVE-2025-40149",
"url": "https://bugzilla.suse.com/1253355"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_25-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_25-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_25-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.25.1.150700.17.17.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.25.1.150700.17.17.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.25.1.150700.17.17.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.25.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.25.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.25.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.25.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.25.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_25-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_25-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_25-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.25.1.150700.17.17.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.25.1.150700.17.17.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.25.1.150700.17.17.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.25.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.25.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.25.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.25.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.25.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-15T11:09:08Z",
"details": "moderate"
}
],
"title": "CVE-2025-40149"
},
{
"cve": "CVE-2025-40154",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40154"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nASoC: Intel: bytcr_rt5640: Fix invalid quirk input mapping\n\nWhen an invalid value is passed via quirk option, currently\nbytcr_rt5640 driver only shows an error message but leaves as is.\nThis may lead to unepxected results like OOB access.\n\nThis patch corrects the input mapping to the certain default value if\nan invalid value is passed.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_25-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_25-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_25-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.25.1.150700.17.17.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.25.1.150700.17.17.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.25.1.150700.17.17.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.25.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.25.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.25.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.25.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.25.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40154",
"url": "https://www.suse.com/security/cve/CVE-2025-40154"
},
{
"category": "external",
"summary": "SUSE Bug 1253431 for CVE-2025-40154",
"url": "https://bugzilla.suse.com/1253431"
},
{
"category": "external",
"summary": "SUSE Bug 1253432 for CVE-2025-40154",
"url": "https://bugzilla.suse.com/1253432"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_25-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_25-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_25-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.25.1.150700.17.17.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.25.1.150700.17.17.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.25.1.150700.17.17.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.25.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.25.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.25.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.25.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.25.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_25-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_25-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_25-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.25.1.150700.17.17.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.25.1.150700.17.17.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.25.1.150700.17.17.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.25.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.25.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.25.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.25.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.25.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-15T11:09:08Z",
"details": "moderate"
}
],
"title": "CVE-2025-40154"
},
{
"cve": "CVE-2025-40156",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40156"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nPM / devfreq: mtk-cci: Fix potential error pointer dereference in probe()\n\nThe drv-\u003esram_reg pointer could be set to ERR_PTR(-EPROBE_DEFER) which\nwould lead to a error pointer dereference. Use IS_ERR_OR_NULL() to check\nthat the pointer is valid.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_25-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_25-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_25-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.25.1.150700.17.17.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.25.1.150700.17.17.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.25.1.150700.17.17.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.25.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.25.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.25.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.25.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.25.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40156",
"url": "https://www.suse.com/security/cve/CVE-2025-40156"
},
{
"category": "external",
"summary": "SUSE Bug 1253428 for CVE-2025-40156",
"url": "https://bugzilla.suse.com/1253428"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_25-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_25-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_25-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.25.1.150700.17.17.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.25.1.150700.17.17.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.25.1.150700.17.17.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.25.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.25.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.25.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.25.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.25.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_25-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_25-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_25-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.25.1.150700.17.17.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.25.1.150700.17.17.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.25.1.150700.17.17.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.25.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.25.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.25.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.25.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.25.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-15T11:09:08Z",
"details": "moderate"
}
],
"title": "CVE-2025-40156"
},
{
"cve": "CVE-2025-40157",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40157"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nEDAC/i10nm: Skip DIMM enumeration on a disabled memory controller\n\nWhen loading the i10nm_edac driver on some Intel Granite Rapids servers,\na call trace may appear as follows:\n\n UBSAN: shift-out-of-bounds in drivers/edac/skx_common.c:453:16\n shift exponent -66 is negative\n ...\n __ubsan_handle_shift_out_of_bounds+0x1e3/0x390\n skx_get_dimm_info.cold+0x47/0xd40 [skx_edac_common]\n i10nm_get_dimm_config+0x23e/0x390 [i10nm_edac]\n skx_register_mci+0x159/0x220 [skx_edac_common]\n i10nm_init+0xcb0/0x1ff0 [i10nm_edac]\n ...\n\nThis occurs because some BIOS may disable a memory controller if there\naren\u0027t any memory DIMMs populated on this memory controller. The DIMMMTR\nregister of this disabled memory controller contains the invalid value\n~0, resulting in the call trace above.\n\nFix this call trace by skipping DIMM enumeration on a disabled memory\ncontroller.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_25-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_25-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_25-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.25.1.150700.17.17.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.25.1.150700.17.17.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.25.1.150700.17.17.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.25.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.25.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.25.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.25.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.25.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40157",
"url": "https://www.suse.com/security/cve/CVE-2025-40157"
},
{
"category": "external",
"summary": "SUSE Bug 1253423 for CVE-2025-40157",
"url": "https://bugzilla.suse.com/1253423"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_25-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_25-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_25-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.25.1.150700.17.17.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.25.1.150700.17.17.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.25.1.150700.17.17.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.25.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.25.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.25.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.25.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.25.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.2,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:L/I:L/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_25-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_25-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_25-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.25.1.150700.17.17.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.25.1.150700.17.17.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.25.1.150700.17.17.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.25.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.25.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.25.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.25.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.25.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-15T11:09:08Z",
"details": "moderate"
}
],
"title": "CVE-2025-40157"
},
{
"cve": "CVE-2025-40159",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40159"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nxsk: Harden userspace-supplied xdp_desc validation\n\nTurned out certain clearly invalid values passed in xdp_desc from\nuserspace can pass xp_{,un}aligned_validate_desc() and then lead\nto UBs or just invalid frames to be queued for xmit.\n\ndesc-\u003elen close to ``U32_MAX`` with a non-zero pool-\u003etx_metadata_len\ncan cause positive integer overflow and wraparound, the same way low\nenough desc-\u003eaddr with a non-zero pool-\u003etx_metadata_len can cause\nnegative integer overflow. Both scenarios can then pass the\nvalidation successfully.\nThis doesn\u0027t happen with valid XSk applications, but can be used\nto perform attacks.\n\nAlways promote desc-\u003elen to ``u64`` first to exclude positive\noverflows of it. Use explicit check_{add,sub}_overflow() when\nvalidating desc-\u003eaddr (which is ``u64`` already).\n\nbloat-o-meter reports a little growth of the code size:\n\nadd/remove: 0/0 grow/shrink: 2/1 up/down: 60/-16 (44)\nFunction old new delta\nxskq_cons_peek_desc 299 330 +31\nxsk_tx_peek_release_desc_batch 973 1002 +29\nxsk_generic_xmit 3148 3132 -16\n\nbut hopefully this doesn\u0027t hurt the performance much.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_25-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_25-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_25-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.25.1.150700.17.17.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.25.1.150700.17.17.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.25.1.150700.17.17.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.25.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.25.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.25.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.25.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.25.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40159",
"url": "https://www.suse.com/security/cve/CVE-2025-40159"
},
{
"category": "external",
"summary": "SUSE Bug 1253403 for CVE-2025-40159",
"url": "https://bugzilla.suse.com/1253403"
},
{
"category": "external",
"summary": "SUSE Bug 1253404 for CVE-2025-40159",
"url": "https://bugzilla.suse.com/1253404"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_25-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_25-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_25-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.25.1.150700.17.17.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.25.1.150700.17.17.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.25.1.150700.17.17.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.25.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.25.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.25.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.25.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.25.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_25-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_25-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_25-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.25.1.150700.17.17.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.25.1.150700.17.17.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.25.1.150700.17.17.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.25.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.25.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.25.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.25.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.25.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-15T11:09:08Z",
"details": "important"
}
],
"title": "CVE-2025-40159"
},
{
"cve": "CVE-2025-40164",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40164"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nusbnet: Fix using smp_processor_id() in preemptible code warnings\n\nSyzbot reported the following warning:\n\nBUG: using smp_processor_id() in preemptible [00000000] code: dhcpcd/2879\ncaller is usbnet_skb_return+0x74/0x490 drivers/net/usb/usbnet.c:331\nCPU: 1 UID: 0 PID: 2879 Comm: dhcpcd Not tainted 6.15.0-rc4-syzkaller-00098-g615dca38c2ea #0 PREEMPT(voluntary)\nCall Trace:\n \u003cTASK\u003e\n __dump_stack lib/dump_stack.c:94 [inline]\n dump_stack_lvl+0x16c/0x1f0 lib/dump_stack.c:120\n check_preemption_disabled+0xd0/0xe0 lib/smp_processor_id.c:49\n usbnet_skb_return+0x74/0x490 drivers/net/usb/usbnet.c:331\n usbnet_resume_rx+0x4b/0x170 drivers/net/usb/usbnet.c:708\n usbnet_change_mtu+0x1be/0x220 drivers/net/usb/usbnet.c:417\n __dev_set_mtu net/core/dev.c:9443 [inline]\n netif_set_mtu_ext+0x369/0x5c0 net/core/dev.c:9496\n netif_set_mtu+0xb0/0x160 net/core/dev.c:9520\n dev_set_mtu+0xae/0x170 net/core/dev_api.c:247\n dev_ifsioc+0xa31/0x18d0 net/core/dev_ioctl.c:572\n dev_ioctl+0x223/0x10e0 net/core/dev_ioctl.c:821\n sock_do_ioctl+0x19d/0x280 net/socket.c:1204\n sock_ioctl+0x42f/0x6a0 net/socket.c:1311\n vfs_ioctl fs/ioctl.c:51 [inline]\n __do_sys_ioctl fs/ioctl.c:906 [inline]\n __se_sys_ioctl fs/ioctl.c:892 [inline]\n __x64_sys_ioctl+0x190/0x200 fs/ioctl.c:892\n do_syscall_x64 arch/x86/entry/syscall_64.c:63 [inline]\n do_syscall_64+0xcd/0x260 arch/x86/entry/syscall_64.c:94\n entry_SYSCALL_64_after_hwframe+0x77/0x7f\n\nFor historical and portability reasons, the netif_rx() is usually\nrun in the softirq or interrupt context, this commit therefore add\nlocal_bh_disable/enable() protection in the usbnet_resume_rx().",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_25-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_25-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_25-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.25.1.150700.17.17.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.25.1.150700.17.17.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.25.1.150700.17.17.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.25.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.25.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.25.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.25.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.25.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40164",
"url": "https://www.suse.com/security/cve/CVE-2025-40164"
},
{
"category": "external",
"summary": "SUSE Bug 1253407 for CVE-2025-40164",
"url": "https://bugzilla.suse.com/1253407"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_25-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_25-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_25-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.25.1.150700.17.17.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.25.1.150700.17.17.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.25.1.150700.17.17.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.25.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.25.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.25.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.25.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.25.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.7,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_25-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_25-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_25-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.25.1.150700.17.17.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.25.1.150700.17.17.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.25.1.150700.17.17.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.25.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.25.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.25.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.25.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.25.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-15T11:09:08Z",
"details": "moderate"
}
],
"title": "CVE-2025-40164"
},
{
"cve": "CVE-2025-40168",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40168"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nsmc: Use __sk_dst_get() and dst_dev_rcu() in smc_clc_prfx_match().\n\nsmc_clc_prfx_match() is called from smc_listen_work() and\nnot under RCU nor RTNL.\n\nUsing sk_dst_get(sk)-\u003edev could trigger UAF.\n\nLet\u0027s use __sk_dst_get() and dst_dev_rcu().\n\nNote that the returned value of smc_clc_prfx_match() is not\nused in the caller.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_25-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_25-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_25-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.25.1.150700.17.17.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.25.1.150700.17.17.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.25.1.150700.17.17.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.25.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.25.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.25.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.25.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.25.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40168",
"url": "https://www.suse.com/security/cve/CVE-2025-40168"
},
{
"category": "external",
"summary": "SUSE Bug 1253427 for CVE-2025-40168",
"url": "https://bugzilla.suse.com/1253427"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_25-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_25-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_25-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.25.1.150700.17.17.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.25.1.150700.17.17.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.25.1.150700.17.17.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.25.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.25.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.25.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.25.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.25.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_25-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_25-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_25-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.25.1.150700.17.17.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.25.1.150700.17.17.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.25.1.150700.17.17.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.25.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.25.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.25.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.25.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.25.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-15T11:09:08Z",
"details": "moderate"
}
],
"title": "CVE-2025-40168"
},
{
"cve": "CVE-2025-40169",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40169"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nbpf: Reject negative offsets for ALU ops\n\nWhen verifying BPF programs, the check_alu_op() function validates\ninstructions with ALU operations. The \u0027offset\u0027 field in these\ninstructions is a signed 16-bit integer.\n\nThe existing check \u0027insn-\u003eoff \u003e 1\u0027 was intended to ensure the offset is\neither 0, or 1 for BPF_MOD/BPF_DIV. However, because \u0027insn-\u003eoff\u0027 is\nsigned, this check incorrectly accepts all negative values (e.g., -1).\n\nThis commit tightens the validation by changing the condition to\n\u0027(insn-\u003eoff != 0 \u0026\u0026 insn-\u003eoff != 1)\u0027. This ensures that any value\nother than the explicitly permitted 0 and 1 is rejected, hardening the\nverifier against malformed BPF programs.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_25-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_25-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_25-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.25.1.150700.17.17.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.25.1.150700.17.17.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.25.1.150700.17.17.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.25.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.25.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.25.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.25.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.25.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40169",
"url": "https://www.suse.com/security/cve/CVE-2025-40169"
},
{
"category": "external",
"summary": "SUSE Bug 1253416 for CVE-2025-40169",
"url": "https://bugzilla.suse.com/1253416"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_25-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_25-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_25-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.25.1.150700.17.17.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.25.1.150700.17.17.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.25.1.150700.17.17.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.25.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.25.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.25.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.25.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.25.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.8,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_25-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_25-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_25-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.25.1.150700.17.17.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.25.1.150700.17.17.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.25.1.150700.17.17.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.25.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.25.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.25.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.25.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.25.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-15T11:09:08Z",
"details": "moderate"
}
],
"title": "CVE-2025-40169"
},
{
"cve": "CVE-2025-40171",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40171"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnvmet-fc: move lsop put work to nvmet_fc_ls_req_op\n\nIt\u0027s possible for more than one async command to be in flight from\n__nvmet_fc_send_ls_req. For each command, a tgtport reference is taken.\n\nIn the current code, only one put work item is queued at a time, which\nresults in a leaked reference.\n\nTo fix this, move the work item to the nvmet_fc_ls_req_op struct, which\nalready tracks all resources related to the command.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_25-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_25-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_25-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.25.1.150700.17.17.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.25.1.150700.17.17.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.25.1.150700.17.17.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.25.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.25.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.25.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.25.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.25.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40171",
"url": "https://www.suse.com/security/cve/CVE-2025-40171"
},
{
"category": "external",
"summary": "SUSE Bug 1253412 for CVE-2025-40171",
"url": "https://bugzilla.suse.com/1253412"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_25-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_25-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_25-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.25.1.150700.17.17.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.25.1.150700.17.17.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.25.1.150700.17.17.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.25.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.25.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.25.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.25.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.25.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_25-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_25-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_25-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.25.1.150700.17.17.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.25.1.150700.17.17.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.25.1.150700.17.17.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.25.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.25.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.25.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.25.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.25.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-15T11:09:08Z",
"details": "moderate"
}
],
"title": "CVE-2025-40171"
},
{
"cve": "CVE-2025-40172",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40172"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\naccel/qaic: Treat remaining == 0 as error in find_and_map_user_pages()\n\nCurrently, if find_and_map_user_pages() takes a DMA xfer request from the\nuser with a length field set to 0, or in a rare case, the host receives\nQAIC_TRANS_DMA_XFER_CONT from the device where resources-\u003exferred_dma_size\nis equal to the requested transaction size, the function will return 0\nbefore allocating an sgt or setting the fields of the dma_xfer struct.\nIn that case, encode_addr_size_pairs() will try to access the sgt which\nwill lead to a general protection fault.\n\nReturn an EINVAL in case the user provides a zero-sized ALP, or the device\nrequests continuation after all of the bytes have been transferred.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_25-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_25-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_25-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.25.1.150700.17.17.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.25.1.150700.17.17.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.25.1.150700.17.17.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.25.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.25.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.25.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.25.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.25.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40172",
"url": "https://www.suse.com/security/cve/CVE-2025-40172"
},
{
"category": "external",
"summary": "SUSE Bug 1253424 for CVE-2025-40172",
"url": "https://bugzilla.suse.com/1253424"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_25-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_25-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_25-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.25.1.150700.17.17.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.25.1.150700.17.17.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.25.1.150700.17.17.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.25.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.25.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.25.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.25.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.25.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_25-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_25-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_25-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.25.1.150700.17.17.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.25.1.150700.17.17.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.25.1.150700.17.17.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.25.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.25.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.25.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.25.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.25.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-15T11:09:08Z",
"details": "moderate"
}
],
"title": "CVE-2025-40172"
},
{
"cve": "CVE-2025-40173",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40173"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnet/ip6_tunnel: Prevent perpetual tunnel growth\n\nSimilarly to ipv4 tunnel, ipv6 version updates dev-\u003eneeded_headroom, too.\nWhile ipv4 tunnel headroom adjustment growth was limited in\ncommit 5ae1e9922bbd (\"net: ip_tunnel: prevent perpetual headroom growth\"),\nipv6 tunnel yet increases the headroom without any ceiling.\n\nReflect ipv4 tunnel headroom adjustment limit on ipv6 version.\n\nCredits to Francesco Ruggeri, who was originally debugging this issue\nand wrote local Arista-specific patch and a reproducer.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_25-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_25-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_25-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.25.1.150700.17.17.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.25.1.150700.17.17.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.25.1.150700.17.17.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.25.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.25.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.25.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.25.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.25.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40173",
"url": "https://www.suse.com/security/cve/CVE-2025-40173"
},
{
"category": "external",
"summary": "SUSE Bug 1253421 for CVE-2025-40173",
"url": "https://bugzilla.suse.com/1253421"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_25-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_25-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_25-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.25.1.150700.17.17.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.25.1.150700.17.17.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.25.1.150700.17.17.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.25.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.25.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.25.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.25.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.25.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.7,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_25-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_25-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_25-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.25.1.150700.17.17.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.25.1.150700.17.17.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.25.1.150700.17.17.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.25.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.25.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.25.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.25.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.25.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-15T11:09:08Z",
"details": "moderate"
}
],
"title": "CVE-2025-40173"
},
{
"cve": "CVE-2025-40176",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40176"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\ntls: wait for pending async decryptions if tls_strp_msg_hold fails\n\nAsync decryption calls tls_strp_msg_hold to create a clone of the\ninput skb to hold references to the memory it uses. If we fail to\nallocate that clone, proceeding with async decryption can lead to\nvarious issues (UAF on the skb, writing into userspace memory after\nthe recv() call has returned).\n\nIn this case, wait for all pending decryption requests.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_25-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_25-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_25-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.25.1.150700.17.17.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.25.1.150700.17.17.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.25.1.150700.17.17.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.25.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.25.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.25.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.25.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.25.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40176",
"url": "https://www.suse.com/security/cve/CVE-2025-40176"
},
{
"category": "external",
"summary": "SUSE Bug 1253425 for CVE-2025-40176",
"url": "https://bugzilla.suse.com/1253425"
},
{
"category": "external",
"summary": "SUSE Bug 1254100 for CVE-2025-40176",
"url": "https://bugzilla.suse.com/1254100"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_25-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_25-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_25-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.25.1.150700.17.17.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.25.1.150700.17.17.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.25.1.150700.17.17.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.25.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.25.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.25.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.25.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.25.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_25-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_25-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_25-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.25.1.150700.17.17.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.25.1.150700.17.17.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.25.1.150700.17.17.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.25.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.25.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.25.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.25.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.25.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-15T11:09:08Z",
"details": "important"
}
],
"title": "CVE-2025-40176"
},
{
"cve": "CVE-2025-40180",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40180"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nmailbox: zynqmp-ipi: Fix out-of-bounds access in mailbox cleanup loop\n\nThe cleanup loop was starting at the wrong array index, causing\nout-of-bounds access.\nStart the loop at the correct index for zero-indexed arrays to prevent\naccessing memory beyond the allocated array bounds.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_25-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_25-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_25-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.25.1.150700.17.17.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.25.1.150700.17.17.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.25.1.150700.17.17.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.25.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.25.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.25.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.25.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.25.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40180",
"url": "https://www.suse.com/security/cve/CVE-2025-40180"
},
{
"category": "external",
"summary": "SUSE Bug 1253440 for CVE-2025-40180",
"url": "https://bugzilla.suse.com/1253440"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_25-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_25-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_25-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.25.1.150700.17.17.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.25.1.150700.17.17.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.25.1.150700.17.17.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.25.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.25.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.25.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.25.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.25.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_25-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_25-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_25-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.25.1.150700.17.17.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.25.1.150700.17.17.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.25.1.150700.17.17.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.25.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.25.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.25.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.25.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.25.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-15T11:09:08Z",
"details": "moderate"
}
],
"title": "CVE-2025-40180"
},
{
"cve": "CVE-2025-40183",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40183"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nbpf: Fix metadata_dst leak __bpf_redirect_neigh_v{4,6}\n\nCilium has a BPF egress gateway feature which forces outgoing K8s Pod\ntraffic to pass through dedicated egress gateways which then SNAT the\ntraffic in order to interact with stable IPs outside the cluster.\n\nThe traffic is directed to the gateway via vxlan tunnel in collect md\nmode. A recent BPF change utilized the bpf_redirect_neigh() helper to\nforward packets after the arrival and decap on vxlan, which turned out\nover time that the kmalloc-256 slab usage in kernel was ever-increasing.\n\nThe issue was that vxlan allocates the metadata_dst object and attaches\nit through a fake dst entry to the skb. The latter was never released\nthough given bpf_redirect_neigh() was merely setting the new dst entry\nvia skb_dst_set() without dropping an existing one first.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_25-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_25-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_25-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.25.1.150700.17.17.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.25.1.150700.17.17.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.25.1.150700.17.17.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.25.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.25.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.25.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.25.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.25.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40183",
"url": "https://www.suse.com/security/cve/CVE-2025-40183"
},
{
"category": "external",
"summary": "SUSE Bug 1253441 for CVE-2025-40183",
"url": "https://bugzilla.suse.com/1253441"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_25-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_25-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_25-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.25.1.150700.17.17.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.25.1.150700.17.17.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.25.1.150700.17.17.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.25.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.25.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.25.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.25.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.25.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_25-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_25-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_25-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.25.1.150700.17.17.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.25.1.150700.17.17.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.25.1.150700.17.17.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.25.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.25.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.25.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.25.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.25.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-15T11:09:08Z",
"details": "moderate"
}
],
"title": "CVE-2025-40183"
},
{
"cve": "CVE-2025-40185",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40185"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nice: ice_adapter: release xa entry on adapter allocation failure\n\nWhen ice_adapter_new() fails, the reserved XArray entry created by\nxa_insert() is not released. This causes subsequent insertions at\nthe same index to return -EBUSY, potentially leading to\nNULL pointer dereferences.\n\nReorder the operations as suggested by Przemek Kitszel:\n1. Check if adapter already exists (xa_load)\n2. Reserve the XArray slot (xa_reserve)\n3. Allocate the adapter (ice_adapter_new)\n4. Store the adapter (xa_store)",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_25-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_25-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_25-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.25.1.150700.17.17.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.25.1.150700.17.17.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.25.1.150700.17.17.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.25.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.25.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.25.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.25.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.25.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40185",
"url": "https://www.suse.com/security/cve/CVE-2025-40185"
},
{
"category": "external",
"summary": "SUSE Bug 1253394 for CVE-2025-40185",
"url": "https://bugzilla.suse.com/1253394"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_25-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_25-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_25-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.25.1.150700.17.17.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.25.1.150700.17.17.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.25.1.150700.17.17.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.25.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.25.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.25.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.25.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.25.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_25-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_25-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_25-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.25.1.150700.17.17.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.25.1.150700.17.17.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.25.1.150700.17.17.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.25.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.25.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.25.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.25.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.25.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-15T11:09:08Z",
"details": "moderate"
}
],
"title": "CVE-2025-40185"
},
{
"cve": "CVE-2025-40186",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40186"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\ntcp: Don\u0027t call reqsk_fastopen_remove() in tcp_conn_request().\n\nsyzbot reported the splat below in tcp_conn_request(). [0]\n\nIf a listener is close()d while a TFO socket is being processed in\ntcp_conn_request(), inet_csk_reqsk_queue_add() does not set reqsk-\u003esk\nand calls inet_child_forget(), which calls tcp_disconnect() for the\nTFO socket.\n\nAfter the cited commit, tcp_disconnect() calls reqsk_fastopen_remove(),\nwhere reqsk_put() is called due to !reqsk-\u003esk.\n\nThen, reqsk_fastopen_remove() in tcp_conn_request() decrements the\nlast req-\u003ersk_refcnt and frees reqsk, and __reqsk_free() at the\ndrop_and_free label causes the refcount underflow for the listener\nand double-free of the reqsk.\n\nLet\u0027s remove reqsk_fastopen_remove() in tcp_conn_request().\n\nNote that other callers make sure tp-\u003efastopen_rsk is not NULL.\n\n[0]:\nrefcount_t: underflow; use-after-free.\nWARNING: CPU: 12 PID: 5563 at lib/refcount.c:28 refcount_warn_saturate (lib/refcount.c:28)\nModules linked in:\nCPU: 12 UID: 0 PID: 5563 Comm: syz-executor Not tainted syzkaller #0 PREEMPT(full)\nHardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025\nRIP: 0010:refcount_warn_saturate (lib/refcount.c:28)\nCode: ab e8 8e b4 98 ff 0f 0b c3 cc cc cc cc cc 80 3d a4 e4 d6 01 00 75 9c c6 05 9b e4 d6 01 01 48 c7 c7 e8 df fb ab e8 6a b4 98 ff \u003c0f\u003e 0b e9 03 5b 76 00 cc 80 3d 7d e4 d6 01 00 0f 85 74 ff ff ff c6\nRSP: 0018:ffffa79fc0304a98 EFLAGS: 00010246\nRAX: d83af4db1c6b3900 RBX: ffff9f65c7a69020 RCX: d83af4db1c6b3900\nRDX: 0000000000000000 RSI: 00000000ffff7fff RDI: ffffffffac78a280\nRBP: 000000009d781b60 R08: 0000000000007fff R09: ffffffffac6ca280\nR10: 0000000000017ffd R11: 0000000000000004 R12: ffff9f65c7b4f100\nR13: ffff9f65c7d23c00 R14: ffff9f65c7d26000 R15: ffff9f65c7a64ef8\nFS: 00007f9f962176c0(0000) GS:ffff9f65fcf00000(0000) knlGS:0000000000000000\nCS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033\nCR2: 0000200000000180 CR3: 000000000dbbe006 CR4: 0000000000372ef0\nCall Trace:\n \u003cIRQ\u003e\n tcp_conn_request (./include/linux/refcount.h:400 ./include/linux/refcount.h:432 ./include/linux/refcount.h:450 ./include/net/sock.h:1965 ./include/net/request_sock.h:131 net/ipv4/tcp_input.c:7301)\n tcp_rcv_state_process (net/ipv4/tcp_input.c:6708)\n tcp_v6_do_rcv (net/ipv6/tcp_ipv6.c:1670)\n tcp_v6_rcv (net/ipv6/tcp_ipv6.c:1906)\n ip6_protocol_deliver_rcu (net/ipv6/ip6_input.c:438)\n ip6_input (net/ipv6/ip6_input.c:500)\n ipv6_rcv (net/ipv6/ip6_input.c:311)\n __netif_receive_skb (net/core/dev.c:6104)\n process_backlog (net/core/dev.c:6456)\n __napi_poll (net/core/dev.c:7506)\n net_rx_action (net/core/dev.c:7569 net/core/dev.c:7696)\n handle_softirqs (kernel/softirq.c:579)\n do_softirq (kernel/softirq.c:480)\n \u003c/IRQ\u003e",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_25-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_25-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_25-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.25.1.150700.17.17.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.25.1.150700.17.17.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.25.1.150700.17.17.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.25.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.25.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.25.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.25.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.25.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40186",
"url": "https://www.suse.com/security/cve/CVE-2025-40186"
},
{
"category": "external",
"summary": "SUSE Bug 1253438 for CVE-2025-40186",
"url": "https://bugzilla.suse.com/1253438"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_25-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_25-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_25-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.25.1.150700.17.17.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.25.1.150700.17.17.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.25.1.150700.17.17.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.25.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.25.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.25.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.25.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.25.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_25-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_25-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_25-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.25.1.150700.17.17.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.25.1.150700.17.17.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.25.1.150700.17.17.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.25.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.25.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.25.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.25.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.25.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-15T11:09:08Z",
"details": "important"
}
],
"title": "CVE-2025-40186"
},
{
"cve": "CVE-2025-40188",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40188"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\npwm: berlin: Fix wrong register in suspend/resume\n\nThe \u0027enable\u0027 register should be BERLIN_PWM_EN rather than\nBERLIN_PWM_ENABLE, otherwise, the driver accesses wrong address, there\nwill be cpu exception then kernel panic during suspend/resume.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_25-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_25-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_25-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.25.1.150700.17.17.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.25.1.150700.17.17.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.25.1.150700.17.17.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.25.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.25.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.25.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.25.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.25.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40188",
"url": "https://www.suse.com/security/cve/CVE-2025-40188"
},
{
"category": "external",
"summary": "SUSE Bug 1253449 for CVE-2025-40188",
"url": "https://bugzilla.suse.com/1253449"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_25-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_25-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_25-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.25.1.150700.17.17.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.25.1.150700.17.17.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.25.1.150700.17.17.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.25.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.25.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.25.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.25.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.25.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_25-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_25-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_25-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.25.1.150700.17.17.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.25.1.150700.17.17.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.25.1.150700.17.17.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.25.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.25.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.25.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.25.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.25.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-15T11:09:08Z",
"details": "moderate"
}
],
"title": "CVE-2025-40188"
},
{
"cve": "CVE-2025-40194",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40194"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\ncpufreq: intel_pstate: Fix object lifecycle issue in update_qos_request()\n\nThe cpufreq_cpu_put() call in update_qos_request() takes place too early\nbecause the latter subsequently calls freq_qos_update_request() that\nindirectly accesses the policy object in question through the QoS request\nobject passed to it.\n\nFortunately, update_qos_request() is called under intel_pstate_driver_lock,\nso this issue does not matter for changing the intel_pstate operation\nmode, but it theoretically can cause a crash to occur on CPU device hot\nremoval (which currently can only happen in virt, but it is formally\nsupported nevertheless).\n\nAddress this issue by modifying update_qos_request() to drop the\nreference to the policy later.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_25-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_25-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_25-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.25.1.150700.17.17.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.25.1.150700.17.17.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.25.1.150700.17.17.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.25.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.25.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.25.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.25.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.25.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40194",
"url": "https://www.suse.com/security/cve/CVE-2025-40194"
},
{
"category": "external",
"summary": "SUSE Bug 1253445 for CVE-2025-40194",
"url": "https://bugzilla.suse.com/1253445"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_25-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_25-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_25-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.25.1.150700.17.17.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.25.1.150700.17.17.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.25.1.150700.17.17.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.25.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.25.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.25.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.25.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.25.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.7,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_25-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_25-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_25-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.25.1.150700.17.17.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.25.1.150700.17.17.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.25.1.150700.17.17.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.25.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.25.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.25.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.25.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.25.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-15T11:09:08Z",
"details": "moderate"
}
],
"title": "CVE-2025-40194"
},
{
"cve": "CVE-2025-40198",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40198"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\next4: avoid potential buffer over-read in parse_apply_sb_mount_options()\n\nUnlike other strings in the ext4 superblock, we rely on tune2fs to\nmake sure s_mount_opts is NUL terminated. Harden\nparse_apply_sb_mount_options() by treating s_mount_opts as a potential\n__nonstring.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_25-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_25-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_25-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.25.1.150700.17.17.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.25.1.150700.17.17.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.25.1.150700.17.17.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.25.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.25.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.25.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.25.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.25.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40198",
"url": "https://www.suse.com/security/cve/CVE-2025-40198"
},
{
"category": "external",
"summary": "SUSE Bug 1253453 for CVE-2025-40198",
"url": "https://bugzilla.suse.com/1253453"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_25-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_25-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_25-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.25.1.150700.17.17.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.25.1.150700.17.17.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.25.1.150700.17.17.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.25.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.25.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.25.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.25.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.25.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_25-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_25-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_25-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.25.1.150700.17.17.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.25.1.150700.17.17.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.25.1.150700.17.17.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.25.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.25.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.25.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.25.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.25.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-15T11:09:08Z",
"details": "moderate"
}
],
"title": "CVE-2025-40198"
},
{
"cve": "CVE-2025-40200",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40200"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nSquashfs: reject negative file sizes in squashfs_read_inode()\n\nSyskaller reports a \"WARNING in ovl_copy_up_file\" in overlayfs.\n\nThis warning is ultimately caused because the underlying Squashfs file\nsystem returns a file with a negative file size.\n\nThis commit checks for a negative file size and returns EINVAL.\n\n[phillip@squashfs.org.uk: only need to check 64 bit quantity]",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_25-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_25-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_25-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.25.1.150700.17.17.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.25.1.150700.17.17.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.25.1.150700.17.17.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.25.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.25.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.25.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.25.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.25.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40200",
"url": "https://www.suse.com/security/cve/CVE-2025-40200"
},
{
"category": "external",
"summary": "SUSE Bug 1253448 for CVE-2025-40200",
"url": "https://bugzilla.suse.com/1253448"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_25-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_25-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_25-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.25.1.150700.17.17.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.25.1.150700.17.17.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.25.1.150700.17.17.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.25.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.25.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.25.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.25.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.25.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_25-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_25-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_25-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.25.1.150700.17.17.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.25.1.150700.17.17.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.25.1.150700.17.17.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.25.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.25.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.25.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.25.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.25.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-15T11:09:08Z",
"details": "moderate"
}
],
"title": "CVE-2025-40200"
},
{
"cve": "CVE-2025-40204",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40204"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nsctp: Fix MAC comparison to be constant-time\n\nTo prevent timing attacks, MACs need to be compared in constant time.\nUse the appropriate helper function for this.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_25-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_25-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_25-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.25.1.150700.17.17.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.25.1.150700.17.17.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.25.1.150700.17.17.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.25.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.25.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.25.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.25.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.25.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40204",
"url": "https://www.suse.com/security/cve/CVE-2025-40204"
},
{
"category": "external",
"summary": "SUSE Bug 1253436 for CVE-2025-40204",
"url": "https://bugzilla.suse.com/1253436"
},
{
"category": "external",
"summary": "SUSE Bug 1253437 for CVE-2025-40204",
"url": "https://bugzilla.suse.com/1253437"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_25-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_25-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_25-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.25.1.150700.17.17.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.25.1.150700.17.17.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.25.1.150700.17.17.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.25.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.25.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.25.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.25.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.25.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_25-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_25-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_25-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.25.1.150700.17.17.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.25.1.150700.17.17.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.25.1.150700.17.17.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.25.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.25.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.25.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.25.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.25.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-15T11:09:08Z",
"details": "important"
}
],
"title": "CVE-2025-40204"
},
{
"cve": "CVE-2025-40205",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40205"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nbtrfs: avoid potential out-of-bounds in btrfs_encode_fh()\n\nThe function btrfs_encode_fh() does not properly account for the three\ncases it handles.\n\nBefore writing to the file handle (fh), the function only returns to the\nuser BTRFS_FID_SIZE_NON_CONNECTABLE (5 dwords, 20 bytes) or\nBTRFS_FID_SIZE_CONNECTABLE (8 dwords, 32 bytes).\n\nHowever, when a parent exists and the root ID of the parent and the\ninode are different, the function writes BTRFS_FID_SIZE_CONNECTABLE_ROOT\n(10 dwords, 40 bytes).\n\nIf *max_len is not large enough, this write goes out of bounds because\nBTRFS_FID_SIZE_CONNECTABLE_ROOT is greater than\nBTRFS_FID_SIZE_CONNECTABLE originally returned.\n\nThis results in an 8-byte out-of-bounds write at\nfid-\u003eparent_root_objectid = parent_root_id.\n\nA previous attempt to fix this issue was made but was lost.\n\nhttps://lore.kernel.org/all/4CADAEEC020000780001B32C@vpn.id2.novell.com/\n\nAlthough this issue does not seem to be easily triggerable, it is a\npotential memory corruption bug that should be fixed. This patch\nresolves the issue by ensuring the function returns the appropriate size\nfor all three cases and validates that *max_len is large enough before\nwriting any data.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_25-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_25-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_25-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.25.1.150700.17.17.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.25.1.150700.17.17.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.25.1.150700.17.17.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.25.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.25.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.25.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.25.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.25.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40205",
"url": "https://www.suse.com/security/cve/CVE-2025-40205"
},
{
"category": "external",
"summary": "SUSE Bug 1253456 for CVE-2025-40205",
"url": "https://bugzilla.suse.com/1253456"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_25-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_25-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_25-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.25.1.150700.17.17.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.25.1.150700.17.17.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.25.1.150700.17.17.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.25.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.25.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.25.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.25.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.25.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_25-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_25-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_25-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.25.1.150700.17.17.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.25.1.150700.17.17.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.25.1.150700.17.17.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.25.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.25.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.25.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.25.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.25.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-15T11:09:08Z",
"details": "moderate"
}
],
"title": "CVE-2025-40205"
},
{
"cve": "CVE-2025-40206",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40206"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnetfilter: nft_objref: validate objref and objrefmap expressions\n\nReferencing a synproxy stateful object from OUTPUT hook causes kernel\ncrash due to infinite recursive calls:\n\nBUG: TASK stack guard page was hit at 000000008bda5b8c (stack is 000000003ab1c4a5..00000000494d8b12)\n[...]\nCall Trace:\n __find_rr_leaf+0x99/0x230\n fib6_table_lookup+0x13b/0x2d0\n ip6_pol_route+0xa4/0x400\n fib6_rule_lookup+0x156/0x240\n ip6_route_output_flags+0xc6/0x150\n __nf_ip6_route+0x23/0x50\n synproxy_send_tcp_ipv6+0x106/0x200\n synproxy_send_client_synack_ipv6+0x1aa/0x1f0\n nft_synproxy_do_eval+0x263/0x310\n nft_do_chain+0x5a8/0x5f0 [nf_tables\n nft_do_chain_inet+0x98/0x110\n nf_hook_slow+0x43/0xc0\n __ip6_local_out+0xf0/0x170\n ip6_local_out+0x17/0x70\n synproxy_send_tcp_ipv6+0x1a2/0x200\n synproxy_send_client_synack_ipv6+0x1aa/0x1f0\n[...]\n\nImplement objref and objrefmap expression validate functions.\n\nCurrently, only NFT_OBJECT_SYNPROXY object type requires validation.\nThis will also handle a jump to a chain using a synproxy object from the\nOUTPUT hook.\n\nNow when trying to reference a synproxy object in the OUTPUT hook, nft\nwill produce the following error:\n\nsynproxy_crash.nft: Error: Could not process rule: Operation not supported\n synproxy name mysynproxy\n ^^^^^^^^^^^^^^^^^^^^^^^^",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_25-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_25-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_25-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.25.1.150700.17.17.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.25.1.150700.17.17.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.25.1.150700.17.17.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.25.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.25.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.25.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.25.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.25.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40206",
"url": "https://www.suse.com/security/cve/CVE-2025-40206"
},
{
"category": "external",
"summary": "SUSE Bug 1253393 for CVE-2025-40206",
"url": "https://bugzilla.suse.com/1253393"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_25-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_25-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_25-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.25.1.150700.17.17.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.25.1.150700.17.17.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.25.1.150700.17.17.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.25.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.25.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.25.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.25.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.25.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.1,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_25-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_25-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_25-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.25.1.150700.17.17.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.25.1.150700.17.17.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.25.1.150700.17.17.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.25.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.25.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.25.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.25.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.25.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-15T11:09:08Z",
"details": "moderate"
}
],
"title": "CVE-2025-40206"
},
{
"cve": "CVE-2025-40207",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40207"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nmedia: v4l2-subdev: Fix alloc failure check in v4l2_subdev_call_state_try()\n\nv4l2_subdev_call_state_try() macro allocates a subdev state with\n__v4l2_subdev_state_alloc(), but does not check the returned value. If\n__v4l2_subdev_state_alloc fails, it returns an ERR_PTR, and that would\ncause v4l2_subdev_call_state_try() to crash.\n\nAdd proper error handling to v4l2_subdev_call_state_try().",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_25-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_25-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_25-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.25.1.150700.17.17.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.25.1.150700.17.17.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.25.1.150700.17.17.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.25.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.25.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.25.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.25.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.25.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40207",
"url": "https://www.suse.com/security/cve/CVE-2025-40207"
},
{
"category": "external",
"summary": "SUSE Bug 1253395 for CVE-2025-40207",
"url": "https://bugzilla.suse.com/1253395"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_25-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_25-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_25-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.25.1.150700.17.17.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.25.1.150700.17.17.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.25.1.150700.17.17.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.25.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.25.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.25.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.25.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.25.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_25-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_25-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_25-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.25.1.150700.17.17.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.25.1.150700.17.17.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.25.1.150700.17.17.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.25.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.25.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.25.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.25.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.25.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-15T11:09:08Z",
"details": "moderate"
}
],
"title": "CVE-2025-40207"
}
]
}
SUSE-SU-2026:20039-1
Vulnerability from csaf_suse - Published: 2026-01-07 12:33 - Updated: 2026-01-07 12:33Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Security update for the Linux Kernel",
"title": "Title of the patch"
},
{
"category": "description",
"text": "\nThe SUSE Linux Enterprise Micro 6.0 and 6.1 RT kernel was updated to receive various security bugfixes.\n\n\nThe following security bugs were fixed:\n\n- CVE-2022-50253: bpf: make sure skb-\u003elen != 0 when redirecting to a tunneling device (bsc#1249912).\n- CVE-2023-53676: scsi: target: iscsi: Fix buffer overflow in lio_target_nacl_info_show() (bsc#1251786).\n- CVE-2025-21710: tcp: correct handling of extreme memory squeeze (bsc#1237888).\n- CVE-2025-37916: pds_core: remove write-after-free of client_id (bsc#1243474).\n- CVE-2025-38359: s390/mm: Fix in_atomic() handling in do_secure_storage_access() (bsc#1247076).\n- CVE-2025-38361: drm/amd/display: Check dce_hwseq before dereferencing it (bsc#1247079).\n- CVE-2025-39788: scsi: ufs: exynos: Fix programming of HCI_UTRL_NEXUS_TYPE (bsc#1249547).\n- CVE-2025-39805: net: macb: fix unregister_netdev call order in macb_remove() (bsc#1249982).\n- CVE-2025-39819: fs/smb: Fix inconsistent refcnt update (bsc#1250176).\n- CVE-2025-39859: ptp: ocp: fix use-after-free bugs causing by ptp_ocp_watchdog (bsc#1250252).\n- CVE-2025-39944: octeontx2-pf: Fix use-after-free bugs in otx2_sync_tstamp() (bsc#1251120).\n- CVE-2025-39980: nexthop: Forbid FDB status change while nexthop is in a group (bsc#1252063).\n- CVE-2025-40001: scsi: mvsas: Fix use-after-free bugs in mvs_work_queue (bsc#1252303).\n- CVE-2025-40021: tracing: dynevent: Add a missing lockdown check on dynevent (bsc#1252681).\n- CVE-2025-40027: net/9p: fix double req put in p9_fd_cancelled (bsc#1252763).\n- CVE-2025-40030: pinctrl: check the return value of pinmux_ops::get_function_name() (bsc#1252773).\n- CVE-2025-40038: KVM: SVM: Skip fastpath emulation on VM-Exit if next RIP isn\u0027t valid (bsc#1252817).\n- CVE-2025-40040: mm/ksm: fix flag-dropping behavior in ksm_madvise (bsc#1252780).\n- CVE-2025-40048: uio_hv_generic: Let userspace take care of interrupt mask (bsc#1252862).\n- CVE-2025-40055: ocfs2: fix double free in user_cluster_connect() (bsc#1252821).\n- CVE-2025-40059: coresight: Fix incorrect handling for return value of devm_kzalloc (bsc#1252809).\n- CVE-2025-40064: smc: Fix use-after-free in __pnet_find_base_ndev() (bsc#1252845).\n- CVE-2025-40070: pps: fix warning in pps_register_cdev when register device fail (bsc#1252836).\n- CVE-2025-40074: net: dst_cache: annotate data-races around dst_cache-\u003ereset_ts (bsc#1252794).\n- CVE-2025-40075: tcp_metrics: use dst_dev_net_rcu() (bsc#1252795).\n- CVE-2025-40083: net/sched: sch_qfq: Fix null-deref in agg_dequeue (bsc#1252912).\n- CVE-2025-40098: ALSA: hda: cs35l41: Fix NULL pointer dereference in cs35l41_get_acpi_mute_state() (bsc#1252917).\n- CVE-2025-40105: vfs: Don\u0027t leak disconnected dentries on umount (bsc#1252928).\n- CVE-2025-40139: smc: Use __sk_dst_get() and dst_dev_rcu() in in smc_clc_prfx_set() (bsc#1253409).\n- CVE-2025-40149: tls: Use __sk_dst_get() and dst_dev_rcu() in get_netdev_for_sock() (bsc#1253355).\n- CVE-2025-40159: xsk: Harden userspace-supplied xdp_desc validation (bsc#1253403).\n- CVE-2025-40168: smc: Use __sk_dst_get() and dst_dev_rcu() in smc_clc_prfx_match() (bsc#1253427).\n- CVE-2025-40169: bpf: Reject negative offsets for ALU ops (bsc#1253416).\n- CVE-2025-40173: net/ip6_tunnel: Prevent perpetual tunnel growth (bsc#1253421).\n- CVE-2025-40176: tls: wait for pending async decryptions if tls_strp_msg_hold fails (bsc#1253425).\n- CVE-2025-40204: sctp: Fix MAC comparison to be constant-time (bsc#1253436).\n- CVE-2025-40206: Add missing bugzilla reference to net fix (bsc#1250237 bsc#1253393).\n\nThe following non-security bugs were fixed:\n\n- ACPI: CPPC: Check _CPC validity for only the online CPUs (git-fixes).\n- ACPI: CPPC: Limit perf ctrs in PCC check only to online CPUs (git-fixes).\n- ACPI: CPPC: Perform fast check switch only for online CPUs (git-fixes).\n- ACPI: PRM: Skip handlers with NULL handler_address or NULL VA (stable-fixes).\n- ACPI: SBS: Fix present test in acpi_battery_read() (git-fixes).\n- ACPI: property: Return present device nodes only on fwnode interface (stable-fixes).\n- ACPI: scan: Add Intel CVS ACPI HIDs to acpi_ignore_dep_ids (stable-fixes).\n- ACPICA: Update dsmethod.c to get rid of unused variable warning (stable-fixes).\n- ACPICA: dispatcher: Use acpi_ds_clear_operands() in acpi_ds_call_control_method() (stable-fixes).\n- ALSA: hda: Fix missing pointer check in hda_component_manager_init function (git-fixes).\n- ALSA: serial-generic: remove shared static buffer (stable-fixes).\n- ALSA: usb-audio: Add validation of UAC2/UAC3 effect units (stable-fixes).\n- ALSA: usb-audio: Fix NULL pointer dereference in snd_usb_mixer_controls_badd (git-fixes).\n- ALSA: usb-audio: Fix potential overflow of PCM transfer buffer (stable-fixes).\n- ALSA: usb-audio: add mono main switch to Presonus S1824c (stable-fixes).\n- ALSA: usb-audio: apply quirk for MOONDROP Quark2 (stable-fixes).\n- ALSA: usb-audio: do not log messages meant for 1810c when initializing 1824c (git-fixes).\n- ALSA: usb-audio: fix uac2 clock source at terminal parser (git-fixes).\n- ASoC: codecs: va-macro: fix resource leak in probe error path (git-fixes).\n- ASoC: cs4271: Fix regulator leak on probe failure (git-fixes).\n- ASoC: max98090/91: fixed max98091 ALSA widget powering up/down (stable-fixes).\n- ASoC: meson: aiu-encoder-i2s: fix bit clock polarity (stable-fixes).\n- ASoC: qcom: sc8280xp: explicitly set S16LE format in sc8280xp_be_hw_params_fixup() (stable-fixes).\n- ASoC: stm32: sai: manage context in set_sysclk callback (stable-fixes).\n- ASoC: tlv320aic3x: Fix class-D initialization for tlv320aic3007 (stable-fixes).\n- Bluetooth: 6lowpan: Do not hold spin lock over sleeping functions (git-fixes).\n- Bluetooth: 6lowpan: add missing l2cap_chan_lock() (git-fixes).\n- Bluetooth: 6lowpan: fix BDADDR_LE vs ADDR_LE_DEV address type confusion (git-fixes).\n- Bluetooth: 6lowpan: reset link-local header on ipv6 recv path (git-fixes).\n- Bluetooth: L2CAP: export l2cap_chan_hold for modules (stable-fixes).\n- Bluetooth: MGMT: cancel mesh send timer when hdev removed (git-fixes).\n- Bluetooth: SCO: Fix UAF on sco_conn_free (stable-fixes).\n- Bluetooth: bcsp: receive data only if registered (stable-fixes).\n- Bluetooth: btrtl: Fix memory leak in rtlbt_parse_firmware_v2() (git-fixes).\n- Bluetooth: btusb: Check for unexpected bytes when defragmenting HCI frames (stable-fixes).\n- Bluetooth: btusb: reorder cleanup in btusb_disconnect to avoid UAF (git-fixes).\n- Bluetooth: hci_event: validate skb length for unknown CC opcode (git-fixes).\n- Documentation: ACPI: i2c-muxes: fix I2C device references (git-fixes).\n- Drivers: hv: vmbus: Add utility function for querying ring size (git-fixes).\n- HID: amd_sfh: Stop sensor before starting (git-fixes).\n- HID: hid-ntrig: Prevent memory leak in ntrig_report_version() (git-fixes).\n- HID: quirks: avoid Cooler Master MM712 dongle wakeup bug (stable-fixes).\n- HID: quirks: work around VID/PID conflict for 0x4c4a/0x4155 (git-fixes).\n- HID: uclogic: Fix potential memory leak in error path (git-fixes).\n- Input: atmel_mxt_ts - allow reset GPIO to sleep (stable-fixes).\n- Input: imx_sc_key - fix memory corruption on unload (git-fixes).\n- Input: pegasus-notetaker - fix potential out-of-bounds access (git-fixes).\n- KVM: Pass new routing entries and irqfd when updating IRTEs (git-fixes).\n- KVM: SVM: Delete IRTE link from previous vCPU before setting new IRTE (git-fixes).\n- KVM: SVM: Delete IRTE link from previous vCPU irrespective of new routing (git-fixes).\n- KVM: SVM: Emulate PERF_CNTR_GLOBAL_STATUS_SET for PerfMonV2 (git-fixes).\n- KVM: SVM: Mark VMCB_LBR dirty when MSR_IA32_DEBUGCTLMSR is updated (git-fixes).\n- KVM: SVM: Re-load current, not host, TSC_AUX on #VMEXIT from SEV-ES guest (git-fixes).\n- KVM: SVM: Track per-vCPU IRTEs using kvm_kernel_irqfd structure (git-fixes).\n- KVM: SVM: WARN if an invalid posted interrupt IRTE entry is added (git-fixes).\n- KVM: VMX: Allow guest to set DEBUGCTL.RTM_DEBUG if RTM is supported (git-fixes).\n- KVM: VMX: Apply MMIO Stale Data mitigation if KVM maps MMIO into the guest (git-fixes).\n- KVM: VMX: Fix check for valid GVA on an EPT violation (git-fixes).\n- KVM: VMX: Preserve host\u0027s DEBUGCTLMSR_FREEZE_IN_SMM while running the guest (git-fixes).\n- KVM: VMX: Wrap all accesses to IA32_DEBUGCTL with getter/setter APIs (git-fixes).\n- KVM: nVMX: Check vmcs12-\u003eguest_ia32_debugctl on nested VM-Enter (git-fixes).\n- KVM: x86/mmu: Locally cache whether a PFN is host MMIO when making a SPTE (git-fixes).\n- KVM: x86: Add helper to retrieve current value of user return MSR (git-fixes).\n- KVM: x86: Convert vcpu_run()\u0027s immediate exit param into a generic bitmap (git-fixes).\n- KVM: x86: Do not treat ENTER and LEAVE as branches, because they are not (git-fixes).\n- KVM: x86: Drop kvm_x86_ops.set_dr6() in favor of a new KVM_RUN flag (git-fixes).\n- NFS4: Fix state renewals missing after boot (git-fixes).\n- NFS: check if suid/sgid was cleared after a write as needed (git-fixes).\n- NFSD: Never cache a COMPOUND when the SEQUENCE operation fails (git-fixes).\n- NFSD: Skip close replay processing if XDR encoding fails (git-fixes).\n- NFSD: free copynotify stateid in nfs4_free_ol_stateid() (git-fixes).\n- NFSv4.1: fix mount hang after CREATE_SESSION failure (git-fixes).\n- NFSv4: handle ERR_GRACE on delegation recalls (git-fixes).\n- PCI/P2PDMA: Fix incorrect pointer usage in devm_kfree() call (stable-fixes).\n- PCI/PM: Skip resuming to D0 if device is disconnected (stable-fixes).\n- PCI: Disable MSI on RDC PCI to PCIe bridges (stable-fixes).\n- PCI: cadence: Check for the existence of cdns_pcie::ops before using it (stable-fixes).\n- PCI: dwc: Verify the single eDMA IRQ in dw_pcie_edma_irq_verify() (stable-fixes).\n- PCI: j721e: Fix incorrect error message in probe() (git-fixes).\n- PCI: rcar-host: Convert struct rcar_msi mask_lock into raw spinlock (git-fixes).\n- PCI: tegra194: Reset BARs when running in PCIe endpoint mode (git-fixes).\n- RDMA/bnxt_re: Do not fail destroy QP and cleanup debugfs earlier (git-fixes)\n- RDMA/bnxt_re: Fix a potential memory leak in destroy_gsi_sqp (git-fixes)\n- RDMA/hns: Fix recv CQ and QP cache affinity (git-fixes)\n- RDMA/hns: Fix the modification of max_send_sge (git-fixes)\n- RDMA/hns: Fix wrong WQE data when QP wraps around (git-fixes)\n- RDMA/irdma: Fix SD index calculation (git-fixes)\n- RDMA/irdma: Set irdma_cq cq_num field during CQ create (git-fixes)\n- Revert \"drm/tegra: dsi: Clear enable register if powered by bootloader\" (git-fixes).\n- Revert \"wifi: ath10k: avoid unnecessary wait for service ready message\" (git-fixes).\n- accel/habanalabs/gaudi2: fix BMON disable configuration (stable-fixes).\n- accel/habanalabs/gaudi2: read preboot status after recovering from dirty state (stable-fixes).\n- accel/habanalabs: return ENOMEM if less than requested pages were pinned (stable-fixes).\n- accel/habanalabs: support mapping cb with vmalloc-backed coherent memory (stable-fixes).\n- acpi,srat: Fix incorrect device handle check for Generic Initiator (git-fixes).\n- amd/amdkfd: resolve a race in amdgpu_amdkfd_device_fini_sw (stable-fixes).\n- block: avoid possible overflow for chunk_sectors check in blk_stack_limits() (git-fixes).\n- block: fix kobject double initialization in add_disk (git-fixes).\n- btrfs: abort transaction on failure to add link to inode (git-fixes).\n- btrfs: avoid page_lockend underflow in btrfs_punch_hole_lock_range() (git-fix).\n- btrfs: avoid using fixed char array size for tree names (git-fix).\n- btrfs: do not update last_log_commit when logging inode due to a new name (git-fixes).\n- btrfs: fix COW handling in run_delalloc_nocow() (git-fix).\n- btrfs: fix inode leak on failure to add link to inode (git-fixes).\n- btrfs: make btrfs_clear_delalloc_extent() free delalloc reserve (git-fix).\n- btrfs: mark dirty extent range for out of bound prealloc extents (git-fixes).\n- btrfs: qgroup: correctly model root qgroup rsv in convert (git-fix).\n- btrfs: rename err to ret in btrfs_link() (git-fixes).\n- btrfs: run btrfs_error_commit_super() early (git-fix).\n- btrfs: scrub: put bio after errors in scrub_raid56_parity_stripe() (git-fix).\n- btrfs: scrub: put bio after errors in scrub_raid56_parity_stripe() (git-fixes).\n- btrfs: send: fix duplicated rmdir operations when using extrefs (git-fixes).\n- btrfs: set inode flag BTRFS_INODE_COPY_EVERYTHING when logging new name (git-fixes).\n- btrfs: simplify error handling logic for btrfs_link() (git-fixes).\n- btrfs: tree-checker: add dev extent item checks (git-fix).\n- btrfs: tree-checker: add type and sequence check for inline backrefs (git-fix).\n- btrfs: tree-checker: fix the wrong output of data backref objectid (git-fix).\n- btrfs: tree-checker: reject BTRFS_FT_UNKNOWN dir type (git-fix).\n- btrfs: tree-checker: validate dref root and objectid (git-fix).\n- btrfs: use smp_mb__after_atomic() when forcing COW in create_pending_snapshot() (git-fixes).\n- char: misc: Does not request module for miscdevice with dynamic minor (stable-fixes).\n- char: misc: Make misc_register() reentry for miscdevice who wants dynamic minor (stable-fixes).\n- char: misc: restrict the dynamic range to exclude reserved minors (stable-fixes).\n- cramfs: Verify inode mode when loading from disk (git-fixes).\n- crypto: aspeed - fix double free caused by devm (git-fixes).\n- crypto: aspeed-acry - Convert to platform remove callback returning void (stable-fixes).\n- crypto: hisilicon/qm - Fix device reference leak in qm_get_qos_value (git-fixes).\n- crypto: iaa - Do not clobber req-\u003ebase.data (git-fixes).\n- crypto: qat - use kcalloc() in qat_uclo_map_objs_from_mof() (stable-fixes).\n- dmaengine: dw-edma: Set status for callback_result (stable-fixes).\n- dmaengine: mv_xor: match alloc_wc and free_wc (stable-fixes).\n- drm/amd/display: Add AVI infoframe copy in copy_stream_update_to_stream (stable-fixes).\n- drm/amd/display: Disable VRR on DCE 6 (stable-fixes).\n- drm/amd/display: Fix DVI-D/HDMI adapters (stable-fixes).\n- drm/amd/display: Fix NULL deref in debugfs odm_combine_segments (git-fixes).\n- drm/amd/display: Fix black screen with HDMI outputs (git-fixes).\n- drm/amd/display: Increase AUX Intra-Hop Done Max Wait Duration (stable-fixes).\n- drm/amd/display: add more cyan skillfish devices (stable-fixes).\n- drm/amd/display: ensure committing streams is seamless (stable-fixes).\n- drm/amd/display: update dpp/disp clock from smu clock table (stable-fixes).\n- drm/amd/pm: Disable MCLK switching on SI at high pixel clocks (stable-fixes).\n- drm/amd/pm: Use cached metrics data on aldebaran (stable-fixes).\n- drm/amd/pm: Use cached metrics data on arcturus (stable-fixes).\n- drm/amd: Avoid evicting resources at S5 (stable-fixes).\n- drm/amd: Fix suspend failure with secure display TA (git-fixes).\n- drm/amd: add more cyan skillfish PCI ids (stable-fixes).\n- drm/amdgpu/jpeg: Hold pg_lock before jpeg poweroff (stable-fixes).\n- drm/amdgpu: Allow kfd CRIU with no buffer objects (stable-fixes).\n- drm/amdgpu: Fix NULL pointer dereference in VRAM logic for APU devices (stable-fixes).\n- drm/amdgpu: Use memdup_array_user in amdgpu_cs_wait_fences_ioctl (stable-fixes).\n- drm/amdgpu: add support for cyan skillfish gpu_info (stable-fixes).\n- drm/amdgpu: do not enable SMU on cyan skillfish (stable-fixes).\n- drm/amdgpu: reject gang submissions under SRIOV (stable-fixes).\n- drm/amdkfd: Handle lack of READ permissions in SVM mapping (stable-fixes).\n- drm/amdkfd: Tie UNMAP_LATENCY to queue_preemption (stable-fixes).\n- drm/amdkfd: fix vram allocation failure for a special case (stable-fixes).\n- drm/amdkfd: return -ENOTTY for unsupported IOCTLs (stable-fixes).\n- drm/bridge: cdns-dsi: Do not fail on MIPI_DSI_MODE_VIDEO_BURST (stable-fixes).\n- drm/bridge: cdns-dsi: Fix REG_WAKEUP_TIME value (stable-fixes).\n- drm/bridge: display-connector: do not set OP_DETECT for DisplayPorts (stable-fixes).\n- drm/i915: Avoid lock inversion when pinning to GGTT on CHV/BXT+VTD (git-fixes).\n- drm/i915: Fix conversion between clock ticks and nanoseconds (git-fixes).\n- drm/msm/dsi/phy: Toggle back buffer resync after preparing PLL (stable-fixes).\n- drm/msm/dsi/phy_7nm: Fix missing initial VCO rate (stable-fixes).\n- drm/msm: make sure to not queue up recovery more than once (stable-fixes).\n- drm/nouveau: replace snprintf() with scnprintf() in nvkm_snprintbf() (stable-fixes).\n- drm/sched: Fix deadlock in drm_sched_entity_kill_jobs_cb (git-fixes).\n- drm/tegra: Add call to put_pid() (git-fixes).\n- drm/tegra: dc: Fix reference leak in tegra_dc_couple() (git-fixes).\n- drm/tidss: Set crtc modesetting parameters with adjusted mode (stable-fixes).\n- drm/tidss: Use the crtc_* timings when programming the HW (stable-fixes).\n- drm/vmwgfx: Validate command header size against SVGA_CMD_MAX_DATASIZE (git-fixes).\n- exfat: limit log print for IO error (git-fixes).\n- extcon: adc-jack: Cleanup wakeup source only if it was enabled (git-fixes).\n- extcon: adc-jack: Fix wakeup source leaks on device unbind (stable-fixes).\n- fbcon: Set fb_display[i]-\u003emode to NULL when the mode is released (stable-fixes).\n- fbdev: Add bounds checking in bit_putcs to fix vmalloc-out-of-bounds (stable-fixes).\n- fbdev: bitblit: bound-check glyph index in bit_putcs* (stable-fixes).\n- fbdev: pvr2fb: Fix leftover reference to ONCHIP_NR_DMA_CHANNELS (stable-fixes).\n- hwmon: (asus-ec-sensors) increase timeout for locking ACPI mutex (stable-fixes).\n- hwmon: (dell-smm) Add support for Dell OptiPlex 7040 (stable-fixes).\n- hwmon: (k10temp) Add device ID for Strix Halo (stable-fixes).\n- hwmon: (k10temp) Add thermal support for AMD Family 1Ah-based models (stable-fixes).\n- hwmon: (sbtsi_temp) AMD CPU extended temperature range support (stable-fixes).\n- hwmon: sy7636a: add alias (stable-fixes).\n- iio: adc: imx93_adc: load calibrated values even calibration failed (stable-fixes).\n- iio: adc: spear_adc: mask SPEAR_ADC_STATUS channel and avg sample before setting register (stable-fixes).\n- ima: do not clear IMA_DIGSIG flag when setting or removing non-IMA xattr (stable-fixes).\n- iommu/amd: Return an error if vCPU affinity is set for non-vCPU IRTE (git-fixes).\n- isdn: mISDN: hfcsusb: fix memory leak in hfcsusb_probe() (git-fixes).\n- jfs: Verify inode mode when loading from disk (git-fixes).\n- jfs: fix uninitialized waitqueue in transaction manager (git-fixes).\n- kABI fix for KVM: VMX: Apply MMIO Stale Data mitigation if KVM maps MMIO into the guest (git-fixes) (git-fixes).\n- lib/crypto: curve25519-hacl64: Fix older clang KASAN workaround for GCC (git-fixes).\n- md/raid1: fix data lost for writemostly rdev (git-fixes).\n- md: fix mssing blktrace bio split events (git-fixes).\n- media: adv7180: Add missing lock in suspend callback (stable-fixes).\n- media: adv7180: Do not write format to device in set_fmt (stable-fixes).\n- media: adv7180: Only validate format in querystd (stable-fixes).\n- media: amphion: Delete v4l2_fh synchronously in .release() (stable-fixes).\n- media: fix uninitialized symbol warnings (stable-fixes).\n- media: i2c: Kconfig: Ensure a dependency on HAVE_CLK for VIDEO_CAMERA_SENSOR (stable-fixes).\n- media: i2c: og01a1b: Specify monochrome media bus format instead of Bayer (stable-fixes).\n- media: imon: make send_packet() more robust (stable-fixes).\n- media: ov08x40: Fix the horizontal flip control (stable-fixes).\n- media: redrat3: use int type to store negative error codes (stable-fixes).\n- media: uvcvideo: Use heuristic to find stream entity (git-fixes).\n- memstick: Add timeout to prevent indefinite waiting (stable-fixes).\n- mfd: da9063: Split chip variant reading in two bus transactions (stable-fixes).\n- mfd: madera: Work around false-positive -Wininitialized warning (stable-fixes).\n- mfd: stmpe-i2c: Add missing MODULE_LICENSE (stable-fixes).\n- mfd: stmpe: Remove IRQ domain upon removal (stable-fixes).\n- minixfs: Verify inode mode when loading from disk (git-fixes).\n- mm/mm_init: fix hash table order logging in alloc_large_system_hash() (git-fixes).\n- mm/secretmem: fix use-after-free race in fault handler (git-fixes).\n- mmc: host: renesas_sdhi: Fix the actual clock (stable-fixes).\n- mmc: sdhci-msm: Enable tuning for SDR50 mode for SD card (stable-fixes).\n- mmc: sdhci-of-dwcmshc: Change DLL_STRBIN_TAPNUM_DEFAULT to 0x4 (git-fixes).\n- mtd: onenand: Pass correct pointer to IRQ handler (git-fixes).\n- mtd: rawnand: cadence: fix DMA device NULL pointer dereference (git-fixes).\n- mtdchar: fix integer overflow in read/write ioctls (git-fixes).\n- net/mana: fix warning in the writer of client oob (git-fixes).\n- net/smc: Remove validation of reserved bits in CLC Decline message (bsc#1253779).\n- net: nfc: nci: Increase NCI_DATA_TIMEOUT to 3000 ms (stable-fixes).\n- net: phy: clear link parameters on admin link down (stable-fixes).\n- net: phy: fixed_phy: let fixed_phy_unregister free the phy_device (stable-fixes).\n- net: phy: marvell: Fix 88e1510 downshift counter errata (stable-fixes).\n- net: tcp: send zero-window ACK when no memory (bsc#1253779).\n- net: usb: qmi_wwan: initialize MAC header offset in qmimux_rx_fixup (git-fixes).\n- nfs4_setup_readdir(): insufficient locking for -\u003ed_parent-\u003ed_inode dereferencing (git-fixes).\n- nfsd: do not defer requests during idmap lookup in v4 compound decode (bsc#1232223).\n- nfsd: fix return error codes for nfsd_map_name_to_id (bsc#1232223).\n- nouveau/firmware: Add missing kfree() of nvkm_falcon_fw::boot (git-fixes).\n- perf script: add --addr2line option (bsc#1247509).\n- phy: cadence: cdns-dphy: Enable lower resolutions in dphy (stable-fixes).\n- phy: renesas: r8a779f0-ether-serdes: add new step added to latest datasheet (stable-fixes).\n- phy: rockchip: phy-rockchip-inno-csidphy: allow writes to grf register 0 (stable-fixes).\n- pinctrl: s32cc: fix uninitialized memory in s32_pinctrl_desc (git-fixes).\n- pinctrl: s32cc: initialize gpio_pin_config::list after kmalloc() (git-fixes).\n- pinctrl: single: fix bias pull up/down handling in pin_config_set (stable-fixes).\n- platform/x86/intel/speed_select_if: Convert PCIBIOS_* return codes to errnos (git-fixes).\n- power: supply: qcom_battmgr: add OOI chemistry (stable-fixes).\n- power: supply: qcom_battmgr: handle charging state change notifications (stable-fixes).\n- power: supply: sbs-charger: Support multiple devices (stable-fixes).\n- regulator: fixed: fix GPIO descriptor leak on register failure (git-fixes).\n- rtc: rx8025: fix incorrect register reference (git-fixes).\n- s390/mm,fault: simplify kfence fault handling (bsc#1247076).\n- scsi: Fix sas_user_scan() to handle wildcard and multi-channel scans (git-fixes).\n- scsi: aacraid: Stop using PCI_IRQ_AFFINITY (git-fixes).\n- scsi: core: sysfs: Correct sysfs attributes access rights (git-fixes).\n- scsi: hpsa: Fix potential memory leak in hpsa_big_passthru_ioctl() (git-fixes).\n- scsi: libfc: Prevent integer overflow in fc_fcp_recv_data() (git-fixes).\n- scsi: mpi3mr: Correctly handle ATA device errors (git-fixes).\n- scsi: mpi3mr: Drop unnecessary volatile from __iomem pointers (git-fixes).\n- scsi: mpt3sas: Correctly handle ATA device errors (git-fixes).\n- scsi: mpt3sas: Fix crash in transport port remove by using ioc_info() (git-fixes).\n- scsi: pm80xx: Fix array-index-out-of-of-bounds on rmmod (git-fixes).\n- scsi: storvsc: Prefer returning channel with the same CPU as on the I/O issuing CPU (bsc#1252267).\n- selftests/bpf: Close fd in error path in drop_on_reuseport (git-fixes).\n- selftests/bpf: Close obj in error path in xdp_adjust_tail (git-fixes).\n- selftests/bpf: Fix missing ARRAY_SIZE() definition in bench.c (git-fixes).\n- selftests/bpf: Fix missing BUILD_BUG_ON() declaration (git-fixes).\n- selftests/bpf: Fix missing UINT_MAX definitions in benchmarks (git-fixes).\n- selftests/bpf: Fix string read in strncmp benchmark (git-fixes).\n- selftests/bpf: Use pid_t consistently in test_progs.c (git-fixes).\n- selftests/bpf: fix signedness bug in redir_partial() (git-fixes).\n- serial: 8250_exar: add support for Advantech 2 port card with Device ID 0x0018 (git-fixes).\n- serial: 8250_mtk: Enable baud clock and manage in runtime PM (git-fixes).\n- soc/tegra: fuse: Add Tegra114 nvmem cells and fuse lookups (stable-fixes).\n- soc: aspeed: socinfo: Add AST27xx silicon IDs (stable-fixes).\n- soc: qcom: smem: Fix endian-unaware access of num_entries (stable-fixes).\n- spi: Try to get ACPI GPIO IRQ earlier (git-fixes).\n- spi: loopback-test: Do not use %pK through printk (stable-fixes).\n- spi: rpc-if: Add resume support for RZ/G3E (stable-fixes).\n- strparser: Fix signed/unsigned mismatch bug (git-fixes).\n- tcp_bpf: Call sk_msg_free() when tcp_bpf_send_verdict() fails to allocate psock-\u003ecork (bsc#1250705).\n- thunderbolt: Use is_pciehp instead of is_hotplug_bridge (stable-fixes).\n- tools/cpupower: Fix incorrect size in cpuidle_state_disable() (stable-fixes).\n- tools/cpupower: fix error return value in cpupower_write_sysfs() (stable-fixes).\n- tools/power x86_energy_perf_policy: Enhance HWP enable (stable-fixes).\n- tools/power x86_energy_perf_policy: Fix incorrect fopen mode usage (stable-fixes).\n- tools/power x86_energy_perf_policy: Prefer driver HWP limits (stable-fixes).\n- tools: lib: thermal: do not preserve owner in install (stable-fixes).\n- tools: lib: thermal: use pkg-config to locate libnl3 (stable-fixes).\n- uio_hv_generic: Query the ringbuffer size for device (git-fixes).\n- usb/core/quirks: Add Huawei ME906S to wakeup quirk (git-fixes).\n- usb: cdns3: gadget: Use-after-free during failed initialization and exit of cdnsp gadget (stable-fixes).\n- usb: gadget: f_fs: Fix epfile null pointer access after ep enable (stable-fixes).\n- usb: gadget: f_hid: Fix zero length packet transfer (stable-fixes).\n- usb: gadget: f_ncm: Fix MAC assignment NCM ethernet (stable-fixes).\n- usb: mon: Increase BUFF_MAX to 64 MiB to support multi-MB URBs (stable-fixes).\n- usb: xhci: plat: Facilitate using autosuspend for xhci plat devices (stable-fixes).\n- video: backlight: lp855x_bl: Set correct EPROM start for LP8556 (stable-fixes).\n- watchdog: s3c2410_wdt: Fix max_timeout being calculated larger (stable-fixes).\n- wifi: ath10k: Fix connection after GTK rekeying (stable-fixes).\n- wifi: ath11k: zero init info-\u003estatus in wmi_process_mgmt_tx_comp() (git-fixes).\n- wifi: ath12k: Increase DP_REO_CMD_RING_SIZE to 256 (stable-fixes).\n- wifi: mac80211: Fix HE capabilities element check (stable-fixes).\n- wifi: mac80211: reject address change while connecting (git-fixes).\n- wifi: mac80211: skip rate verification for not captured PSDUs (git-fixes).\n- wifi: mac80211_hwsim: Limit destroy_on_close radio removal to netgroup (git-fixes).\n- wifi: mt76: mt7921: Add 160MHz beamformee capability for mt7922 device (stable-fixes).\n- wifi: mt76: mt7996: Temporarily disable EPCS (stable-fixes).\n- wifi: mwl8k: inject DSSS Parameter Set element into beacons if missing (git-fixes).\n- wifi: rtw88: sdio: use indirect IO for device registers before power-on (stable-fixes).\n- wifi: zd1211rw: fix potential memory leak in __zd_usb_enable_rx() (git-fixes).\n- x86/CPU/AMD: Add RDSEED fix for Zen5 (git-fixes).\n- x86/CPU/AMD: Add additional fixed RDSEED microcode revisions (git-fixes).\n- x86/CPU/AMD: Add missing terminator for zen5_rdseed_microcode (git-fixes).\n- x86/CPU/AMD: Do the common init on future Zens too (git-fixes).\n- x86/amd_nb: Add new PCI IDs for AMD family 0x1a (stable-fixes).\n- x86/bugs: Fix reporting of LFENCE retpoline (git-fixes).\n- x86/bugs: Report correct retbleed mitigation status (git-fixes).\n- x86/vmscape: Add old Intel CPUs to affected list (git-fixes).\n- xhci: dbc: Allow users to modify DbC poll interval via sysfs (stable-fixes).\n- xhci: dbc: Avoid event polling busyloop if pending rx transfers are inactive (git-fixes).\n- xhci: dbc: Improve performance by removing delay in transfer event polling (stable-fixes).\n- xhci: dbc: fix bogus 1024 byte prefix if ttyDBC read races with stall event (git-fixes).\n- xhci: dbc: poll at different rate depending on data transfer activity (stable-fixes).\n",
"title": "Description of the patch"
},
{
"category": "details",
"text": "SUSE-SLE-Micro-6.0-kernel-230",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2026_20039-1.json"
},
{
"category": "self",
"summary": "URL for SUSE-SU-2026:20039-1",
"url": "https://www.suse.com/support/update/announcement/2026/suse-su-202620039-1/"
},
{
"category": "self",
"summary": "E-Mail link for SUSE-SU-2026:20039-1",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-January/023767.html"
},
{
"category": "self",
"summary": "SUSE Bug 1232223",
"url": "https://bugzilla.suse.com/1232223"
},
{
"category": "self",
"summary": "SUSE Bug 1237888",
"url": "https://bugzilla.suse.com/1237888"
},
{
"category": "self",
"summary": "SUSE Bug 1243474",
"url": "https://bugzilla.suse.com/1243474"
},
{
"category": "self",
"summary": "SUSE Bug 1245193",
"url": "https://bugzilla.suse.com/1245193"
},
{
"category": "self",
"summary": "SUSE Bug 1247076",
"url": "https://bugzilla.suse.com/1247076"
},
{
"category": "self",
"summary": "SUSE Bug 1247079",
"url": "https://bugzilla.suse.com/1247079"
},
{
"category": "self",
"summary": "SUSE Bug 1247500",
"url": "https://bugzilla.suse.com/1247500"
},
{
"category": "self",
"summary": "SUSE Bug 1247509",
"url": "https://bugzilla.suse.com/1247509"
},
{
"category": "self",
"summary": "SUSE Bug 1249547",
"url": "https://bugzilla.suse.com/1249547"
},
{
"category": "self",
"summary": "SUSE Bug 1249912",
"url": "https://bugzilla.suse.com/1249912"
},
{
"category": "self",
"summary": "SUSE Bug 1249982",
"url": "https://bugzilla.suse.com/1249982"
},
{
"category": "self",
"summary": "SUSE Bug 1250176",
"url": "https://bugzilla.suse.com/1250176"
},
{
"category": "self",
"summary": "SUSE Bug 1250237",
"url": "https://bugzilla.suse.com/1250237"
},
{
"category": "self",
"summary": "SUSE Bug 1250252",
"url": "https://bugzilla.suse.com/1250252"
},
{
"category": "self",
"summary": "SUSE Bug 1250705",
"url": "https://bugzilla.suse.com/1250705"
},
{
"category": "self",
"summary": "SUSE Bug 1251120",
"url": "https://bugzilla.suse.com/1251120"
},
{
"category": "self",
"summary": "SUSE Bug 1251786",
"url": "https://bugzilla.suse.com/1251786"
},
{
"category": "self",
"summary": "SUSE Bug 1252063",
"url": "https://bugzilla.suse.com/1252063"
},
{
"category": "self",
"summary": "SUSE Bug 1252267",
"url": "https://bugzilla.suse.com/1252267"
},
{
"category": "self",
"summary": "SUSE Bug 1252303",
"url": "https://bugzilla.suse.com/1252303"
},
{
"category": "self",
"summary": "SUSE Bug 1252353",
"url": "https://bugzilla.suse.com/1252353"
},
{
"category": "self",
"summary": "SUSE Bug 1252681",
"url": "https://bugzilla.suse.com/1252681"
},
{
"category": "self",
"summary": "SUSE Bug 1252763",
"url": "https://bugzilla.suse.com/1252763"
},
{
"category": "self",
"summary": "SUSE Bug 1252773",
"url": "https://bugzilla.suse.com/1252773"
},
{
"category": "self",
"summary": "SUSE Bug 1252780",
"url": "https://bugzilla.suse.com/1252780"
},
{
"category": "self",
"summary": "SUSE Bug 1252794",
"url": "https://bugzilla.suse.com/1252794"
},
{
"category": "self",
"summary": "SUSE Bug 1252795",
"url": "https://bugzilla.suse.com/1252795"
},
{
"category": "self",
"summary": "SUSE Bug 1252809",
"url": "https://bugzilla.suse.com/1252809"
},
{
"category": "self",
"summary": "SUSE Bug 1252817",
"url": "https://bugzilla.suse.com/1252817"
},
{
"category": "self",
"summary": "SUSE Bug 1252821",
"url": "https://bugzilla.suse.com/1252821"
},
{
"category": "self",
"summary": "SUSE Bug 1252836",
"url": "https://bugzilla.suse.com/1252836"
},
{
"category": "self",
"summary": "SUSE Bug 1252845",
"url": "https://bugzilla.suse.com/1252845"
},
{
"category": "self",
"summary": "SUSE Bug 1252862",
"url": "https://bugzilla.suse.com/1252862"
},
{
"category": "self",
"summary": "SUSE Bug 1252912",
"url": "https://bugzilla.suse.com/1252912"
},
{
"category": "self",
"summary": "SUSE Bug 1252917",
"url": "https://bugzilla.suse.com/1252917"
},
{
"category": "self",
"summary": "SUSE Bug 1252928",
"url": "https://bugzilla.suse.com/1252928"
},
{
"category": "self",
"summary": "SUSE Bug 1253018",
"url": "https://bugzilla.suse.com/1253018"
},
{
"category": "self",
"summary": "SUSE Bug 1253176",
"url": "https://bugzilla.suse.com/1253176"
},
{
"category": "self",
"summary": "SUSE Bug 1253275",
"url": "https://bugzilla.suse.com/1253275"
},
{
"category": "self",
"summary": "SUSE Bug 1253318",
"url": "https://bugzilla.suse.com/1253318"
},
{
"category": "self",
"summary": "SUSE Bug 1253324",
"url": "https://bugzilla.suse.com/1253324"
},
{
"category": "self",
"summary": "SUSE Bug 1253349",
"url": "https://bugzilla.suse.com/1253349"
},
{
"category": "self",
"summary": "SUSE Bug 1253352",
"url": "https://bugzilla.suse.com/1253352"
},
{
"category": "self",
"summary": "SUSE Bug 1253355",
"url": "https://bugzilla.suse.com/1253355"
},
{
"category": "self",
"summary": "SUSE Bug 1253360",
"url": "https://bugzilla.suse.com/1253360"
},
{
"category": "self",
"summary": "SUSE Bug 1253362",
"url": "https://bugzilla.suse.com/1253362"
},
{
"category": "self",
"summary": "SUSE Bug 1253363",
"url": "https://bugzilla.suse.com/1253363"
},
{
"category": "self",
"summary": "SUSE Bug 1253367",
"url": "https://bugzilla.suse.com/1253367"
},
{
"category": "self",
"summary": "SUSE Bug 1253369",
"url": "https://bugzilla.suse.com/1253369"
},
{
"category": "self",
"summary": "SUSE Bug 1253393",
"url": "https://bugzilla.suse.com/1253393"
},
{
"category": "self",
"summary": "SUSE Bug 1253395",
"url": "https://bugzilla.suse.com/1253395"
},
{
"category": "self",
"summary": "SUSE Bug 1253403",
"url": "https://bugzilla.suse.com/1253403"
},
{
"category": "self",
"summary": "SUSE Bug 1253407",
"url": "https://bugzilla.suse.com/1253407"
},
{
"category": "self",
"summary": "SUSE Bug 1253409",
"url": "https://bugzilla.suse.com/1253409"
},
{
"category": "self",
"summary": "SUSE Bug 1253412",
"url": "https://bugzilla.suse.com/1253412"
},
{
"category": "self",
"summary": "SUSE Bug 1253416",
"url": "https://bugzilla.suse.com/1253416"
},
{
"category": "self",
"summary": "SUSE Bug 1253421",
"url": "https://bugzilla.suse.com/1253421"
},
{
"category": "self",
"summary": "SUSE Bug 1253423",
"url": "https://bugzilla.suse.com/1253423"
},
{
"category": "self",
"summary": "SUSE Bug 1253424",
"url": "https://bugzilla.suse.com/1253424"
},
{
"category": "self",
"summary": "SUSE Bug 1253425",
"url": "https://bugzilla.suse.com/1253425"
},
{
"category": "self",
"summary": "SUSE Bug 1253427",
"url": "https://bugzilla.suse.com/1253427"
},
{
"category": "self",
"summary": "SUSE Bug 1253428",
"url": "https://bugzilla.suse.com/1253428"
},
{
"category": "self",
"summary": "SUSE Bug 1253431",
"url": "https://bugzilla.suse.com/1253431"
},
{
"category": "self",
"summary": "SUSE Bug 1253436",
"url": "https://bugzilla.suse.com/1253436"
},
{
"category": "self",
"summary": "SUSE Bug 1253438",
"url": "https://bugzilla.suse.com/1253438"
},
{
"category": "self",
"summary": "SUSE Bug 1253440",
"url": "https://bugzilla.suse.com/1253440"
},
{
"category": "self",
"summary": "SUSE Bug 1253441",
"url": "https://bugzilla.suse.com/1253441"
},
{
"category": "self",
"summary": "SUSE Bug 1253445",
"url": "https://bugzilla.suse.com/1253445"
},
{
"category": "self",
"summary": "SUSE Bug 1253448",
"url": "https://bugzilla.suse.com/1253448"
},
{
"category": "self",
"summary": "SUSE Bug 1253449",
"url": "https://bugzilla.suse.com/1253449"
},
{
"category": "self",
"summary": "SUSE Bug 1253453",
"url": "https://bugzilla.suse.com/1253453"
},
{
"category": "self",
"summary": "SUSE Bug 1253456",
"url": "https://bugzilla.suse.com/1253456"
},
{
"category": "self",
"summary": "SUSE Bug 1253472",
"url": "https://bugzilla.suse.com/1253472"
},
{
"category": "self",
"summary": "SUSE Bug 1253779",
"url": "https://bugzilla.suse.com/1253779"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-50253 page",
"url": "https://www.suse.com/security/cve/CVE-2022-50253/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2023-53676 page",
"url": "https://www.suse.com/security/cve/CVE-2023-53676/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-21710 page",
"url": "https://www.suse.com/security/cve/CVE-2025-21710/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-37916 page",
"url": "https://www.suse.com/security/cve/CVE-2025-37916/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-38359 page",
"url": "https://www.suse.com/security/cve/CVE-2025-38359/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-38361 page",
"url": "https://www.suse.com/security/cve/CVE-2025-38361/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-39788 page",
"url": "https://www.suse.com/security/cve/CVE-2025-39788/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-39805 page",
"url": "https://www.suse.com/security/cve/CVE-2025-39805/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-39819 page",
"url": "https://www.suse.com/security/cve/CVE-2025-39819/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-39859 page",
"url": "https://www.suse.com/security/cve/CVE-2025-39859/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-39944 page",
"url": "https://www.suse.com/security/cve/CVE-2025-39944/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-39980 page",
"url": "https://www.suse.com/security/cve/CVE-2025-39980/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40001 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40001/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40021 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40021/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40027 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40027/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40030 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40030/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40038 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40038/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40040 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40040/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40048 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40048/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40055 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40055/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40059 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40059/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40064 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40064/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40070 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40070/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40074 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40074/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40075 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40075/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40083 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40083/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40098 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40098/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40105 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40105/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40107 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40107/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40109 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40109/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40110 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40110/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40111 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40111/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40115 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40115/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40116 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40116/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40118 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40118/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40120 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40120/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40121 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40121/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40127 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40127/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40129 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40129/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40139 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40139/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40140 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40140/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40141 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40141/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40149 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40149/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40154 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40154/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40156 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40156/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40157 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40157/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40159 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40159/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40164 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40164/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40168 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40168/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40169 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40169/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40171 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40171/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40172 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40172/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40173 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40173/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40176 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40176/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40180 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40180/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40183 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40183/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40186 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40186/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40188 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40188/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40194 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40194/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40198 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40198/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40200 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40200/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40204 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40204/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40205 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40205/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40206 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40206/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40207 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40207/"
}
],
"title": "Security update for the Linux Kernel",
"tracking": {
"current_release_date": "2026-01-07T12:33:45Z",
"generator": {
"date": "2026-01-07T12:33:45Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "SUSE-SU-2026:20039-1",
"initial_release_date": "2026-01-07T12:33:45Z",
"revision_history": [
{
"date": "2026-01-07T12:33:45Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "kernel-devel-rt-6.4.0-39.1.noarch",
"product": {
"name": "kernel-devel-rt-6.4.0-39.1.noarch",
"product_id": "kernel-devel-rt-6.4.0-39.1.noarch"
}
},
{
"category": "product_version",
"name": "kernel-source-rt-6.4.0-39.1.noarch",
"product": {
"name": "kernel-source-rt-6.4.0-39.1.noarch",
"product_id": "kernel-source-rt-6.4.0-39.1.noarch"
}
}
],
"category": "architecture",
"name": "noarch"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-rt-6.4.0-39.1.x86_64",
"product": {
"name": "kernel-rt-6.4.0-39.1.x86_64",
"product_id": "kernel-rt-6.4.0-39.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-rt-livepatch-6.4.0-39.1.x86_64",
"product": {
"name": "kernel-rt-livepatch-6.4.0-39.1.x86_64",
"product_id": "kernel-rt-livepatch-6.4.0-39.1.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "SUSE Linux Micro 6.0",
"product": {
"name": "SUSE Linux Micro 6.0",
"product_id": "SUSE Linux Micro 6.0",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sl-micro:6.0"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-rt-6.4.0-39.1.noarch as component of SUSE Linux Micro 6.0",
"product_id": "SUSE Linux Micro 6.0:kernel-devel-rt-6.4.0-39.1.noarch"
},
"product_reference": "kernel-devel-rt-6.4.0-39.1.noarch",
"relates_to_product_reference": "SUSE Linux Micro 6.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-6.4.0-39.1.x86_64 as component of SUSE Linux Micro 6.0",
"product_id": "SUSE Linux Micro 6.0:kernel-rt-6.4.0-39.1.x86_64"
},
"product_reference": "kernel-rt-6.4.0-39.1.x86_64",
"relates_to_product_reference": "SUSE Linux Micro 6.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-livepatch-6.4.0-39.1.x86_64 as component of SUSE Linux Micro 6.0",
"product_id": "SUSE Linux Micro 6.0:kernel-rt-livepatch-6.4.0-39.1.x86_64"
},
"product_reference": "kernel-rt-livepatch-6.4.0-39.1.x86_64",
"relates_to_product_reference": "SUSE Linux Micro 6.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-source-rt-6.4.0-39.1.noarch as component of SUSE Linux Micro 6.0",
"product_id": "SUSE Linux Micro 6.0:kernel-source-rt-6.4.0-39.1.noarch"
},
"product_reference": "kernel-source-rt-6.4.0-39.1.noarch",
"relates_to_product_reference": "SUSE Linux Micro 6.0"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2022-50253",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-50253"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nbpf: make sure skb-\u003elen != 0 when redirecting to a tunneling device\n\nsyzkaller managed to trigger another case where skb-\u003elen == 0\nwhen we enter __dev_queue_xmit:\n\nWARNING: CPU: 0 PID: 2470 at include/linux/skbuff.h:2576 skb_assert_len include/linux/skbuff.h:2576 [inline]\nWARNING: CPU: 0 PID: 2470 at include/linux/skbuff.h:2576 __dev_queue_xmit+0x2069/0x35e0 net/core/dev.c:4295\n\nCall Trace:\n dev_queue_xmit+0x17/0x20 net/core/dev.c:4406\n __bpf_tx_skb net/core/filter.c:2115 [inline]\n __bpf_redirect_no_mac net/core/filter.c:2140 [inline]\n __bpf_redirect+0x5fb/0xda0 net/core/filter.c:2163\n ____bpf_clone_redirect net/core/filter.c:2447 [inline]\n bpf_clone_redirect+0x247/0x390 net/core/filter.c:2419\n bpf_prog_48159a89cb4a9a16+0x59/0x5e\n bpf_dispatcher_nop_func include/linux/bpf.h:897 [inline]\n __bpf_prog_run include/linux/filter.h:596 [inline]\n bpf_prog_run include/linux/filter.h:603 [inline]\n bpf_test_run+0x46c/0x890 net/bpf/test_run.c:402\n bpf_prog_test_run_skb+0xbdc/0x14c0 net/bpf/test_run.c:1170\n bpf_prog_test_run+0x345/0x3c0 kernel/bpf/syscall.c:3648\n __sys_bpf+0x43a/0x6c0 kernel/bpf/syscall.c:5005\n __do_sys_bpf kernel/bpf/syscall.c:5091 [inline]\n __se_sys_bpf kernel/bpf/syscall.c:5089 [inline]\n __x64_sys_bpf+0x7c/0x90 kernel/bpf/syscall.c:5089\n do_syscall_64+0x54/0x70 arch/x86/entry/common.c:48\n entry_SYSCALL_64_after_hwframe+0x61/0xc6\n\nThe reproducer doesn\u0027t really reproduce outside of syzkaller\nenvironment, so I\u0027m taking a guess here. It looks like we\ndo generate correct ETH_HLEN-sized packet, but we redirect\nthe packet to the tunneling device. Before we do so, we\n__skb_pull l2 header and arrive again at skb-\u003elen == 0.\nDoesn\u0027t seem like we can do anything better than having\nan explicit check after __skb_pull?",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.0:kernel-devel-rt-6.4.0-39.1.noarch",
"SUSE Linux Micro 6.0:kernel-rt-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.0:kernel-rt-livepatch-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.0:kernel-source-rt-6.4.0-39.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-50253",
"url": "https://www.suse.com/security/cve/CVE-2022-50253"
},
{
"category": "external",
"summary": "SUSE Bug 1249912 for CVE-2022-50253",
"url": "https://bugzilla.suse.com/1249912"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.0:kernel-devel-rt-6.4.0-39.1.noarch",
"SUSE Linux Micro 6.0:kernel-rt-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.0:kernel-rt-livepatch-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.0:kernel-source-rt-6.4.0-39.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.0:kernel-devel-rt-6.4.0-39.1.noarch",
"SUSE Linux Micro 6.0:kernel-rt-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.0:kernel-rt-livepatch-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.0:kernel-source-rt-6.4.0-39.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-07T12:33:45Z",
"details": "moderate"
}
],
"title": "CVE-2022-50253"
},
{
"cve": "CVE-2023-53676",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2023-53676"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nscsi: target: iscsi: Fix buffer overflow in lio_target_nacl_info_show()\n\nThe function lio_target_nacl_info_show() uses sprintf() in a loop to print\ndetails for every iSCSI connection in a session without checking for the\nbuffer length. With enough iSCSI connections it\u0027s possible to overflow the\nbuffer provided by configfs and corrupt the memory.\n\nThis patch replaces sprintf() with sysfs_emit_at() that checks for buffer\nboundries.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.0:kernel-devel-rt-6.4.0-39.1.noarch",
"SUSE Linux Micro 6.0:kernel-rt-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.0:kernel-rt-livepatch-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.0:kernel-source-rt-6.4.0-39.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2023-53676",
"url": "https://www.suse.com/security/cve/CVE-2023-53676"
},
{
"category": "external",
"summary": "SUSE Bug 1251786 for CVE-2023-53676",
"url": "https://bugzilla.suse.com/1251786"
},
{
"category": "external",
"summary": "SUSE Bug 1251787 for CVE-2023-53676",
"url": "https://bugzilla.suse.com/1251787"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.0:kernel-devel-rt-6.4.0-39.1.noarch",
"SUSE Linux Micro 6.0:kernel-rt-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.0:kernel-rt-livepatch-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.0:kernel-source-rt-6.4.0-39.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.0:kernel-devel-rt-6.4.0-39.1.noarch",
"SUSE Linux Micro 6.0:kernel-rt-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.0:kernel-rt-livepatch-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.0:kernel-source-rt-6.4.0-39.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-07T12:33:45Z",
"details": "important"
}
],
"title": "CVE-2023-53676"
},
{
"cve": "CVE-2025-21710",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-21710"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\ntcp: correct handling of extreme memory squeeze\n\nTesting with iperf3 using the \"pasta\" protocol splicer has revealed\na problem in the way tcp handles window advertising in extreme memory\nsqueeze situations.\n\nUnder memory pressure, a socket endpoint may temporarily advertise\na zero-sized window, but this is not stored as part of the socket data.\nThe reasoning behind this is that it is considered a temporary setting\nwhich shouldn\u0027t influence any further calculations.\n\nHowever, if we happen to stall at an unfortunate value of the current\nwindow size, the algorithm selecting a new value will consistently fail\nto advertise a non-zero window once we have freed up enough memory.\nThis means that this side\u0027s notion of the current window size is\ndifferent from the one last advertised to the peer, causing the latter\nto not send any data to resolve the sitution.\n\nThe problem occurs on the iperf3 server side, and the socket in question\nis a completely regular socket with the default settings for the\nfedora40 kernel. We do not use SO_PEEK or SO_RCVBUF on the socket.\n\nThe following excerpt of a logging session, with own comments added,\nshows more in detail what is happening:\n\n// tcp_v4_rcv(-\u003e)\n// tcp_rcv_established(-\u003e)\n[5201\u003c-\u003e39222]: ==== Activating log @ net/ipv4/tcp_input.c/tcp_data_queue()/5257 ====\n[5201\u003c-\u003e39222]: tcp_data_queue(-\u003e)\n[5201\u003c-\u003e39222]: DROPPING skb [265600160..265665640], reason: SKB_DROP_REASON_PROTO_MEM\n [rcv_nxt 265600160, rcv_wnd 262144, snt_ack 265469200, win_now 131184]\n [copied_seq 259909392-\u003e260034360 (124968), unread 5565800, qlen 85, ofoq 0]\n [OFO queue: gap: 65480, len: 0]\n[5201\u003c-\u003e39222]: tcp_data_queue(\u003c-)\n[5201\u003c-\u003e39222]: __tcp_transmit_skb(-\u003e)\n [tp-\u003ercv_wup: 265469200, tp-\u003ercv_wnd: 262144, tp-\u003ercv_nxt 265600160]\n[5201\u003c-\u003e39222]: tcp_select_window(-\u003e)\n[5201\u003c-\u003e39222]: (inet_csk(sk)-\u003eicsk_ack.pending \u0026 ICSK_ACK_NOMEM) ? --\u003e TRUE\n [tp-\u003ercv_wup: 265469200, tp-\u003ercv_wnd: 262144, tp-\u003ercv_nxt 265600160]\n returning 0\n[5201\u003c-\u003e39222]: tcp_select_window(\u003c-)\n[5201\u003c-\u003e39222]: ADVERTISING WIN 0, ACK_SEQ: 265600160\n[5201\u003c-\u003e39222]: [__tcp_transmit_skb(\u003c-)\n[5201\u003c-\u003e39222]: tcp_rcv_established(\u003c-)\n[5201\u003c-\u003e39222]: tcp_v4_rcv(\u003c-)\n\n// Receive queue is at 85 buffers and we are out of memory.\n// We drop the incoming buffer, although it is in sequence, and decide\n// to send an advertisement with a window of zero.\n// We don\u0027t update tp-\u003ercv_wnd and tp-\u003ercv_wup accordingly, which means\n// we unconditionally shrink the window.\n\n[5201\u003c-\u003e39222]: tcp_recvmsg_locked(-\u003e)\n[5201\u003c-\u003e39222]: __tcp_cleanup_rbuf(-\u003e) tp-\u003ercv_wup: 265469200, tp-\u003ercv_wnd: 262144, tp-\u003ercv_nxt 265600160\n[5201\u003c-\u003e39222]: [new_win = 0, win_now = 131184, 2 * win_now = 262368]\n[5201\u003c-\u003e39222]: [new_win \u003e= (2 * win_now) ? --\u003e time_to_ack = 0]\n[5201\u003c-\u003e39222]: NOT calling tcp_send_ack()\n [tp-\u003ercv_wup: 265469200, tp-\u003ercv_wnd: 262144, tp-\u003ercv_nxt 265600160]\n[5201\u003c-\u003e39222]: __tcp_cleanup_rbuf(\u003c-)\n [rcv_nxt 265600160, rcv_wnd 262144, snt_ack 265469200, win_now 131184]\n [copied_seq 260040464-\u003e260040464 (0), unread 5559696, qlen 85, ofoq 0]\n returning 6104 bytes\n[5201\u003c-\u003e39222]: tcp_recvmsg_locked(\u003c-)\n\n// After each read, the algorithm for calculating the new receive\n// window in __tcp_cleanup_rbuf() finds it is too small to advertise\n// or to update tp-\u003ercv_wnd.\n// Meanwhile, the peer thinks the window is zero, and will not send\n// any more data to trigger an update from the interrupt mode side.\n\n[5201\u003c-\u003e39222]: tcp_recvmsg_locked(-\u003e)\n[5201\u003c-\u003e39222]: __tcp_cleanup_rbuf(-\u003e) tp-\u003ercv_wup: 265469200, tp-\u003ercv_wnd: 262144, tp-\u003ercv_nxt 265600160\n[5201\u003c-\u003e39222]: [new_win = 262144, win_now = 131184, 2 * win_n\n---truncated---",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.0:kernel-devel-rt-6.4.0-39.1.noarch",
"SUSE Linux Micro 6.0:kernel-rt-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.0:kernel-rt-livepatch-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.0:kernel-source-rt-6.4.0-39.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-21710",
"url": "https://www.suse.com/security/cve/CVE-2025-21710"
},
{
"category": "external",
"summary": "SUSE Bug 1237888 for CVE-2025-21710",
"url": "https://bugzilla.suse.com/1237888"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.0:kernel-devel-rt-6.4.0-39.1.noarch",
"SUSE Linux Micro 6.0:kernel-rt-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.0:kernel-rt-livepatch-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.0:kernel-source-rt-6.4.0-39.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.0:kernel-devel-rt-6.4.0-39.1.noarch",
"SUSE Linux Micro 6.0:kernel-rt-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.0:kernel-rt-livepatch-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.0:kernel-source-rt-6.4.0-39.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-07T12:33:45Z",
"details": "moderate"
}
],
"title": "CVE-2025-21710"
},
{
"cve": "CVE-2025-37916",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-37916"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\npds_core: remove write-after-free of client_id\n\nA use-after-free error popped up in stress testing:\n\n[Mon Apr 21 21:21:33 2025] BUG: KFENCE: use-after-free write in pdsc_auxbus_dev_del+0xef/0x160 [pds_core]\n[Mon Apr 21 21:21:33 2025] Use-after-free write at 0x000000007013ecd1 (in kfence-#47):\n[Mon Apr 21 21:21:33 2025] pdsc_auxbus_dev_del+0xef/0x160 [pds_core]\n[Mon Apr 21 21:21:33 2025] pdsc_remove+0xc0/0x1b0 [pds_core]\n[Mon Apr 21 21:21:33 2025] pci_device_remove+0x24/0x70\n[Mon Apr 21 21:21:33 2025] device_release_driver_internal+0x11f/0x180\n[Mon Apr 21 21:21:33 2025] driver_detach+0x45/0x80\n[Mon Apr 21 21:21:33 2025] bus_remove_driver+0x83/0xe0\n[Mon Apr 21 21:21:33 2025] pci_unregister_driver+0x1a/0x80\n\nThe actual device uninit usually happens on a separate thread\nscheduled after this code runs, but there is no guarantee of order\nof thread execution, so this could be a problem. There\u0027s no\nactual need to clear the client_id at this point, so simply\nremove the offending code.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.0:kernel-devel-rt-6.4.0-39.1.noarch",
"SUSE Linux Micro 6.0:kernel-rt-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.0:kernel-rt-livepatch-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.0:kernel-source-rt-6.4.0-39.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-37916",
"url": "https://www.suse.com/security/cve/CVE-2025-37916"
},
{
"category": "external",
"summary": "SUSE Bug 1243474 for CVE-2025-37916",
"url": "https://bugzilla.suse.com/1243474"
},
{
"category": "external",
"summary": "SUSE Bug 1243535 for CVE-2025-37916",
"url": "https://bugzilla.suse.com/1243535"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.0:kernel-devel-rt-6.4.0-39.1.noarch",
"SUSE Linux Micro 6.0:kernel-rt-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.0:kernel-rt-livepatch-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.0:kernel-source-rt-6.4.0-39.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.0:kernel-devel-rt-6.4.0-39.1.noarch",
"SUSE Linux Micro 6.0:kernel-rt-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.0:kernel-rt-livepatch-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.0:kernel-source-rt-6.4.0-39.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-07T12:33:45Z",
"details": "moderate"
}
],
"title": "CVE-2025-37916"
},
{
"cve": "CVE-2025-38359",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-38359"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\ns390/mm: Fix in_atomic() handling in do_secure_storage_access()\n\nKernel user spaces accesses to not exported pages in atomic context\nincorrectly try to resolve the page fault.\nWith debug options enabled call traces like this can be seen:\n\nBUG: sleeping function called from invalid context at kernel/locking/rwsem.c:1523\nin_atomic(): 1, irqs_disabled(): 0, non_block: 0, pid: 419074, name: qemu-system-s39\npreempt_count: 1, expected: 0\nRCU nest depth: 0, expected: 0\nINFO: lockdep is turned off.\nPreemption disabled at:\n[\u003c00000383ea47cfa2\u003e] copy_page_from_iter_atomic+0xa2/0x8a0\nCPU: 12 UID: 0 PID: 419074 Comm: qemu-system-s39\nTainted: G W 6.16.0-20250531.rc0.git0.69b3a602feac.63.fc42.s390x+debug #1 PREEMPT\nTainted: [W]=WARN\nHardware name: IBM 3931 A01 703 (LPAR)\nCall Trace:\n [\u003c00000383e990d282\u003e] dump_stack_lvl+0xa2/0xe8\n [\u003c00000383e99bf152\u003e] __might_resched+0x292/0x2d0\n [\u003c00000383eaa7c374\u003e] down_read+0x34/0x2d0\n [\u003c00000383e99432f8\u003e] do_secure_storage_access+0x108/0x360\n [\u003c00000383eaa724b0\u003e] __do_pgm_check+0x130/0x220\n [\u003c00000383eaa842e4\u003e] pgm_check_handler+0x114/0x160\n [\u003c00000383ea47d028\u003e] copy_page_from_iter_atomic+0x128/0x8a0\n([\u003c00000383ea47d016\u003e] copy_page_from_iter_atomic+0x116/0x8a0)\n [\u003c00000383e9c45eae\u003e] generic_perform_write+0x16e/0x310\n [\u003c00000383e9eb87f4\u003e] ext4_buffered_write_iter+0x84/0x160\n [\u003c00000383e9da0de4\u003e] vfs_write+0x1c4/0x460\n [\u003c00000383e9da123c\u003e] ksys_write+0x7c/0x100\n [\u003c00000383eaa7284e\u003e] __do_syscall+0x15e/0x280\n [\u003c00000383eaa8417e\u003e] system_call+0x6e/0x90\nINFO: lockdep is turned off.\n\nIt is not allowed to take the mmap_lock while in atomic context. Therefore\nhandle such a secure storage access fault as if the accessed page is not\nmapped: the uaccess function will return -EFAULT, and the caller has to\ndeal with this. Usually this means that the access is retried in process\ncontext, which allows to resolve the page fault (or in this case export the\npage).",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.0:kernel-devel-rt-6.4.0-39.1.noarch",
"SUSE Linux Micro 6.0:kernel-rt-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.0:kernel-rt-livepatch-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.0:kernel-source-rt-6.4.0-39.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-38359",
"url": "https://www.suse.com/security/cve/CVE-2025-38359"
},
{
"category": "external",
"summary": "SUSE Bug 1247076 for CVE-2025-38359",
"url": "https://bugzilla.suse.com/1247076"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.0:kernel-devel-rt-6.4.0-39.1.noarch",
"SUSE Linux Micro 6.0:kernel-rt-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.0:kernel-rt-livepatch-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.0:kernel-source-rt-6.4.0-39.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.0:kernel-devel-rt-6.4.0-39.1.noarch",
"SUSE Linux Micro 6.0:kernel-rt-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.0:kernel-rt-livepatch-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.0:kernel-source-rt-6.4.0-39.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-07T12:33:45Z",
"details": "moderate"
}
],
"title": "CVE-2025-38359"
},
{
"cve": "CVE-2025-38361",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-38361"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\ndrm/amd/display: Check dce_hwseq before dereferencing it\n\n[WHAT]\n\nhws was checked for null earlier in dce110_blank_stream, indicating hws\ncan be null, and should be checked whenever it is used.\n\n(cherry picked from commit 79db43611ff61280b6de58ce1305e0b2ecf675ad)",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.0:kernel-devel-rt-6.4.0-39.1.noarch",
"SUSE Linux Micro 6.0:kernel-rt-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.0:kernel-rt-livepatch-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.0:kernel-source-rt-6.4.0-39.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-38361",
"url": "https://www.suse.com/security/cve/CVE-2025-38361"
},
{
"category": "external",
"summary": "SUSE Bug 1247079 for CVE-2025-38361",
"url": "https://bugzilla.suse.com/1247079"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.0:kernel-devel-rt-6.4.0-39.1.noarch",
"SUSE Linux Micro 6.0:kernel-rt-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.0:kernel-rt-livepatch-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.0:kernel-source-rt-6.4.0-39.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.0:kernel-devel-rt-6.4.0-39.1.noarch",
"SUSE Linux Micro 6.0:kernel-rt-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.0:kernel-rt-livepatch-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.0:kernel-source-rt-6.4.0-39.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-07T12:33:45Z",
"details": "moderate"
}
],
"title": "CVE-2025-38361"
},
{
"cve": "CVE-2025-39788",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-39788"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nscsi: ufs: exynos: Fix programming of HCI_UTRL_NEXUS_TYPE\n\nOn Google gs101, the number of UTP transfer request slots (nutrs) is 32,\nand in this case the driver ends up programming the UTRL_NEXUS_TYPE\nincorrectly as 0.\n\nThis is because the left hand side of the shift is 1, which is of type\nint, i.e. 31 bits wide. Shifting by more than that width results in\nundefined behaviour.\n\nFix this by switching to the BIT() macro, which applies correct type\ncasting as required. This ensures the correct value is written to\nUTRL_NEXUS_TYPE (0xffffffff on gs101), and it also fixes a UBSAN shift\nwarning:\n\n UBSAN: shift-out-of-bounds in drivers/ufs/host/ufs-exynos.c:1113:21\n shift exponent 32 is too large for 32-bit type \u0027int\u0027\n\nFor consistency, apply the same change to the nutmrs / UTMRL_NEXUS_TYPE\nwrite.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.0:kernel-devel-rt-6.4.0-39.1.noarch",
"SUSE Linux Micro 6.0:kernel-rt-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.0:kernel-rt-livepatch-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.0:kernel-source-rt-6.4.0-39.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-39788",
"url": "https://www.suse.com/security/cve/CVE-2025-39788"
},
{
"category": "external",
"summary": "SUSE Bug 1249547 for CVE-2025-39788",
"url": "https://bugzilla.suse.com/1249547"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.0:kernel-devel-rt-6.4.0-39.1.noarch",
"SUSE Linux Micro 6.0:kernel-rt-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.0:kernel-rt-livepatch-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.0:kernel-source-rt-6.4.0-39.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.0:kernel-devel-rt-6.4.0-39.1.noarch",
"SUSE Linux Micro 6.0:kernel-rt-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.0:kernel-rt-livepatch-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.0:kernel-source-rt-6.4.0-39.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-07T12:33:45Z",
"details": "moderate"
}
],
"title": "CVE-2025-39788"
},
{
"cve": "CVE-2025-39805",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-39805"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnet: macb: fix unregister_netdev call order in macb_remove()\n\nWhen removing a macb device, the driver calls phy_exit() before\nunregister_netdev(). This leads to a WARN from kernfs:\n\n ------------[ cut here ]------------\n kernfs: can not remove \u0027attached_dev\u0027, no directory\n WARNING: CPU: 1 PID: 27146 at fs/kernfs/dir.c:1683\n Call trace:\n kernfs_remove_by_name_ns+0xd8/0xf0\n sysfs_remove_link+0x24/0x58\n phy_detach+0x5c/0x168\n phy_disconnect+0x4c/0x70\n phylink_disconnect_phy+0x6c/0xc0 [phylink]\n macb_close+0x6c/0x170 [macb]\n ...\n macb_remove+0x60/0x168 [macb]\n platform_remove+0x5c/0x80\n ...\n\nThe warning happens because the PHY is being exited while the netdev\nis still registered. The correct order is to unregister the netdev\nbefore shutting down the PHY and cleaning up the MDIO bus.\n\nFix this by moving unregister_netdev() ahead of phy_exit() in\nmacb_remove().",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.0:kernel-devel-rt-6.4.0-39.1.noarch",
"SUSE Linux Micro 6.0:kernel-rt-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.0:kernel-rt-livepatch-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.0:kernel-source-rt-6.4.0-39.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-39805",
"url": "https://www.suse.com/security/cve/CVE-2025-39805"
},
{
"category": "external",
"summary": "SUSE Bug 1249982 for CVE-2025-39805",
"url": "https://bugzilla.suse.com/1249982"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.0:kernel-devel-rt-6.4.0-39.1.noarch",
"SUSE Linux Micro 6.0:kernel-rt-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.0:kernel-rt-livepatch-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.0:kernel-source-rt-6.4.0-39.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.0:kernel-devel-rt-6.4.0-39.1.noarch",
"SUSE Linux Micro 6.0:kernel-rt-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.0:kernel-rt-livepatch-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.0:kernel-source-rt-6.4.0-39.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-07T12:33:45Z",
"details": "moderate"
}
],
"title": "CVE-2025-39805"
},
{
"cve": "CVE-2025-39819",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-39819"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nfs/smb: Fix inconsistent refcnt update\n\nA possible inconsistent update of refcount was identified in `smb2_compound_op`.\nSuch inconsistent update could lead to possible resource leaks.\n\nWhy it is a possible bug:\n1. In the comment section of the function, it clearly states that the\nreference to `cfile` should be dropped after calling this function.\n2. Every control flow path would check and drop the reference to\n`cfile`, except the patched one.\n3. Existing callers would not handle refcount update of `cfile` if\n-ENOMEM is returned.\n\nTo fix the bug, an extra goto label \"out\" is added, to make sure that the\ncleanup logic would always be respected. As the problem is caused by the\nallocation failure of `vars`, the cleanup logic between label \"finished\"\nand \"out\" can be safely ignored. According to the definition of function\n`is_replayable_error`, the error code of \"-ENOMEM\" is not recoverable.\nTherefore, the replay logic also gets ignored.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.0:kernel-devel-rt-6.4.0-39.1.noarch",
"SUSE Linux Micro 6.0:kernel-rt-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.0:kernel-rt-livepatch-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.0:kernel-source-rt-6.4.0-39.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-39819",
"url": "https://www.suse.com/security/cve/CVE-2025-39819"
},
{
"category": "external",
"summary": "SUSE Bug 1250176 for CVE-2025-39819",
"url": "https://bugzilla.suse.com/1250176"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.0:kernel-devel-rt-6.4.0-39.1.noarch",
"SUSE Linux Micro 6.0:kernel-rt-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.0:kernel-rt-livepatch-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.0:kernel-source-rt-6.4.0-39.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.0:kernel-devel-rt-6.4.0-39.1.noarch",
"SUSE Linux Micro 6.0:kernel-rt-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.0:kernel-rt-livepatch-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.0:kernel-source-rt-6.4.0-39.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-07T12:33:45Z",
"details": "moderate"
}
],
"title": "CVE-2025-39819"
},
{
"cve": "CVE-2025-39859",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-39859"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nptp: ocp: fix use-after-free bugs causing by ptp_ocp_watchdog\n\nThe ptp_ocp_detach() only shuts down the watchdog timer if it is\npending. However, if the timer handler is already running, the\ntimer_delete_sync() is not called. This leads to race conditions\nwhere the devlink that contains the ptp_ocp is deallocated while\nthe timer handler is still accessing it, resulting in use-after-free\nbugs. The following details one of the race scenarios.\n\n(thread 1) | (thread 2)\nptp_ocp_remove() |\n ptp_ocp_detach() | ptp_ocp_watchdog()\n if (timer_pending(\u0026bp-\u003ewatchdog))| bp = timer_container_of()\n timer_delete_sync() |\n |\n devlink_free(devlink) //free |\n | bp-\u003e //use\n\nResolve this by unconditionally calling timer_delete_sync() to ensure\nthe timer is reliably deactivated, preventing any access after free.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.0:kernel-devel-rt-6.4.0-39.1.noarch",
"SUSE Linux Micro 6.0:kernel-rt-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.0:kernel-rt-livepatch-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.0:kernel-source-rt-6.4.0-39.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-39859",
"url": "https://www.suse.com/security/cve/CVE-2025-39859"
},
{
"category": "external",
"summary": "SUSE Bug 1250252 for CVE-2025-39859",
"url": "https://bugzilla.suse.com/1250252"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.0:kernel-devel-rt-6.4.0-39.1.noarch",
"SUSE Linux Micro 6.0:kernel-rt-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.0:kernel-rt-livepatch-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.0:kernel-source-rt-6.4.0-39.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.0:kernel-devel-rt-6.4.0-39.1.noarch",
"SUSE Linux Micro 6.0:kernel-rt-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.0:kernel-rt-livepatch-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.0:kernel-source-rt-6.4.0-39.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-07T12:33:45Z",
"details": "moderate"
}
],
"title": "CVE-2025-39859"
},
{
"cve": "CVE-2025-39944",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-39944"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nocteontx2-pf: Fix use-after-free bugs in otx2_sync_tstamp()\n\nThe original code relies on cancel_delayed_work() in otx2_ptp_destroy(),\nwhich does not ensure that the delayed work item synctstamp_work has fully\ncompleted if it was already running. This leads to use-after-free scenarios\nwhere otx2_ptp is deallocated by otx2_ptp_destroy(), while synctstamp_work\nremains active and attempts to dereference otx2_ptp in otx2_sync_tstamp().\nFurthermore, the synctstamp_work is cyclic, the likelihood of triggering\nthe bug is nonnegligible.\n\nA typical race condition is illustrated below:\n\nCPU 0 (cleanup) | CPU 1 (delayed work callback)\notx2_remove() |\n otx2_ptp_destroy() | otx2_sync_tstamp()\n cancel_delayed_work() |\n kfree(ptp) |\n | ptp = container_of(...); //UAF\n | ptp-\u003e //UAF\n\nThis is confirmed by a KASAN report:\n\nBUG: KASAN: slab-use-after-free in __run_timer_base.part.0+0x7d7/0x8c0\nWrite of size 8 at addr ffff88800aa09a18 by task bash/136\n...\nCall Trace:\n \u003cIRQ\u003e\n dump_stack_lvl+0x55/0x70\n print_report+0xcf/0x610\n ? __run_timer_base.part.0+0x7d7/0x8c0\n kasan_report+0xb8/0xf0\n ? __run_timer_base.part.0+0x7d7/0x8c0\n __run_timer_base.part.0+0x7d7/0x8c0\n ? __pfx___run_timer_base.part.0+0x10/0x10\n ? __pfx_read_tsc+0x10/0x10\n ? ktime_get+0x60/0x140\n ? lapic_next_event+0x11/0x20\n ? clockevents_program_event+0x1d4/0x2a0\n run_timer_softirq+0xd1/0x190\n handle_softirqs+0x16a/0x550\n irq_exit_rcu+0xaf/0xe0\n sysvec_apic_timer_interrupt+0x70/0x80\n \u003c/IRQ\u003e\n...\nAllocated by task 1:\n kasan_save_stack+0x24/0x50\n kasan_save_track+0x14/0x30\n __kasan_kmalloc+0x7f/0x90\n otx2_ptp_init+0xb1/0x860\n otx2_probe+0x4eb/0xc30\n local_pci_probe+0xdc/0x190\n pci_device_probe+0x2fe/0x470\n really_probe+0x1ca/0x5c0\n __driver_probe_device+0x248/0x310\n driver_probe_device+0x44/0x120\n __driver_attach+0xd2/0x310\n bus_for_each_dev+0xed/0x170\n bus_add_driver+0x208/0x500\n driver_register+0x132/0x460\n do_one_initcall+0x89/0x300\n kernel_init_freeable+0x40d/0x720\n kernel_init+0x1a/0x150\n ret_from_fork+0x10c/0x1a0\n ret_from_fork_asm+0x1a/0x30\n\nFreed by task 136:\n kasan_save_stack+0x24/0x50\n kasan_save_track+0x14/0x30\n kasan_save_free_info+0x3a/0x60\n __kasan_slab_free+0x3f/0x50\n kfree+0x137/0x370\n otx2_ptp_destroy+0x38/0x80\n otx2_remove+0x10d/0x4c0\n pci_device_remove+0xa6/0x1d0\n device_release_driver_internal+0xf8/0x210\n pci_stop_bus_device+0x105/0x150\n pci_stop_and_remove_bus_device_locked+0x15/0x30\n remove_store+0xcc/0xe0\n kernfs_fop_write_iter+0x2c3/0x440\n vfs_write+0x871/0xd70\n ksys_write+0xee/0x1c0\n do_syscall_64+0xac/0x280\n entry_SYSCALL_64_after_hwframe+0x77/0x7f\n...\n\nReplace cancel_delayed_work() with cancel_delayed_work_sync() to ensure\nthat the delayed work item is properly canceled before the otx2_ptp is\ndeallocated.\n\nThis bug was initially identified through static analysis. To reproduce\nand test it, I simulated the OcteonTX2 PCI device in QEMU and introduced\nartificial delays within the otx2_sync_tstamp() function to increase the\nlikelihood of triggering the bug.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.0:kernel-devel-rt-6.4.0-39.1.noarch",
"SUSE Linux Micro 6.0:kernel-rt-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.0:kernel-rt-livepatch-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.0:kernel-source-rt-6.4.0-39.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-39944",
"url": "https://www.suse.com/security/cve/CVE-2025-39944"
},
{
"category": "external",
"summary": "SUSE Bug 1251120 for CVE-2025-39944",
"url": "https://bugzilla.suse.com/1251120"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.0:kernel-devel-rt-6.4.0-39.1.noarch",
"SUSE Linux Micro 6.0:kernel-rt-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.0:kernel-rt-livepatch-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.0:kernel-source-rt-6.4.0-39.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.0:kernel-devel-rt-6.4.0-39.1.noarch",
"SUSE Linux Micro 6.0:kernel-rt-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.0:kernel-rt-livepatch-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.0:kernel-source-rt-6.4.0-39.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-07T12:33:45Z",
"details": "moderate"
}
],
"title": "CVE-2025-39944"
},
{
"cve": "CVE-2025-39980",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-39980"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnexthop: Forbid FDB status change while nexthop is in a group\n\nThe kernel forbids the creation of non-FDB nexthop groups with FDB\nnexthops:\n\n # ip nexthop add id 1 via 192.0.2.1 fdb\n # ip nexthop add id 2 group 1\n Error: Non FDB nexthop group cannot have fdb nexthops.\n\nAnd vice versa:\n\n # ip nexthop add id 3 via 192.0.2.2 dev dummy1\n # ip nexthop add id 4 group 3 fdb\n Error: FDB nexthop group can only have fdb nexthops.\n\nHowever, as long as no routes are pointing to a non-FDB nexthop group,\nthe kernel allows changing the type of a nexthop from FDB to non-FDB and\nvice versa:\n\n # ip nexthop add id 5 via 192.0.2.2 dev dummy1\n # ip nexthop add id 6 group 5\n # ip nexthop replace id 5 via 192.0.2.2 fdb\n # echo $?\n 0\n\nThis configuration is invalid and can result in a NPD [1] since FDB\nnexthops are not associated with a nexthop device:\n\n # ip route add 198.51.100.1/32 nhid 6\n # ping 198.51.100.1\n\nFix by preventing nexthop FDB status change while the nexthop is in a\ngroup:\n\n # ip nexthop add id 7 via 192.0.2.2 dev dummy1\n # ip nexthop add id 8 group 7\n # ip nexthop replace id 7 via 192.0.2.2 fdb\n Error: Cannot change nexthop FDB status while in a group.\n\n[1]\nBUG: kernel NULL pointer dereference, address: 00000000000003c0\n[...]\nOops: Oops: 0000 [#1] SMP\nCPU: 6 UID: 0 PID: 367 Comm: ping Not tainted 6.17.0-rc6-virtme-gb65678cacc03 #1 PREEMPT(voluntary)\nHardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.17.0-4.fc41 04/01/2014\nRIP: 0010:fib_lookup_good_nhc+0x1e/0x80\n[...]\nCall Trace:\n \u003cTASK\u003e\n fib_table_lookup+0x541/0x650\n ip_route_output_key_hash_rcu+0x2ea/0x970\n ip_route_output_key_hash+0x55/0x80\n __ip4_datagram_connect+0x250/0x330\n udp_connect+0x2b/0x60\n __sys_connect+0x9c/0xd0\n __x64_sys_connect+0x18/0x20\n do_syscall_64+0xa4/0x2a0\n entry_SYSCALL_64_after_hwframe+0x4b/0x53",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.0:kernel-devel-rt-6.4.0-39.1.noarch",
"SUSE Linux Micro 6.0:kernel-rt-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.0:kernel-rt-livepatch-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.0:kernel-source-rt-6.4.0-39.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-39980",
"url": "https://www.suse.com/security/cve/CVE-2025-39980"
},
{
"category": "external",
"summary": "SUSE Bug 1252063 for CVE-2025-39980",
"url": "https://bugzilla.suse.com/1252063"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.0:kernel-devel-rt-6.4.0-39.1.noarch",
"SUSE Linux Micro 6.0:kernel-rt-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.0:kernel-rt-livepatch-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.0:kernel-source-rt-6.4.0-39.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.0:kernel-devel-rt-6.4.0-39.1.noarch",
"SUSE Linux Micro 6.0:kernel-rt-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.0:kernel-rt-livepatch-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.0:kernel-source-rt-6.4.0-39.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-07T12:33:45Z",
"details": "moderate"
}
],
"title": "CVE-2025-39980"
},
{
"cve": "CVE-2025-40001",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40001"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nscsi: mvsas: Fix use-after-free bugs in mvs_work_queue\n\nDuring the detaching of Marvell\u0027s SAS/SATA controller, the original code\ncalls cancel_delayed_work() in mvs_free() to cancel the delayed work\nitem mwq-\u003ework_q. However, if mwq-\u003ework_q is already running, the\ncancel_delayed_work() may fail to cancel it. This can lead to\nuse-after-free scenarios where mvs_free() frees the mvs_info while\nmvs_work_queue() is still executing and attempts to access the\nalready-freed mvs_info.\n\nA typical race condition is illustrated below:\n\nCPU 0 (remove) | CPU 1 (delayed work callback)\nmvs_pci_remove() |\n mvs_free() | mvs_work_queue()\n cancel_delayed_work() |\n kfree(mvi) |\n | mvi-\u003e // UAF\n\nReplace cancel_delayed_work() with cancel_delayed_work_sync() to ensure\nthat the delayed work item is properly canceled and any executing\ndelayed work item completes before the mvs_info is deallocated.\n\nThis bug was found by static analysis.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.0:kernel-devel-rt-6.4.0-39.1.noarch",
"SUSE Linux Micro 6.0:kernel-rt-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.0:kernel-rt-livepatch-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.0:kernel-source-rt-6.4.0-39.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40001",
"url": "https://www.suse.com/security/cve/CVE-2025-40001"
},
{
"category": "external",
"summary": "SUSE Bug 1252303 for CVE-2025-40001",
"url": "https://bugzilla.suse.com/1252303"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.0:kernel-devel-rt-6.4.0-39.1.noarch",
"SUSE Linux Micro 6.0:kernel-rt-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.0:kernel-rt-livepatch-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.0:kernel-source-rt-6.4.0-39.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.8,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.0:kernel-devel-rt-6.4.0-39.1.noarch",
"SUSE Linux Micro 6.0:kernel-rt-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.0:kernel-rt-livepatch-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.0:kernel-source-rt-6.4.0-39.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-07T12:33:45Z",
"details": "moderate"
}
],
"title": "CVE-2025-40001"
},
{
"cve": "CVE-2025-40021",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40021"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\ntracing: dynevent: Add a missing lockdown check on dynevent\n\nSince dynamic_events interface on tracefs is compatible with\nkprobe_events and uprobe_events, it should also check the lockdown\nstatus and reject if it is set.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.0:kernel-devel-rt-6.4.0-39.1.noarch",
"SUSE Linux Micro 6.0:kernel-rt-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.0:kernel-rt-livepatch-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.0:kernel-source-rt-6.4.0-39.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40021",
"url": "https://www.suse.com/security/cve/CVE-2025-40021"
},
{
"category": "external",
"summary": "SUSE Bug 1252681 for CVE-2025-40021",
"url": "https://bugzilla.suse.com/1252681"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.0:kernel-devel-rt-6.4.0-39.1.noarch",
"SUSE Linux Micro 6.0:kernel-rt-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.0:kernel-rt-livepatch-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.0:kernel-source-rt-6.4.0-39.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.0:kernel-devel-rt-6.4.0-39.1.noarch",
"SUSE Linux Micro 6.0:kernel-rt-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.0:kernel-rt-livepatch-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.0:kernel-source-rt-6.4.0-39.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-07T12:33:45Z",
"details": "moderate"
}
],
"title": "CVE-2025-40021"
},
{
"cve": "CVE-2025-40027",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40027"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnet/9p: fix double req put in p9_fd_cancelled\n\nSyzkaller reports a KASAN issue as below:\n\ngeneral protection fault, probably for non-canonical address 0xfbd59c0000000021: 0000 [#1] PREEMPT SMP KASAN NOPTI\nKASAN: maybe wild-memory-access in range [0xdead000000000108-0xdead00000000010f]\nCPU: 0 PID: 5083 Comm: syz-executor.2 Not tainted 6.1.134-syzkaller-00037-g855bd1d7d838 #0\nHardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014\nRIP: 0010:__list_del include/linux/list.h:114 [inline]\nRIP: 0010:__list_del_entry include/linux/list.h:137 [inline]\nRIP: 0010:list_del include/linux/list.h:148 [inline]\nRIP: 0010:p9_fd_cancelled+0xe9/0x200 net/9p/trans_fd.c:734\n\nCall Trace:\n \u003cTASK\u003e\n p9_client_flush+0x351/0x440 net/9p/client.c:614\n p9_client_rpc+0xb6b/0xc70 net/9p/client.c:734\n p9_client_version net/9p/client.c:920 [inline]\n p9_client_create+0xb51/0x1240 net/9p/client.c:1027\n v9fs_session_init+0x1f0/0x18f0 fs/9p/v9fs.c:408\n v9fs_mount+0xba/0xcb0 fs/9p/vfs_super.c:126\n legacy_get_tree+0x108/0x220 fs/fs_context.c:632\n vfs_get_tree+0x8e/0x300 fs/super.c:1573\n do_new_mount fs/namespace.c:3056 [inline]\n path_mount+0x6a6/0x1e90 fs/namespace.c:3386\n do_mount fs/namespace.c:3399 [inline]\n __do_sys_mount fs/namespace.c:3607 [inline]\n __se_sys_mount fs/namespace.c:3584 [inline]\n __x64_sys_mount+0x283/0x300 fs/namespace.c:3584\n do_syscall_x64 arch/x86/entry/common.c:51 [inline]\n do_syscall_64+0x35/0x80 arch/x86/entry/common.c:81\n entry_SYSCALL_64_after_hwframe+0x6e/0xd8\n\nThis happens because of a race condition between:\n\n- The 9p client sending an invalid flush request and later cleaning it up;\n- The 9p client in p9_read_work() canceled all pending requests.\n\n Thread 1 Thread 2\n ...\n p9_client_create()\n ...\n p9_fd_create()\n ...\n p9_conn_create()\n ...\n // start Thread 2\n INIT_WORK(\u0026m-\u003erq, p9_read_work);\n p9_read_work()\n ...\n p9_client_rpc()\n ...\n ...\n p9_conn_cancel()\n ...\n spin_lock(\u0026m-\u003ereq_lock);\n ...\n p9_fd_cancelled()\n ...\n ...\n spin_unlock(\u0026m-\u003ereq_lock);\n // status rewrite\n p9_client_cb(m-\u003eclient, req, REQ_STATUS_ERROR)\n // first remove\n list_del(\u0026req-\u003ereq_list);\n ...\n\n spin_lock(\u0026m-\u003ereq_lock)\n ...\n // second remove\n list_del(\u0026req-\u003ereq_list);\n spin_unlock(\u0026m-\u003ereq_lock)\n ...\n\nCommit 74d6a5d56629 (\"9p/trans_fd: Fix concurrency del of req_list in\np9_fd_cancelled/p9_read_work\") fixes a concurrency issue in the 9p filesystem\nclient where the req_list could be deleted simultaneously by both\np9_read_work and p9_fd_cancelled functions, but for the case where req-\u003estatus\nequals REQ_STATUS_RCVD.\n\nUpdate the check for req-\u003estatus in p9_fd_cancelled to skip processing not\njust received requests, but anything that is not SENT, as whatever\nchanged the state from SENT also removed the request from its list.\n\nFound by Linux Verification Center (linuxtesting.org) with Syzkaller.\n\n[updated the check from status == RECV || status == ERROR to status != SENT]",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.0:kernel-devel-rt-6.4.0-39.1.noarch",
"SUSE Linux Micro 6.0:kernel-rt-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.0:kernel-rt-livepatch-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.0:kernel-source-rt-6.4.0-39.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40027",
"url": "https://www.suse.com/security/cve/CVE-2025-40027"
},
{
"category": "external",
"summary": "SUSE Bug 1252763 for CVE-2025-40027",
"url": "https://bugzilla.suse.com/1252763"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.0:kernel-devel-rt-6.4.0-39.1.noarch",
"SUSE Linux Micro 6.0:kernel-rt-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.0:kernel-rt-livepatch-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.0:kernel-source-rt-6.4.0-39.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.0:kernel-devel-rt-6.4.0-39.1.noarch",
"SUSE Linux Micro 6.0:kernel-rt-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.0:kernel-rt-livepatch-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.0:kernel-source-rt-6.4.0-39.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-07T12:33:45Z",
"details": "moderate"
}
],
"title": "CVE-2025-40027"
},
{
"cve": "CVE-2025-40030",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40030"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\npinctrl: check the return value of pinmux_ops::get_function_name()\n\nWhile the API contract in docs doesn\u0027t specify it explicitly, the\ngeneric implementation of the get_function_name() callback from struct\npinmux_ops - pinmux_generic_get_function_name() - can fail and return\nNULL. This is already checked in pinmux_check_ops() so add a similar\ncheck in pinmux_func_name_to_selector() instead of passing the returned\npointer right down to strcmp() where the NULL can get dereferenced. This\nis normal operation when adding new pinfunctions.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.0:kernel-devel-rt-6.4.0-39.1.noarch",
"SUSE Linux Micro 6.0:kernel-rt-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.0:kernel-rt-livepatch-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.0:kernel-source-rt-6.4.0-39.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40030",
"url": "https://www.suse.com/security/cve/CVE-2025-40030"
},
{
"category": "external",
"summary": "SUSE Bug 1252773 for CVE-2025-40030",
"url": "https://bugzilla.suse.com/1252773"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.0:kernel-devel-rt-6.4.0-39.1.noarch",
"SUSE Linux Micro 6.0:kernel-rt-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.0:kernel-rt-livepatch-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.0:kernel-source-rt-6.4.0-39.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.0:kernel-devel-rt-6.4.0-39.1.noarch",
"SUSE Linux Micro 6.0:kernel-rt-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.0:kernel-rt-livepatch-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.0:kernel-source-rt-6.4.0-39.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-07T12:33:45Z",
"details": "moderate"
}
],
"title": "CVE-2025-40030"
},
{
"cve": "CVE-2025-40038",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40038"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nKVM: SVM: Skip fastpath emulation on VM-Exit if next RIP isn\u0027t valid\n\nSkip the WRMSR and HLT fastpaths in SVM\u0027s VM-Exit handler if the next RIP\nisn\u0027t valid, e.g. because KVM is running with nrips=false. SVM must\ndecode and emulate to skip the instruction if the CPU doesn\u0027t provide the\nnext RIP, and getting the instruction bytes to decode requires reading\nguest memory. Reading guest memory through the emulator can fault, i.e.\ncan sleep, which is disallowed since the fastpath handlers run with IRQs\ndisabled.\n\n BUG: sleeping function called from invalid context at ./include/linux/uaccess.h:106\n in_atomic(): 1, irqs_disabled(): 1, non_block: 0, pid: 32611, name: qemu\n preempt_count: 1, expected: 0\n INFO: lockdep is turned off.\n irq event stamp: 30580\n hardirqs last enabled at (30579): [\u003cffffffffc08b2527\u003e] vcpu_run+0x1787/0x1db0 [kvm]\n hardirqs last disabled at (30580): [\u003cffffffffb4f62e32\u003e] __schedule+0x1e2/0xed0\n softirqs last enabled at (30570): [\u003cffffffffb4247a64\u003e] fpu_swap_kvm_fpstate+0x44/0x210\n softirqs last disabled at (30568): [\u003cffffffffb4247a64\u003e] fpu_swap_kvm_fpstate+0x44/0x210\n CPU: 298 UID: 0 PID: 32611 Comm: qemu Tainted: G U 6.16.0-smp--e6c618b51cfe-sleep #782 NONE\n Tainted: [U]=USER\n Hardware name: Google Astoria-Turin/astoria, BIOS 0.20241223.2-0 01/17/2025\n Call Trace:\n \u003cTASK\u003e\n dump_stack_lvl+0x7d/0xb0\n __might_resched+0x271/0x290\n __might_fault+0x28/0x80\n kvm_vcpu_read_guest_page+0x8d/0xc0 [kvm]\n kvm_fetch_guest_virt+0x92/0xc0 [kvm]\n __do_insn_fetch_bytes+0xf3/0x1e0 [kvm]\n x86_decode_insn+0xd1/0x1010 [kvm]\n x86_emulate_instruction+0x105/0x810 [kvm]\n __svm_skip_emulated_instruction+0xc4/0x140 [kvm_amd]\n handle_fastpath_invd+0xc4/0x1a0 [kvm]\n vcpu_run+0x11a1/0x1db0 [kvm]\n kvm_arch_vcpu_ioctl_run+0x5cc/0x730 [kvm]\n kvm_vcpu_ioctl+0x578/0x6a0 [kvm]\n __se_sys_ioctl+0x6d/0xb0\n do_syscall_64+0x8a/0x2c0\n entry_SYSCALL_64_after_hwframe+0x4b/0x53\n RIP: 0033:0x7f479d57a94b\n \u003c/TASK\u003e\n\nNote, this is essentially a reapply of commit 5c30e8101e8d (\"KVM: SVM:\nSkip WRMSR fastpath on VM-Exit if next RIP isn\u0027t valid\"), but with\ndifferent justification (KVM now grabs SRCU when skipping the instruction\nfor other reasons).",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.0:kernel-devel-rt-6.4.0-39.1.noarch",
"SUSE Linux Micro 6.0:kernel-rt-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.0:kernel-rt-livepatch-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.0:kernel-source-rt-6.4.0-39.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40038",
"url": "https://www.suse.com/security/cve/CVE-2025-40038"
},
{
"category": "external",
"summary": "SUSE Bug 1252817 for CVE-2025-40038",
"url": "https://bugzilla.suse.com/1252817"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.0:kernel-devel-rt-6.4.0-39.1.noarch",
"SUSE Linux Micro 6.0:kernel-rt-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.0:kernel-rt-livepatch-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.0:kernel-source-rt-6.4.0-39.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.0:kernel-devel-rt-6.4.0-39.1.noarch",
"SUSE Linux Micro 6.0:kernel-rt-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.0:kernel-rt-livepatch-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.0:kernel-source-rt-6.4.0-39.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-07T12:33:45Z",
"details": "moderate"
}
],
"title": "CVE-2025-40038"
},
{
"cve": "CVE-2025-40040",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40040"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nmm/ksm: fix flag-dropping behavior in ksm_madvise\n\nsyzkaller discovered the following crash: (kernel BUG)\n\n[ 44.607039] ------------[ cut here ]------------\n[ 44.607422] kernel BUG at mm/userfaultfd.c:2067!\n[ 44.608148] Oops: invalid opcode: 0000 [#1] SMP DEBUG_PAGEALLOC KASAN NOPTI\n[ 44.608814] CPU: 1 UID: 0 PID: 2475 Comm: reproducer Not tainted 6.16.0-rc6 #1 PREEMPT(none)\n[ 44.609635] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.16.3-0-ga6ed6b701f0a-prebuilt.qemu.org 04/01/2014\n[ 44.610695] RIP: 0010:userfaultfd_release_all+0x3a8/0x460\n\n\u003csnip other registers, drop unreliable trace\u003e\n\n[ 44.617726] Call Trace:\n[ 44.617926] \u003cTASK\u003e\n[ 44.619284] userfaultfd_release+0xef/0x1b0\n[ 44.620976] __fput+0x3f9/0xb60\n[ 44.621240] fput_close_sync+0x110/0x210\n[ 44.622222] __x64_sys_close+0x8f/0x120\n[ 44.622530] do_syscall_64+0x5b/0x2f0\n[ 44.622840] entry_SYSCALL_64_after_hwframe+0x76/0x7e\n[ 44.623244] RIP: 0033:0x7f365bb3f227\n\nKernel panics because it detects UFFD inconsistency during\nuserfaultfd_release_all(). Specifically, a VMA which has a valid pointer\nto vma-\u003evm_userfaultfd_ctx, but no UFFD flags in vma-\u003evm_flags.\n\nThe inconsistency is caused in ksm_madvise(): when user calls madvise()\nwith MADV_UNMEARGEABLE on a VMA that is registered for UFFD in MINOR mode,\nit accidentally clears all flags stored in the upper 32 bits of\nvma-\u003evm_flags.\n\nAssuming x86_64 kernel build, unsigned long is 64-bit and unsigned int and\nint are 32-bit wide. This setup causes the following mishap during the \u0026=\n~VM_MERGEABLE assignment.\n\nVM_MERGEABLE is a 32-bit constant of type unsigned int, 0x8000\u00270000. \nAfter ~ is applied, it becomes 0x7fff\u0027ffff unsigned int, which is then\npromoted to unsigned long before the \u0026 operation. This promotion fills\nupper 32 bits with leading 0s, as we\u0027re doing unsigned conversion (and\neven for a signed conversion, this wouldn\u0027t help as the leading bit is 0).\n\u0026 operation thus ends up AND-ing vm_flags with 0x0000\u00270000\u00277fff\u0027ffff\ninstead of intended 0xffff\u0027ffff\u00277fff\u0027ffff and hence accidentally clears\nthe upper 32-bits of its value.\n\nFix it by changing `VM_MERGEABLE` constant to unsigned long, using the\nBIT() macro.\n\nNote: other VM_* flags are not affected: This only happens to the\nVM_MERGEABLE flag, as the other VM_* flags are all constants of type int\nand after ~ operation, they end up with leading 1 and are thus converted\nto unsigned long with leading 1s.\n\nNote 2:\nAfter commit 31defc3b01d9 (\"userfaultfd: remove (VM_)BUG_ON()s\"), this is\nno longer a kernel BUG, but a WARNING at the same place:\n\n[ 45.595973] WARNING: CPU: 1 PID: 2474 at mm/userfaultfd.c:2067\n\nbut the root-cause (flag-drop) remains the same.\n\n[akpm@linux-foundation.org: rust bindgen wasn\u0027t able to handle BIT(), from Miguel]",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.0:kernel-devel-rt-6.4.0-39.1.noarch",
"SUSE Linux Micro 6.0:kernel-rt-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.0:kernel-rt-livepatch-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.0:kernel-source-rt-6.4.0-39.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40040",
"url": "https://www.suse.com/security/cve/CVE-2025-40040"
},
{
"category": "external",
"summary": "SUSE Bug 1252780 for CVE-2025-40040",
"url": "https://bugzilla.suse.com/1252780"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.0:kernel-devel-rt-6.4.0-39.1.noarch",
"SUSE Linux Micro 6.0:kernel-rt-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.0:kernel-rt-livepatch-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.0:kernel-source-rt-6.4.0-39.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.0:kernel-devel-rt-6.4.0-39.1.noarch",
"SUSE Linux Micro 6.0:kernel-rt-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.0:kernel-rt-livepatch-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.0:kernel-source-rt-6.4.0-39.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-07T12:33:45Z",
"details": "moderate"
}
],
"title": "CVE-2025-40040"
},
{
"cve": "CVE-2025-40048",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40048"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nuio_hv_generic: Let userspace take care of interrupt mask\n\nRemove the logic to set interrupt mask by default in uio_hv_generic\ndriver as the interrupt mask value is supposed to be controlled\ncompletely by the user space. If the mask bit gets changed\nby the driver, concurrently with user mode operating on the ring,\nthe mask bit may be set when it is supposed to be clear, and the\nuser-mode driver will miss an interrupt which will cause a hang.\n\nFor eg- when the driver sets inbound ring buffer interrupt mask to 1,\nthe host does not interrupt the guest on the UIO VMBus channel.\nHowever, setting the mask does not prevent the host from putting a\nmessage in the inbound ring buffer. So let\u0027s assume that happens,\nthe host puts a message into the ring buffer but does not interrupt.\n\nSubsequently, the user space code in the guest sets the inbound ring\nbuffer interrupt mask to 0, saying \"Hey, I\u0027m ready for interrupts\".\nUser space code then calls pread() to wait for an interrupt.\nThen one of two things happens:\n\n* The host never sends another message. So the pread() waits forever.\n* The host does send another message. But because there\u0027s already a\n message in the ring buffer, it doesn\u0027t generate an interrupt.\n This is the correct behavior, because the host should only send an\n interrupt when the inbound ring buffer transitions from empty to\n not-empty. Adding an additional message to a ring buffer that is not\n empty is not supposed to generate an interrupt on the guest.\n Since the guest is waiting in pread() and not removing messages from\n the ring buffer, the pread() waits forever.\n\nThis could be easily reproduced in hv_fcopy_uio_daemon if we delay\nsetting interrupt mask to 0.\n\nSimilarly if hv_uio_channel_cb() sets the interrupt_mask to 1,\nthere\u0027s a race condition. Once user space empties the inbound ring\nbuffer, but before user space sets interrupt_mask to 0, the host could\nput another message in the ring buffer but it wouldn\u0027t interrupt.\nThen the next pread() would hang.\n\nFix these by removing all instances where interrupt_mask is changed,\nwhile keeping the one in set_event() unchanged to enable userspace\ncontrol the interrupt mask by writing 0/1 to /dev/uioX.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.0:kernel-devel-rt-6.4.0-39.1.noarch",
"SUSE Linux Micro 6.0:kernel-rt-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.0:kernel-rt-livepatch-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.0:kernel-source-rt-6.4.0-39.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40048",
"url": "https://www.suse.com/security/cve/CVE-2025-40048"
},
{
"category": "external",
"summary": "SUSE Bug 1252862 for CVE-2025-40048",
"url": "https://bugzilla.suse.com/1252862"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.0:kernel-devel-rt-6.4.0-39.1.noarch",
"SUSE Linux Micro 6.0:kernel-rt-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.0:kernel-rt-livepatch-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.0:kernel-source-rt-6.4.0-39.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.0:kernel-devel-rt-6.4.0-39.1.noarch",
"SUSE Linux Micro 6.0:kernel-rt-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.0:kernel-rt-livepatch-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.0:kernel-source-rt-6.4.0-39.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-07T12:33:45Z",
"details": "moderate"
}
],
"title": "CVE-2025-40048"
},
{
"cve": "CVE-2025-40055",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40055"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nocfs2: fix double free in user_cluster_connect()\n\nuser_cluster_disconnect() frees \"conn-\u003ecc_private\" which is \"lc\" but then\nthe error handling frees \"lc\" a second time. Set \"lc\" to NULL on this\npath to avoid a double free.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.0:kernel-devel-rt-6.4.0-39.1.noarch",
"SUSE Linux Micro 6.0:kernel-rt-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.0:kernel-rt-livepatch-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.0:kernel-source-rt-6.4.0-39.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40055",
"url": "https://www.suse.com/security/cve/CVE-2025-40055"
},
{
"category": "external",
"summary": "SUSE Bug 1252821 for CVE-2025-40055",
"url": "https://bugzilla.suse.com/1252821"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.0:kernel-devel-rt-6.4.0-39.1.noarch",
"SUSE Linux Micro 6.0:kernel-rt-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.0:kernel-rt-livepatch-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.0:kernel-source-rt-6.4.0-39.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.0:kernel-devel-rt-6.4.0-39.1.noarch",
"SUSE Linux Micro 6.0:kernel-rt-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.0:kernel-rt-livepatch-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.0:kernel-source-rt-6.4.0-39.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-07T12:33:45Z",
"details": "moderate"
}
],
"title": "CVE-2025-40055"
},
{
"cve": "CVE-2025-40059",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40059"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\ncoresight: Fix incorrect handling for return value of devm_kzalloc\n\nThe return value of devm_kzalloc could be an null pointer,\nuse \"!desc.pdata\" to fix incorrect handling return value\nof devm_kzalloc.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.0:kernel-devel-rt-6.4.0-39.1.noarch",
"SUSE Linux Micro 6.0:kernel-rt-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.0:kernel-rt-livepatch-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.0:kernel-source-rt-6.4.0-39.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40059",
"url": "https://www.suse.com/security/cve/CVE-2025-40059"
},
{
"category": "external",
"summary": "SUSE Bug 1252809 for CVE-2025-40059",
"url": "https://bugzilla.suse.com/1252809"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.0:kernel-devel-rt-6.4.0-39.1.noarch",
"SUSE Linux Micro 6.0:kernel-rt-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.0:kernel-rt-livepatch-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.0:kernel-source-rt-6.4.0-39.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.0:kernel-devel-rt-6.4.0-39.1.noarch",
"SUSE Linux Micro 6.0:kernel-rt-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.0:kernel-rt-livepatch-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.0:kernel-source-rt-6.4.0-39.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-07T12:33:45Z",
"details": "moderate"
}
],
"title": "CVE-2025-40059"
},
{
"cve": "CVE-2025-40064",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40064"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nsmc: Fix use-after-free in __pnet_find_base_ndev().\n\nsyzbot reported use-after-free of net_device in __pnet_find_base_ndev(),\nwhich was called during connect(). [0]\n\nsmc_pnet_find_ism_resource() fetches sk_dst_get(sk)-\u003edev and passes\ndown to pnet_find_base_ndev(), where RTNL is held. Then, UAF happened\nat __pnet_find_base_ndev() when the dev is first used.\n\nThis means dev had already been freed before acquiring RTNL in\npnet_find_base_ndev().\n\nWhile dev is going away, dst-\u003edev could be swapped with blackhole_netdev,\nand the dev\u0027s refcnt by dst will be released.\n\nWe must hold dev\u0027s refcnt before calling smc_pnet_find_ism_resource().\n\nAlso, smc_pnet_find_roce_resource() has the same problem.\n\nLet\u0027s use __sk_dst_get() and dst_dev_rcu() in the two functions.\n\n[0]:\nBUG: KASAN: use-after-free in __pnet_find_base_ndev+0x1b1/0x1c0 net/smc/smc_pnet.c:926\nRead of size 1 at addr ffff888036bac33a by task syz.0.3632/18609\n\nCPU: 1 UID: 0 PID: 18609 Comm: syz.0.3632 Not tainted syzkaller #0 PREEMPT(full)\nHardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/18/2025\nCall Trace:\n \u003cTASK\u003e\n dump_stack_lvl+0x189/0x250 lib/dump_stack.c:120\n print_address_description mm/kasan/report.c:378 [inline]\n print_report+0xca/0x240 mm/kasan/report.c:482\n kasan_report+0x118/0x150 mm/kasan/report.c:595\n __pnet_find_base_ndev+0x1b1/0x1c0 net/smc/smc_pnet.c:926\n pnet_find_base_ndev net/smc/smc_pnet.c:946 [inline]\n smc_pnet_find_ism_by_pnetid net/smc/smc_pnet.c:1103 [inline]\n smc_pnet_find_ism_resource+0xef/0x390 net/smc/smc_pnet.c:1154\n smc_find_ism_device net/smc/af_smc.c:1030 [inline]\n smc_find_proposal_devices net/smc/af_smc.c:1115 [inline]\n __smc_connect+0x372/0x1890 net/smc/af_smc.c:1545\n smc_connect+0x877/0xd90 net/smc/af_smc.c:1715\n __sys_connect_file net/socket.c:2086 [inline]\n __sys_connect+0x313/0x440 net/socket.c:2105\n __do_sys_connect net/socket.c:2111 [inline]\n __se_sys_connect net/socket.c:2108 [inline]\n __x64_sys_connect+0x7a/0x90 net/socket.c:2108\n do_syscall_x64 arch/x86/entry/syscall_64.c:63 [inline]\n do_syscall_64+0xfa/0x3b0 arch/x86/entry/syscall_64.c:94\n entry_SYSCALL_64_after_hwframe+0x77/0x7f\nRIP: 0033:0x7f47cbf8eba9\nCode: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 \u003c48\u003e 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48\nRSP: 002b:00007f47ccdb1038 EFLAGS: 00000246 ORIG_RAX: 000000000000002a\nRAX: ffffffffffffffda RBX: 00007f47cc1d5fa0 RCX: 00007f47cbf8eba9\nRDX: 0000000000000010 RSI: 0000200000000280 RDI: 000000000000000b\nRBP: 00007f47cc011e19 R08: 0000000000000000 R09: 0000000000000000\nR10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000\nR13: 00007f47cc1d6038 R14: 00007f47cc1d5fa0 R15: 00007ffc512f8aa8\n \u003c/TASK\u003e\n\nThe buggy address belongs to the physical page:\npage: refcount:0 mapcount:0 mapping:0000000000000000 index:0xffff888036bacd00 pfn:0x36bac\nflags: 0xfff00000000000(node=0|zone=1|lastcpupid=0x7ff)\nraw: 00fff00000000000 ffffea0001243d08 ffff8880b863fdc0 0000000000000000\nraw: ffff888036bacd00 0000000000000000 00000000ffffffff 0000000000000000\npage dumped because: kasan: bad access detected\npage_owner tracks the page as freed\npage last allocated via order 2, migratetype Unmovable, gfp_mask 0x446dc0(GFP_KERNEL_ACCOUNT|__GFP_ZERO|__GFP_NOWARN|__GFP_RETRY_MAYFAIL|__GFP_COMP), pid 16741, tgid 16741 (syz-executor), ts 343313197788, free_ts 380670750466\n set_page_owner include/linux/page_owner.h:32 [inline]\n post_alloc_hook+0x240/0x2a0 mm/page_alloc.c:1851\n prep_new_page mm/page_alloc.c:1859 [inline]\n get_page_from_freelist+0x21e4/0x22c0 mm/page_alloc.c:3858\n __alloc_frozen_pages_noprof+0x181/0x370 mm/page_alloc.c:5148\n alloc_pages_mpol+0x232/0x4a0 mm/mempolicy.c:2416\n ___kmalloc_large_node+0x5f/0x1b0 mm/slub.c:4317\n __kmalloc_large_node_noprof+0x18/0x90 mm/slub.c:4348\n __do_kmalloc_node mm/slub.c:4364 [inline]\n __kvmalloc_node\n---truncated---",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.0:kernel-devel-rt-6.4.0-39.1.noarch",
"SUSE Linux Micro 6.0:kernel-rt-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.0:kernel-rt-livepatch-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.0:kernel-source-rt-6.4.0-39.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40064",
"url": "https://www.suse.com/security/cve/CVE-2025-40064"
},
{
"category": "external",
"summary": "SUSE Bug 1252845 for CVE-2025-40064",
"url": "https://bugzilla.suse.com/1252845"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.0:kernel-devel-rt-6.4.0-39.1.noarch",
"SUSE Linux Micro 6.0:kernel-rt-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.0:kernel-rt-livepatch-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.0:kernel-source-rt-6.4.0-39.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.0:kernel-devel-rt-6.4.0-39.1.noarch",
"SUSE Linux Micro 6.0:kernel-rt-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.0:kernel-rt-livepatch-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.0:kernel-source-rt-6.4.0-39.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-07T12:33:45Z",
"details": "moderate"
}
],
"title": "CVE-2025-40064"
},
{
"cve": "CVE-2025-40070",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40070"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\npps: fix warning in pps_register_cdev when register device fail\n\nSimilar to previous commit 2a934fdb01db (\"media: v4l2-dev: fix error\nhandling in __video_register_device()\"), the release hook should be set\nbefore device_register(). Otherwise, when device_register() return error\nand put_device() try to callback the release function, the below warning\nmay happen.\n\n ------------[ cut here ]------------\n WARNING: CPU: 1 PID: 4760 at drivers/base/core.c:2567 device_release+0x1bd/0x240 drivers/base/core.c:2567\n Modules linked in:\n CPU: 1 UID: 0 PID: 4760 Comm: syz.4.914 Not tainted 6.17.0-rc3+ #1 NONE\n RIP: 0010:device_release+0x1bd/0x240 drivers/base/core.c:2567\n Call Trace:\n \u003cTASK\u003e\n kobject_cleanup+0x136/0x410 lib/kobject.c:689\n kobject_release lib/kobject.c:720 [inline]\n kref_put include/linux/kref.h:65 [inline]\n kobject_put+0xe9/0x130 lib/kobject.c:737\n put_device+0x24/0x30 drivers/base/core.c:3797\n pps_register_cdev+0x2da/0x370 drivers/pps/pps.c:402\n pps_register_source+0x2f6/0x480 drivers/pps/kapi.c:108\n pps_tty_open+0x190/0x310 drivers/pps/clients/pps-ldisc.c:57\n tty_ldisc_open+0xa7/0x120 drivers/tty/tty_ldisc.c:432\n tty_set_ldisc+0x333/0x780 drivers/tty/tty_ldisc.c:563\n tiocsetd drivers/tty/tty_io.c:2429 [inline]\n tty_ioctl+0x5d1/0x1700 drivers/tty/tty_io.c:2728\n vfs_ioctl fs/ioctl.c:51 [inline]\n __do_sys_ioctl fs/ioctl.c:598 [inline]\n __se_sys_ioctl fs/ioctl.c:584 [inline]\n __x64_sys_ioctl+0x194/0x210 fs/ioctl.c:584\n do_syscall_x64 arch/x86/entry/syscall_64.c:63 [inline]\n do_syscall_64+0x5f/0x2a0 arch/x86/entry/syscall_64.c:94\n entry_SYSCALL_64_after_hwframe+0x76/0x7e\n \u003c/TASK\u003e\n\nBefore commit c79a39dc8d06 (\"pps: Fix a use-after-free\"),\npps_register_cdev() call device_create() to create pps-\u003edev, which will\ninit dev-\u003erelease to device_create_release(). Now the comment is outdated,\njust remove it.\n\nThanks for the reminder from Calvin Owens, \u0027kfree_pps\u0027 should be removed\nin pps_register_source() to avoid a double free in the failure case.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.0:kernel-devel-rt-6.4.0-39.1.noarch",
"SUSE Linux Micro 6.0:kernel-rt-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.0:kernel-rt-livepatch-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.0:kernel-source-rt-6.4.0-39.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40070",
"url": "https://www.suse.com/security/cve/CVE-2025-40070"
},
{
"category": "external",
"summary": "SUSE Bug 1252836 for CVE-2025-40070",
"url": "https://bugzilla.suse.com/1252836"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.0:kernel-devel-rt-6.4.0-39.1.noarch",
"SUSE Linux Micro 6.0:kernel-rt-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.0:kernel-rt-livepatch-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.0:kernel-source-rt-6.4.0-39.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.0:kernel-devel-rt-6.4.0-39.1.noarch",
"SUSE Linux Micro 6.0:kernel-rt-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.0:kernel-rt-livepatch-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.0:kernel-source-rt-6.4.0-39.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-07T12:33:45Z",
"details": "moderate"
}
],
"title": "CVE-2025-40070"
},
{
"cve": "CVE-2025-40074",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40074"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nipv4: start using dst_dev_rcu()\n\nChange icmpv4_xrlim_allow(), ip_defrag() to prevent possible UAF.\n\nChange ipmr_prepare_xmit(), ipmr_queue_fwd_xmit(), ip_mr_output(),\nipv4_neigh_lookup() to use lockdep enabled dst_dev_rcu().",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.0:kernel-devel-rt-6.4.0-39.1.noarch",
"SUSE Linux Micro 6.0:kernel-rt-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.0:kernel-rt-livepatch-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.0:kernel-source-rt-6.4.0-39.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40074",
"url": "https://www.suse.com/security/cve/CVE-2025-40074"
},
{
"category": "external",
"summary": "SUSE Bug 1252794 for CVE-2025-40074",
"url": "https://bugzilla.suse.com/1252794"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.0:kernel-devel-rt-6.4.0-39.1.noarch",
"SUSE Linux Micro 6.0:kernel-rt-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.0:kernel-rt-livepatch-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.0:kernel-source-rt-6.4.0-39.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.0:kernel-devel-rt-6.4.0-39.1.noarch",
"SUSE Linux Micro 6.0:kernel-rt-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.0:kernel-rt-livepatch-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.0:kernel-source-rt-6.4.0-39.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-07T12:33:45Z",
"details": "moderate"
}
],
"title": "CVE-2025-40074"
},
{
"cve": "CVE-2025-40075",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40075"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\ntcp_metrics: use dst_dev_net_rcu()\n\nReplace three dst_dev() with a lockdep enabled helper.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.0:kernel-devel-rt-6.4.0-39.1.noarch",
"SUSE Linux Micro 6.0:kernel-rt-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.0:kernel-rt-livepatch-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.0:kernel-source-rt-6.4.0-39.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40075",
"url": "https://www.suse.com/security/cve/CVE-2025-40075"
},
{
"category": "external",
"summary": "SUSE Bug 1252795 for CVE-2025-40075",
"url": "https://bugzilla.suse.com/1252795"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.0:kernel-devel-rt-6.4.0-39.1.noarch",
"SUSE Linux Micro 6.0:kernel-rt-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.0:kernel-rt-livepatch-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.0:kernel-source-rt-6.4.0-39.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.0:kernel-devel-rt-6.4.0-39.1.noarch",
"SUSE Linux Micro 6.0:kernel-rt-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.0:kernel-rt-livepatch-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.0:kernel-source-rt-6.4.0-39.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-07T12:33:45Z",
"details": "moderate"
}
],
"title": "CVE-2025-40075"
},
{
"cve": "CVE-2025-40083",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40083"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnet/sched: sch_qfq: Fix null-deref in agg_dequeue\n\nTo prevent a potential crash in agg_dequeue (net/sched/sch_qfq.c)\nwhen cl-\u003eqdisc-\u003eops-\u003epeek(cl-\u003eqdisc) returns NULL, we check the return\nvalue before using it, similar to the existing approach in sch_hfsc.c.\n\nTo avoid code duplication, the following changes are made:\n\n1. Changed qdisc_warn_nonwc(include/net/pkt_sched.h) into a static\ninline function.\n\n2. Moved qdisc_peek_len from net/sched/sch_hfsc.c to\ninclude/net/pkt_sched.h so that sch_qfq can reuse it.\n\n3. Applied qdisc_peek_len in agg_dequeue to avoid crashing.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.0:kernel-devel-rt-6.4.0-39.1.noarch",
"SUSE Linux Micro 6.0:kernel-rt-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.0:kernel-rt-livepatch-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.0:kernel-source-rt-6.4.0-39.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40083",
"url": "https://www.suse.com/security/cve/CVE-2025-40083"
},
{
"category": "external",
"summary": "SUSE Bug 1252912 for CVE-2025-40083",
"url": "https://bugzilla.suse.com/1252912"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.0:kernel-devel-rt-6.4.0-39.1.noarch",
"SUSE Linux Micro 6.0:kernel-rt-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.0:kernel-rt-livepatch-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.0:kernel-source-rt-6.4.0-39.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.0:kernel-devel-rt-6.4.0-39.1.noarch",
"SUSE Linux Micro 6.0:kernel-rt-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.0:kernel-rt-livepatch-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.0:kernel-source-rt-6.4.0-39.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-07T12:33:45Z",
"details": "moderate"
}
],
"title": "CVE-2025-40083"
},
{
"cve": "CVE-2025-40098",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40098"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nALSA: hda: cs35l41: Fix NULL pointer dereference in cs35l41_get_acpi_mute_state()\n\nReturn value of a function acpi_evaluate_dsm() is dereferenced without\nchecking for NULL, but it is usually checked for this function.\n\nacpi_evaluate_dsm() may return NULL, when acpi_evaluate_object() returns\nacpi_status other than ACPI_SUCCESS, so add a check to prevent the crach.\n\nFound by Linux Verification Center (linuxtesting.org) with SVACE.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.0:kernel-devel-rt-6.4.0-39.1.noarch",
"SUSE Linux Micro 6.0:kernel-rt-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.0:kernel-rt-livepatch-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.0:kernel-source-rt-6.4.0-39.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40098",
"url": "https://www.suse.com/security/cve/CVE-2025-40098"
},
{
"category": "external",
"summary": "SUSE Bug 1252917 for CVE-2025-40098",
"url": "https://bugzilla.suse.com/1252917"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.0:kernel-devel-rt-6.4.0-39.1.noarch",
"SUSE Linux Micro 6.0:kernel-rt-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.0:kernel-rt-livepatch-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.0:kernel-source-rt-6.4.0-39.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.0:kernel-devel-rt-6.4.0-39.1.noarch",
"SUSE Linux Micro 6.0:kernel-rt-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.0:kernel-rt-livepatch-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.0:kernel-source-rt-6.4.0-39.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-07T12:33:45Z",
"details": "moderate"
}
],
"title": "CVE-2025-40098"
},
{
"cve": "CVE-2025-40105",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40105"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nvfs: Don\u0027t leak disconnected dentries on umount\n\nWhen user calls open_by_handle_at() on some inode that is not cached, we\nwill create disconnected dentry for it. If such dentry is a directory,\nexportfs_decode_fh_raw() will then try to connect this dentry to the\ndentry tree through reconnect_path(). It may happen for various reasons\n(such as corrupted fs or race with rename) that the call to\nlookup_one_unlocked() in reconnect_one() will fail to find the dentry we\nare trying to reconnect and instead create a new dentry under the\nparent. Now this dentry will not be marked as disconnected although the\nparent still may well be disconnected (at least in case this\ninconsistency happened because the fs is corrupted and .. doesn\u0027t point\nto the real parent directory). This creates inconsistency in\ndisconnected flags but AFAICS it was mostly harmless. At least until\ncommit f1ee616214cb (\"VFS: don\u0027t keep disconnected dentries on d_anon\")\nwhich removed adding of most disconnected dentries to sb-\u003es_anon list.\nThus after this commit cleanup of disconnected dentries implicitely\nrelies on the fact that dput() will immediately reclaim such dentries.\nHowever when some leaf dentry isn\u0027t marked as disconnected, as in the\nscenario described above, the reclaim doesn\u0027t happen and the dentries\nare \"leaked\". Memory reclaim can eventually reclaim them but otherwise\nthey stay in memory and if umount comes first, we hit infamous \"Busy\ninodes after unmount\" bug. Make sure all dentries created under a\ndisconnected parent are marked as disconnected as well.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.0:kernel-devel-rt-6.4.0-39.1.noarch",
"SUSE Linux Micro 6.0:kernel-rt-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.0:kernel-rt-livepatch-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.0:kernel-source-rt-6.4.0-39.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40105",
"url": "https://www.suse.com/security/cve/CVE-2025-40105"
},
{
"category": "external",
"summary": "SUSE Bug 1252928 for CVE-2025-40105",
"url": "https://bugzilla.suse.com/1252928"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.0:kernel-devel-rt-6.4.0-39.1.noarch",
"SUSE Linux Micro 6.0:kernel-rt-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.0:kernel-rt-livepatch-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.0:kernel-source-rt-6.4.0-39.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.3,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.0:kernel-devel-rt-6.4.0-39.1.noarch",
"SUSE Linux Micro 6.0:kernel-rt-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.0:kernel-rt-livepatch-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.0:kernel-source-rt-6.4.0-39.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-07T12:33:45Z",
"details": "low"
}
],
"title": "CVE-2025-40105"
},
{
"cve": "CVE-2025-40107",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40107"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\ncan: hi311x: fix null pointer dereference when resuming from sleep before interface was enabled\n\nThis issue is similar to the vulnerability in the `mcp251x` driver,\nwhich was fixed in commit 03c427147b2d (\"can: mcp251x: fix resume from\nsleep before interface was brought up\").\n\nIn the `hi311x` driver, when the device resumes from sleep, the driver\nschedules `priv-\u003erestart_work`. However, if the network interface was\nnot previously enabled, the `priv-\u003ewq` (workqueue) is not allocated and\ninitialized, leading to a null pointer dereference.\n\nTo fix this, we move the allocation and initialization of the workqueue\nfrom the `hi3110_open` function to the `hi3110_can_probe` function.\nThis ensures that the workqueue is properly initialized before it is\nused during device resume. And added logic to destroy the workqueue\nin the error handling paths of `hi3110_can_probe` and in the\n`hi3110_can_remove` function to prevent resource leaks.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.0:kernel-devel-rt-6.4.0-39.1.noarch",
"SUSE Linux Micro 6.0:kernel-rt-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.0:kernel-rt-livepatch-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.0:kernel-source-rt-6.4.0-39.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40107",
"url": "https://www.suse.com/security/cve/CVE-2025-40107"
},
{
"category": "external",
"summary": "SUSE Bug 1253018 for CVE-2025-40107",
"url": "https://bugzilla.suse.com/1253018"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.0:kernel-devel-rt-6.4.0-39.1.noarch",
"SUSE Linux Micro 6.0:kernel-rt-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.0:kernel-rt-livepatch-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.0:kernel-source-rt-6.4.0-39.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.0:kernel-devel-rt-6.4.0-39.1.noarch",
"SUSE Linux Micro 6.0:kernel-rt-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.0:kernel-rt-livepatch-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.0:kernel-source-rt-6.4.0-39.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-07T12:33:45Z",
"details": "moderate"
}
],
"title": "CVE-2025-40107"
},
{
"cve": "CVE-2025-40109",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40109"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\ncrypto: rng - Ensure set_ent is always present\n\nEnsure that set_ent is always set since only drbg provides it.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.0:kernel-devel-rt-6.4.0-39.1.noarch",
"SUSE Linux Micro 6.0:kernel-rt-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.0:kernel-rt-livepatch-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.0:kernel-source-rt-6.4.0-39.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40109",
"url": "https://www.suse.com/security/cve/CVE-2025-40109"
},
{
"category": "external",
"summary": "SUSE Bug 1253176 for CVE-2025-40109",
"url": "https://bugzilla.suse.com/1253176"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.0:kernel-devel-rt-6.4.0-39.1.noarch",
"SUSE Linux Micro 6.0:kernel-rt-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.0:kernel-rt-livepatch-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.0:kernel-source-rt-6.4.0-39.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.0:kernel-devel-rt-6.4.0-39.1.noarch",
"SUSE Linux Micro 6.0:kernel-rt-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.0:kernel-rt-livepatch-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.0:kernel-source-rt-6.4.0-39.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-07T12:33:45Z",
"details": "moderate"
}
],
"title": "CVE-2025-40109"
},
{
"cve": "CVE-2025-40110",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40110"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\ndrm/vmwgfx: Fix a null-ptr access in the cursor snooper\n\nCheck that the resource which is converted to a surface exists before\ntrying to use the cursor snooper on it.\n\nvmw_cmd_res_check allows explicit invalid (SVGA3D_INVALID_ID) identifiers\nbecause some svga commands accept SVGA3D_INVALID_ID to mean \"no surface\",\nunfortunately functions that accept the actual surfaces as objects might\n(and in case of the cursor snooper, do not) be able to handle null\nobjects. Make sure that we validate not only the identifier (via the\nvmw_cmd_res_check) but also check that the actual resource exists before\ntrying to do something with it.\n\nFixes unchecked null-ptr reference in the snooping code.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.0:kernel-devel-rt-6.4.0-39.1.noarch",
"SUSE Linux Micro 6.0:kernel-rt-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.0:kernel-rt-livepatch-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.0:kernel-source-rt-6.4.0-39.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40110",
"url": "https://www.suse.com/security/cve/CVE-2025-40110"
},
{
"category": "external",
"summary": "SUSE Bug 1253275 for CVE-2025-40110",
"url": "https://bugzilla.suse.com/1253275"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.0:kernel-devel-rt-6.4.0-39.1.noarch",
"SUSE Linux Micro 6.0:kernel-rt-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.0:kernel-rt-livepatch-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.0:kernel-source-rt-6.4.0-39.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.1,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.0:kernel-devel-rt-6.4.0-39.1.noarch",
"SUSE Linux Micro 6.0:kernel-rt-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.0:kernel-rt-livepatch-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.0:kernel-source-rt-6.4.0-39.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-07T12:33:45Z",
"details": "moderate"
}
],
"title": "CVE-2025-40110"
},
{
"cve": "CVE-2025-40111",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40111"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\ndrm/vmwgfx: Fix Use-after-free in validation\n\nNodes stored in the validation duplicates hashtable come from an arena\nallocator that is cleared at the end of vmw_execbuf_process. All nodes\nare expected to be cleared in vmw_validation_drop_ht but this node escaped\nbecause its resource was destroyed prematurely.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.0:kernel-devel-rt-6.4.0-39.1.noarch",
"SUSE Linux Micro 6.0:kernel-rt-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.0:kernel-rt-livepatch-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.0:kernel-source-rt-6.4.0-39.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40111",
"url": "https://www.suse.com/security/cve/CVE-2025-40111"
},
{
"category": "external",
"summary": "SUSE Bug 1253362 for CVE-2025-40111",
"url": "https://bugzilla.suse.com/1253362"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.0:kernel-devel-rt-6.4.0-39.1.noarch",
"SUSE Linux Micro 6.0:kernel-rt-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.0:kernel-rt-livepatch-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.0:kernel-source-rt-6.4.0-39.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.7,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:L/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.0:kernel-devel-rt-6.4.0-39.1.noarch",
"SUSE Linux Micro 6.0:kernel-rt-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.0:kernel-rt-livepatch-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.0:kernel-source-rt-6.4.0-39.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-07T12:33:45Z",
"details": "moderate"
}
],
"title": "CVE-2025-40111"
},
{
"cve": "CVE-2025-40115",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40115"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nscsi: mpt3sas: Fix crash in transport port remove by using ioc_info()\n\nDuring mpt3sas_transport_port_remove(), messages were logged with\ndev_printk() against \u0026mpt3sas_port-\u003eport-\u003edev. At this point the SAS\ntransport device may already be partially unregistered or freed, leading\nto a crash when accessing its struct device.\n\nUsing ioc_info(), which logs via the PCI device (ioc-\u003epdev-\u003edev),\nguaranteed to remain valid until driver removal.\n\n[83428.295776] Oops: general protection fault, probably for non-canonical address 0x6f702f323a33312d: 0000 [#1] SMP NOPTI\n[83428.295785] CPU: 145 UID: 0 PID: 113296 Comm: rmmod Kdump: loaded Tainted: G OE 6.16.0-rc1+ #1 PREEMPT(voluntary)\n[83428.295792] Tainted: [O]=OOT_MODULE, [E]=UNSIGNED_MODULE\n[83428.295795] Hardware name: Dell Inc. Precision 7875 Tower/, BIOS 89.1.67 02/23/2024\n[83428.295799] RIP: 0010:__dev_printk+0x1f/0x70\n[83428.295805] Code: 90 90 90 90 90 90 90 90 90 90 90 0f 1f 44 00 00 49 89 d1 48 85 f6 74 52 4c 8b 46 50 4d 85 c0 74 1f 48 8b 46 68 48 85 c0 74 22 \u003c48\u003e 8b 08 0f b6 7f 01 48 c7 c2 db e8 42 ad 83 ef 30 e9 7b f8 ff ff\n[83428.295813] RSP: 0018:ff85aeafc3137bb0 EFLAGS: 00010206\n[83428.295817] RAX: 6f702f323a33312d RBX: ff4290ee81292860 RCX: 5000cca25103be32\n[83428.295820] RDX: ff85aeafc3137bb8 RSI: ff4290eeb1966c00 RDI: ffffffffc1560845\n[83428.295823] RBP: ff85aeafc3137c18 R08: 74726f702f303a33 R09: ff85aeafc3137bb8\n[83428.295826] R10: ff85aeafc3137b18 R11: ff4290f5bd60fe68 R12: ff4290ee81290000\n[83428.295830] R13: ff4290ee6e345de0 R14: ff4290ee81290000 R15: ff4290ee6e345e30\n[83428.295833] FS: 00007fd9472a6740(0000) GS:ff4290f5ce96b000(0000) knlGS:0000000000000000\n[83428.295837] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033\n[83428.295840] CR2: 00007f242b4db238 CR3: 00000002372b8006 CR4: 0000000000771ef0\n[83428.295844] PKRU: 55555554\n[83428.295846] Call Trace:\n[83428.295848] \u003cTASK\u003e\n[83428.295850] _dev_printk+0x5c/0x80\n[83428.295857] ? srso_alias_return_thunk+0x5/0xfbef5\n[83428.295863] mpt3sas_transport_port_remove+0x1c7/0x420 [mpt3sas]\n[83428.295882] _scsih_remove_device+0x21b/0x280 [mpt3sas]\n[83428.295894] ? _scsih_expander_node_remove+0x108/0x140 [mpt3sas]\n[83428.295906] ? srso_alias_return_thunk+0x5/0xfbef5\n[83428.295910] mpt3sas_device_remove_by_sas_address.part.0+0x8f/0x110 [mpt3sas]\n[83428.295921] _scsih_expander_node_remove+0x129/0x140 [mpt3sas]\n[83428.295933] _scsih_expander_node_remove+0x6a/0x140 [mpt3sas]\n[83428.295944] scsih_remove+0x3f0/0x4a0 [mpt3sas]\n[83428.295957] pci_device_remove+0x3b/0xb0\n[83428.295962] device_release_driver_internal+0x193/0x200\n[83428.295968] driver_detach+0x44/0x90\n[83428.295971] bus_remove_driver+0x69/0xf0\n[83428.295975] pci_unregister_driver+0x2a/0xb0\n[83428.295979] _mpt3sas_exit+0x1f/0x300 [mpt3sas]\n[83428.295991] __do_sys_delete_module.constprop.0+0x174/0x310\n[83428.295997] ? srso_alias_return_thunk+0x5/0xfbef5\n[83428.296000] ? __x64_sys_getdents64+0x9a/0x110\n[83428.296005] ? srso_alias_return_thunk+0x5/0xfbef5\n[83428.296009] ? syscall_trace_enter+0xf6/0x1b0\n[83428.296014] do_syscall_64+0x7b/0x2c0\n[83428.296019] ? srso_alias_return_thunk+0x5/0xfbef5\n[83428.296023] entry_SYSCALL_64_after_hwframe+0x76/0x7e",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.0:kernel-devel-rt-6.4.0-39.1.noarch",
"SUSE Linux Micro 6.0:kernel-rt-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.0:kernel-rt-livepatch-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.0:kernel-source-rt-6.4.0-39.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40115",
"url": "https://www.suse.com/security/cve/CVE-2025-40115"
},
{
"category": "external",
"summary": "SUSE Bug 1253318 for CVE-2025-40115",
"url": "https://bugzilla.suse.com/1253318"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.0:kernel-devel-rt-6.4.0-39.1.noarch",
"SUSE Linux Micro 6.0:kernel-rt-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.0:kernel-rt-livepatch-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.0:kernel-source-rt-6.4.0-39.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.0:kernel-devel-rt-6.4.0-39.1.noarch",
"SUSE Linux Micro 6.0:kernel-rt-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.0:kernel-rt-livepatch-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.0:kernel-source-rt-6.4.0-39.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-07T12:33:45Z",
"details": "moderate"
}
],
"title": "CVE-2025-40115"
},
{
"cve": "CVE-2025-40116",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40116"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nusb: host: max3421-hcd: Fix error pointer dereference in probe cleanup\n\nThe kthread_run() function returns error pointers so the\nmax3421_hcd-\u003espi_thread pointer can be either error pointers or NULL.\nCheck for both before dereferencing it.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.0:kernel-devel-rt-6.4.0-39.1.noarch",
"SUSE Linux Micro 6.0:kernel-rt-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.0:kernel-rt-livepatch-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.0:kernel-source-rt-6.4.0-39.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40116",
"url": "https://www.suse.com/security/cve/CVE-2025-40116"
},
{
"category": "external",
"summary": "SUSE Bug 1253324 for CVE-2025-40116",
"url": "https://bugzilla.suse.com/1253324"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.0:kernel-devel-rt-6.4.0-39.1.noarch",
"SUSE Linux Micro 6.0:kernel-rt-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.0:kernel-rt-livepatch-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.0:kernel-source-rt-6.4.0-39.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.0:kernel-devel-rt-6.4.0-39.1.noarch",
"SUSE Linux Micro 6.0:kernel-rt-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.0:kernel-rt-livepatch-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.0:kernel-source-rt-6.4.0-39.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-07T12:33:45Z",
"details": "moderate"
}
],
"title": "CVE-2025-40116"
},
{
"cve": "CVE-2025-40118",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40118"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nscsi: pm80xx: Fix array-index-out-of-of-bounds on rmmod\n\nSince commit f7b705c238d1 (\"scsi: pm80xx: Set phy_attached to zero when\ndevice is gone\") UBSAN reports:\n\n UBSAN: array-index-out-of-bounds in drivers/scsi/pm8001/pm8001_sas.c:786:17\n index 28 is out of range for type \u0027pm8001_phy [16]\u0027\n\non rmmod when using an expander.\n\nFor a direct attached device, attached_phy contains the local phy id.\nFor a device behind an expander, attached_phy contains the remote phy\nid, not the local phy id.\n\nI.e. while pm8001_ha will have pm8001_ha-\u003echip-\u003en_phy local phys, for a\ndevice behind an expander, attached_phy can be much larger than\npm8001_ha-\u003echip-\u003en_phy (depending on the amount of phys of the\nexpander).\n\nE.g. on my system pm8001_ha has 8 phys with phy ids 0-7. One of the\nports has an expander connected. The expander has 31 phys with phy ids\n0-30.\n\nThe pm8001_ha-\u003ephy array only contains the phys of the HBA. It does not\ncontain the phys of the expander. Thus, it is wrong to use attached_phy\nto index the pm8001_ha-\u003ephy array for a device behind an expander.\n\nThus, we can only clear phy_attached for devices that are directly\nattached.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.0:kernel-devel-rt-6.4.0-39.1.noarch",
"SUSE Linux Micro 6.0:kernel-rt-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.0:kernel-rt-livepatch-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.0:kernel-source-rt-6.4.0-39.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40118",
"url": "https://www.suse.com/security/cve/CVE-2025-40118"
},
{
"category": "external",
"summary": "SUSE Bug 1253363 for CVE-2025-40118",
"url": "https://bugzilla.suse.com/1253363"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.0:kernel-devel-rt-6.4.0-39.1.noarch",
"SUSE Linux Micro 6.0:kernel-rt-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.0:kernel-rt-livepatch-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.0:kernel-source-rt-6.4.0-39.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.1,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.0:kernel-devel-rt-6.4.0-39.1.noarch",
"SUSE Linux Micro 6.0:kernel-rt-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.0:kernel-rt-livepatch-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.0:kernel-source-rt-6.4.0-39.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-07T12:33:45Z",
"details": "moderate"
}
],
"title": "CVE-2025-40118"
},
{
"cve": "CVE-2025-40120",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40120"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnet: usb: asix: hold PM usage ref to avoid PM/MDIO + RTNL deadlock\n\nPrevent USB runtime PM (autosuspend) for AX88772* in bind.\n\nusbnet enables runtime PM (autosuspend) by default, so disabling it via\nthe usb_driver flag is ineffective. On AX88772B, autosuspend shows no\nmeasurable power saving with current driver (no link partner, admin\nup/down). The ~0.453 W -\u003e ~0.248 W drop on v6.1 comes from phylib powering\nthe PHY off on admin-down, not from USB autosuspend.\n\nThe real hazard is that with runtime PM enabled, ndo_open() (under RTNL)\nmay synchronously trigger autoresume (usb_autopm_get_interface()) into\nasix_resume() while the USB PM lock is held. Resume paths then invoke\nphylink/phylib and MDIO, which also expect RTNL, leading to possible\ndeadlocks or PM lock vs MDIO wake issues.\n\nTo avoid this, keep the device runtime-PM active by taking a usage\nreference in ax88772_bind() and dropping it in unbind(). A non-zero PM\nusage count blocks runtime suspend regardless of userspace policy\n(.../power/control - pm_runtime_allow/forbid), making this approach\nrobust against sysfs overrides.\n\nHolding a runtime-PM usage ref does not affect system-wide suspend;\nsystem sleep/resume callbacks continue to run as before.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.0:kernel-devel-rt-6.4.0-39.1.noarch",
"SUSE Linux Micro 6.0:kernel-rt-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.0:kernel-rt-livepatch-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.0:kernel-source-rt-6.4.0-39.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40120",
"url": "https://www.suse.com/security/cve/CVE-2025-40120"
},
{
"category": "external",
"summary": "SUSE Bug 1253360 for CVE-2025-40120",
"url": "https://bugzilla.suse.com/1253360"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.0:kernel-devel-rt-6.4.0-39.1.noarch",
"SUSE Linux Micro 6.0:kernel-rt-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.0:kernel-rt-livepatch-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.0:kernel-source-rt-6.4.0-39.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.0:kernel-devel-rt-6.4.0-39.1.noarch",
"SUSE Linux Micro 6.0:kernel-rt-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.0:kernel-rt-livepatch-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.0:kernel-source-rt-6.4.0-39.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-07T12:33:45Z",
"details": "moderate"
}
],
"title": "CVE-2025-40120"
},
{
"cve": "CVE-2025-40121",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40121"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nASoC: Intel: bytcr_rt5651: Fix invalid quirk input mapping\n\nWhen an invalid value is passed via quirk option, currently\nbytcr_rt5640 driver just ignores and leaves as is, which may lead to\nunepxected results like OOB access.\n\nThis patch adds the sanity check and corrects the input mapping to the\ncertain default value if an invalid value is passed.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.0:kernel-devel-rt-6.4.0-39.1.noarch",
"SUSE Linux Micro 6.0:kernel-rt-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.0:kernel-rt-livepatch-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.0:kernel-source-rt-6.4.0-39.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40121",
"url": "https://www.suse.com/security/cve/CVE-2025-40121"
},
{
"category": "external",
"summary": "SUSE Bug 1253367 for CVE-2025-40121",
"url": "https://bugzilla.suse.com/1253367"
},
{
"category": "external",
"summary": "SUSE Bug 1253430 for CVE-2025-40121",
"url": "https://bugzilla.suse.com/1253430"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.0:kernel-devel-rt-6.4.0-39.1.noarch",
"SUSE Linux Micro 6.0:kernel-rt-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.0:kernel-rt-livepatch-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.0:kernel-source-rt-6.4.0-39.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.0:kernel-devel-rt-6.4.0-39.1.noarch",
"SUSE Linux Micro 6.0:kernel-rt-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.0:kernel-rt-livepatch-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.0:kernel-source-rt-6.4.0-39.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-07T12:33:45Z",
"details": "moderate"
}
],
"title": "CVE-2025-40121"
},
{
"cve": "CVE-2025-40127",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40127"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nhwrng: ks-sa - fix division by zero in ks_sa_rng_init\n\nFix division by zero in ks_sa_rng_init caused by missing clock\npointer initialization. The clk_get_rate() call is performed on\nan uninitialized clk pointer, resulting in division by zero when\ncalculating delay values.\n\nAdd clock initialization code before using the clock.\n\n\n drivers/char/hw_random/ks-sa-rng.c | 7 +++++++\n 1 file changed, 7 insertions(+)",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.0:kernel-devel-rt-6.4.0-39.1.noarch",
"SUSE Linux Micro 6.0:kernel-rt-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.0:kernel-rt-livepatch-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.0:kernel-source-rt-6.4.0-39.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40127",
"url": "https://www.suse.com/security/cve/CVE-2025-40127"
},
{
"category": "external",
"summary": "SUSE Bug 1253369 for CVE-2025-40127",
"url": "https://bugzilla.suse.com/1253369"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.0:kernel-devel-rt-6.4.0-39.1.noarch",
"SUSE Linux Micro 6.0:kernel-rt-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.0:kernel-rt-livepatch-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.0:kernel-source-rt-6.4.0-39.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.0:kernel-devel-rt-6.4.0-39.1.noarch",
"SUSE Linux Micro 6.0:kernel-rt-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.0:kernel-rt-livepatch-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.0:kernel-source-rt-6.4.0-39.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-07T12:33:45Z",
"details": "moderate"
}
],
"title": "CVE-2025-40127"
},
{
"cve": "CVE-2025-40129",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40129"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nsunrpc: fix null pointer dereference on zero-length checksum\n\nIn xdr_stream_decode_opaque_auth(), zero-length checksum.len causes\nchecksum.data to be set to NULL. This triggers a NPD when accessing\nchecksum.data in gss_krb5_verify_mic_v2(). This patch ensures that\nthe value of checksum.len is not less than XDR_UNIT.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.0:kernel-devel-rt-6.4.0-39.1.noarch",
"SUSE Linux Micro 6.0:kernel-rt-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.0:kernel-rt-livepatch-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.0:kernel-source-rt-6.4.0-39.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40129",
"url": "https://www.suse.com/security/cve/CVE-2025-40129"
},
{
"category": "external",
"summary": "SUSE Bug 1253472 for CVE-2025-40129",
"url": "https://bugzilla.suse.com/1253472"
},
{
"category": "external",
"summary": "SUSE Bug 1253473 for CVE-2025-40129",
"url": "https://bugzilla.suse.com/1253473"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.0:kernel-devel-rt-6.4.0-39.1.noarch",
"SUSE Linux Micro 6.0:kernel-rt-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.0:kernel-rt-livepatch-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.0:kernel-source-rt-6.4.0-39.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.0:kernel-devel-rt-6.4.0-39.1.noarch",
"SUSE Linux Micro 6.0:kernel-rt-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.0:kernel-rt-livepatch-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.0:kernel-source-rt-6.4.0-39.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-07T12:33:45Z",
"details": "important"
}
],
"title": "CVE-2025-40129"
},
{
"cve": "CVE-2025-40139",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40139"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nsmc: Use __sk_dst_get() and dst_dev_rcu() in in smc_clc_prfx_set().\n\nsmc_clc_prfx_set() is called during connect() and not under RCU\nnor RTNL.\n\nUsing sk_dst_get(sk)-\u003edev could trigger UAF.\n\nLet\u0027s use __sk_dst_get() and dev_dst_rcu() under rcu_read_lock()\nafter kernel_getsockname().\n\nNote that the returned value of smc_clc_prfx_set() is not used\nin the caller.\n\nWhile at it, we change the 1st arg of smc_clc_prfx_set[46]_rcu()\nnot to touch dst there.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.0:kernel-devel-rt-6.4.0-39.1.noarch",
"SUSE Linux Micro 6.0:kernel-rt-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.0:kernel-rt-livepatch-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.0:kernel-source-rt-6.4.0-39.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40139",
"url": "https://www.suse.com/security/cve/CVE-2025-40139"
},
{
"category": "external",
"summary": "SUSE Bug 1253409 for CVE-2025-40139",
"url": "https://bugzilla.suse.com/1253409"
},
{
"category": "external",
"summary": "SUSE Bug 1253411 for CVE-2025-40139",
"url": "https://bugzilla.suse.com/1253411"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.0:kernel-devel-rt-6.4.0-39.1.noarch",
"SUSE Linux Micro 6.0:kernel-rt-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.0:kernel-rt-livepatch-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.0:kernel-source-rt-6.4.0-39.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.0:kernel-devel-rt-6.4.0-39.1.noarch",
"SUSE Linux Micro 6.0:kernel-rt-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.0:kernel-rt-livepatch-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.0:kernel-source-rt-6.4.0-39.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-07T12:33:45Z",
"details": "important"
}
],
"title": "CVE-2025-40139"
},
{
"cve": "CVE-2025-40140",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40140"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnet: usb: Remove disruptive netif_wake_queue in rtl8150_set_multicast\n\nsyzbot reported WARNING in rtl8150_start_xmit/usb_submit_urb.\nThis is the sequence of events that leads to the warning:\n\nrtl8150_start_xmit() {\n\tnetif_stop_queue();\n\tusb_submit_urb(dev-\u003etx_urb);\n}\n\nrtl8150_set_multicast() {\n\tnetif_stop_queue();\n\tnetif_wake_queue();\t\t\u003c-- wakes up TX queue before URB is done\n}\n\nrtl8150_start_xmit() {\n\tnetif_stop_queue();\n\tusb_submit_urb(dev-\u003etx_urb);\t\u003c-- double submission\n}\n\nrtl8150_set_multicast being the ndo_set_rx_mode callback should not be\ncalling netif_stop_queue and notif_start_queue as these handle\nTX queue synchronization.\n\nThe net core function dev_set_rx_mode handles the synchronization\nfor rtl8150_set_multicast making it safe to remove these locks.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.0:kernel-devel-rt-6.4.0-39.1.noarch",
"SUSE Linux Micro 6.0:kernel-rt-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.0:kernel-rt-livepatch-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.0:kernel-source-rt-6.4.0-39.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40140",
"url": "https://www.suse.com/security/cve/CVE-2025-40140"
},
{
"category": "external",
"summary": "SUSE Bug 1253349 for CVE-2025-40140",
"url": "https://bugzilla.suse.com/1253349"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.0:kernel-devel-rt-6.4.0-39.1.noarch",
"SUSE Linux Micro 6.0:kernel-rt-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.0:kernel-rt-livepatch-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.0:kernel-source-rt-6.4.0-39.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.3,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.0:kernel-devel-rt-6.4.0-39.1.noarch",
"SUSE Linux Micro 6.0:kernel-rt-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.0:kernel-rt-livepatch-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.0:kernel-source-rt-6.4.0-39.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-07T12:33:45Z",
"details": "low"
}
],
"title": "CVE-2025-40140"
},
{
"cve": "CVE-2025-40141",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40141"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nBluetooth: ISO: Fix possible UAF on iso_conn_free\n\nThis attempt to fix similar issue to sco_conn_free where if the\nconn-\u003esk is not set to NULL may lead to UAF on iso_conn_free.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.0:kernel-devel-rt-6.4.0-39.1.noarch",
"SUSE Linux Micro 6.0:kernel-rt-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.0:kernel-rt-livepatch-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.0:kernel-source-rt-6.4.0-39.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40141",
"url": "https://www.suse.com/security/cve/CVE-2025-40141"
},
{
"category": "external",
"summary": "SUSE Bug 1253352 for CVE-2025-40141",
"url": "https://bugzilla.suse.com/1253352"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.0:kernel-devel-rt-6.4.0-39.1.noarch",
"SUSE Linux Micro 6.0:kernel-rt-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.0:kernel-rt-livepatch-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.0:kernel-source-rt-6.4.0-39.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.0:kernel-devel-rt-6.4.0-39.1.noarch",
"SUSE Linux Micro 6.0:kernel-rt-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.0:kernel-rt-livepatch-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.0:kernel-source-rt-6.4.0-39.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-07T12:33:45Z",
"details": "moderate"
}
],
"title": "CVE-2025-40141"
},
{
"cve": "CVE-2025-40149",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40149"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\ntls: Use __sk_dst_get() and dst_dev_rcu() in get_netdev_for_sock().\n\nget_netdev_for_sock() is called during setsockopt(),\nso not under RCU.\n\nUsing sk_dst_get(sk)-\u003edev could trigger UAF.\n\nLet\u0027s use __sk_dst_get() and dst_dev_rcu().\n\nNote that the only -\u003endo_sk_get_lower_dev() user is\nbond_sk_get_lower_dev(), which uses RCU.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.0:kernel-devel-rt-6.4.0-39.1.noarch",
"SUSE Linux Micro 6.0:kernel-rt-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.0:kernel-rt-livepatch-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.0:kernel-source-rt-6.4.0-39.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40149",
"url": "https://www.suse.com/security/cve/CVE-2025-40149"
},
{
"category": "external",
"summary": "SUSE Bug 1253355 for CVE-2025-40149",
"url": "https://bugzilla.suse.com/1253355"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.0:kernel-devel-rt-6.4.0-39.1.noarch",
"SUSE Linux Micro 6.0:kernel-rt-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.0:kernel-rt-livepatch-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.0:kernel-source-rt-6.4.0-39.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.0:kernel-devel-rt-6.4.0-39.1.noarch",
"SUSE Linux Micro 6.0:kernel-rt-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.0:kernel-rt-livepatch-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.0:kernel-source-rt-6.4.0-39.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-07T12:33:45Z",
"details": "moderate"
}
],
"title": "CVE-2025-40149"
},
{
"cve": "CVE-2025-40154",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40154"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nASoC: Intel: bytcr_rt5640: Fix invalid quirk input mapping\n\nWhen an invalid value is passed via quirk option, currently\nbytcr_rt5640 driver only shows an error message but leaves as is.\nThis may lead to unepxected results like OOB access.\n\nThis patch corrects the input mapping to the certain default value if\nan invalid value is passed.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.0:kernel-devel-rt-6.4.0-39.1.noarch",
"SUSE Linux Micro 6.0:kernel-rt-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.0:kernel-rt-livepatch-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.0:kernel-source-rt-6.4.0-39.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40154",
"url": "https://www.suse.com/security/cve/CVE-2025-40154"
},
{
"category": "external",
"summary": "SUSE Bug 1253431 for CVE-2025-40154",
"url": "https://bugzilla.suse.com/1253431"
},
{
"category": "external",
"summary": "SUSE Bug 1253432 for CVE-2025-40154",
"url": "https://bugzilla.suse.com/1253432"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.0:kernel-devel-rt-6.4.0-39.1.noarch",
"SUSE Linux Micro 6.0:kernel-rt-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.0:kernel-rt-livepatch-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.0:kernel-source-rt-6.4.0-39.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.0:kernel-devel-rt-6.4.0-39.1.noarch",
"SUSE Linux Micro 6.0:kernel-rt-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.0:kernel-rt-livepatch-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.0:kernel-source-rt-6.4.0-39.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-07T12:33:45Z",
"details": "moderate"
}
],
"title": "CVE-2025-40154"
},
{
"cve": "CVE-2025-40156",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40156"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nPM / devfreq: mtk-cci: Fix potential error pointer dereference in probe()\n\nThe drv-\u003esram_reg pointer could be set to ERR_PTR(-EPROBE_DEFER) which\nwould lead to a error pointer dereference. Use IS_ERR_OR_NULL() to check\nthat the pointer is valid.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.0:kernel-devel-rt-6.4.0-39.1.noarch",
"SUSE Linux Micro 6.0:kernel-rt-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.0:kernel-rt-livepatch-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.0:kernel-source-rt-6.4.0-39.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40156",
"url": "https://www.suse.com/security/cve/CVE-2025-40156"
},
{
"category": "external",
"summary": "SUSE Bug 1253428 for CVE-2025-40156",
"url": "https://bugzilla.suse.com/1253428"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.0:kernel-devel-rt-6.4.0-39.1.noarch",
"SUSE Linux Micro 6.0:kernel-rt-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.0:kernel-rt-livepatch-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.0:kernel-source-rt-6.4.0-39.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.0:kernel-devel-rt-6.4.0-39.1.noarch",
"SUSE Linux Micro 6.0:kernel-rt-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.0:kernel-rt-livepatch-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.0:kernel-source-rt-6.4.0-39.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-07T12:33:45Z",
"details": "moderate"
}
],
"title": "CVE-2025-40156"
},
{
"cve": "CVE-2025-40157",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40157"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nEDAC/i10nm: Skip DIMM enumeration on a disabled memory controller\n\nWhen loading the i10nm_edac driver on some Intel Granite Rapids servers,\na call trace may appear as follows:\n\n UBSAN: shift-out-of-bounds in drivers/edac/skx_common.c:453:16\n shift exponent -66 is negative\n ...\n __ubsan_handle_shift_out_of_bounds+0x1e3/0x390\n skx_get_dimm_info.cold+0x47/0xd40 [skx_edac_common]\n i10nm_get_dimm_config+0x23e/0x390 [i10nm_edac]\n skx_register_mci+0x159/0x220 [skx_edac_common]\n i10nm_init+0xcb0/0x1ff0 [i10nm_edac]\n ...\n\nThis occurs because some BIOS may disable a memory controller if there\naren\u0027t any memory DIMMs populated on this memory controller. The DIMMMTR\nregister of this disabled memory controller contains the invalid value\n~0, resulting in the call trace above.\n\nFix this call trace by skipping DIMM enumeration on a disabled memory\ncontroller.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.0:kernel-devel-rt-6.4.0-39.1.noarch",
"SUSE Linux Micro 6.0:kernel-rt-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.0:kernel-rt-livepatch-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.0:kernel-source-rt-6.4.0-39.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40157",
"url": "https://www.suse.com/security/cve/CVE-2025-40157"
},
{
"category": "external",
"summary": "SUSE Bug 1253423 for CVE-2025-40157",
"url": "https://bugzilla.suse.com/1253423"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.0:kernel-devel-rt-6.4.0-39.1.noarch",
"SUSE Linux Micro 6.0:kernel-rt-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.0:kernel-rt-livepatch-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.0:kernel-source-rt-6.4.0-39.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.2,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:L/I:L/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.0:kernel-devel-rt-6.4.0-39.1.noarch",
"SUSE Linux Micro 6.0:kernel-rt-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.0:kernel-rt-livepatch-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.0:kernel-source-rt-6.4.0-39.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-07T12:33:45Z",
"details": "moderate"
}
],
"title": "CVE-2025-40157"
},
{
"cve": "CVE-2025-40159",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40159"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nxsk: Harden userspace-supplied xdp_desc validation\n\nTurned out certain clearly invalid values passed in xdp_desc from\nuserspace can pass xp_{,un}aligned_validate_desc() and then lead\nto UBs or just invalid frames to be queued for xmit.\n\ndesc-\u003elen close to ``U32_MAX`` with a non-zero pool-\u003etx_metadata_len\ncan cause positive integer overflow and wraparound, the same way low\nenough desc-\u003eaddr with a non-zero pool-\u003etx_metadata_len can cause\nnegative integer overflow. Both scenarios can then pass the\nvalidation successfully.\nThis doesn\u0027t happen with valid XSk applications, but can be used\nto perform attacks.\n\nAlways promote desc-\u003elen to ``u64`` first to exclude positive\noverflows of it. Use explicit check_{add,sub}_overflow() when\nvalidating desc-\u003eaddr (which is ``u64`` already).\n\nbloat-o-meter reports a little growth of the code size:\n\nadd/remove: 0/0 grow/shrink: 2/1 up/down: 60/-16 (44)\nFunction old new delta\nxskq_cons_peek_desc 299 330 +31\nxsk_tx_peek_release_desc_batch 973 1002 +29\nxsk_generic_xmit 3148 3132 -16\n\nbut hopefully this doesn\u0027t hurt the performance much.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.0:kernel-devel-rt-6.4.0-39.1.noarch",
"SUSE Linux Micro 6.0:kernel-rt-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.0:kernel-rt-livepatch-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.0:kernel-source-rt-6.4.0-39.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40159",
"url": "https://www.suse.com/security/cve/CVE-2025-40159"
},
{
"category": "external",
"summary": "SUSE Bug 1253403 for CVE-2025-40159",
"url": "https://bugzilla.suse.com/1253403"
},
{
"category": "external",
"summary": "SUSE Bug 1253404 for CVE-2025-40159",
"url": "https://bugzilla.suse.com/1253404"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.0:kernel-devel-rt-6.4.0-39.1.noarch",
"SUSE Linux Micro 6.0:kernel-rt-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.0:kernel-rt-livepatch-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.0:kernel-source-rt-6.4.0-39.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.0:kernel-devel-rt-6.4.0-39.1.noarch",
"SUSE Linux Micro 6.0:kernel-rt-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.0:kernel-rt-livepatch-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.0:kernel-source-rt-6.4.0-39.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-07T12:33:45Z",
"details": "important"
}
],
"title": "CVE-2025-40159"
},
{
"cve": "CVE-2025-40164",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40164"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nusbnet: Fix using smp_processor_id() in preemptible code warnings\n\nSyzbot reported the following warning:\n\nBUG: using smp_processor_id() in preemptible [00000000] code: dhcpcd/2879\ncaller is usbnet_skb_return+0x74/0x490 drivers/net/usb/usbnet.c:331\nCPU: 1 UID: 0 PID: 2879 Comm: dhcpcd Not tainted 6.15.0-rc4-syzkaller-00098-g615dca38c2ea #0 PREEMPT(voluntary)\nCall Trace:\n \u003cTASK\u003e\n __dump_stack lib/dump_stack.c:94 [inline]\n dump_stack_lvl+0x16c/0x1f0 lib/dump_stack.c:120\n check_preemption_disabled+0xd0/0xe0 lib/smp_processor_id.c:49\n usbnet_skb_return+0x74/0x490 drivers/net/usb/usbnet.c:331\n usbnet_resume_rx+0x4b/0x170 drivers/net/usb/usbnet.c:708\n usbnet_change_mtu+0x1be/0x220 drivers/net/usb/usbnet.c:417\n __dev_set_mtu net/core/dev.c:9443 [inline]\n netif_set_mtu_ext+0x369/0x5c0 net/core/dev.c:9496\n netif_set_mtu+0xb0/0x160 net/core/dev.c:9520\n dev_set_mtu+0xae/0x170 net/core/dev_api.c:247\n dev_ifsioc+0xa31/0x18d0 net/core/dev_ioctl.c:572\n dev_ioctl+0x223/0x10e0 net/core/dev_ioctl.c:821\n sock_do_ioctl+0x19d/0x280 net/socket.c:1204\n sock_ioctl+0x42f/0x6a0 net/socket.c:1311\n vfs_ioctl fs/ioctl.c:51 [inline]\n __do_sys_ioctl fs/ioctl.c:906 [inline]\n __se_sys_ioctl fs/ioctl.c:892 [inline]\n __x64_sys_ioctl+0x190/0x200 fs/ioctl.c:892\n do_syscall_x64 arch/x86/entry/syscall_64.c:63 [inline]\n do_syscall_64+0xcd/0x260 arch/x86/entry/syscall_64.c:94\n entry_SYSCALL_64_after_hwframe+0x77/0x7f\n\nFor historical and portability reasons, the netif_rx() is usually\nrun in the softirq or interrupt context, this commit therefore add\nlocal_bh_disable/enable() protection in the usbnet_resume_rx().",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.0:kernel-devel-rt-6.4.0-39.1.noarch",
"SUSE Linux Micro 6.0:kernel-rt-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.0:kernel-rt-livepatch-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.0:kernel-source-rt-6.4.0-39.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40164",
"url": "https://www.suse.com/security/cve/CVE-2025-40164"
},
{
"category": "external",
"summary": "SUSE Bug 1253407 for CVE-2025-40164",
"url": "https://bugzilla.suse.com/1253407"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.0:kernel-devel-rt-6.4.0-39.1.noarch",
"SUSE Linux Micro 6.0:kernel-rt-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.0:kernel-rt-livepatch-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.0:kernel-source-rt-6.4.0-39.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.7,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.0:kernel-devel-rt-6.4.0-39.1.noarch",
"SUSE Linux Micro 6.0:kernel-rt-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.0:kernel-rt-livepatch-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.0:kernel-source-rt-6.4.0-39.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-07T12:33:45Z",
"details": "moderate"
}
],
"title": "CVE-2025-40164"
},
{
"cve": "CVE-2025-40168",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40168"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nsmc: Use __sk_dst_get() and dst_dev_rcu() in smc_clc_prfx_match().\n\nsmc_clc_prfx_match() is called from smc_listen_work() and\nnot under RCU nor RTNL.\n\nUsing sk_dst_get(sk)-\u003edev could trigger UAF.\n\nLet\u0027s use __sk_dst_get() and dst_dev_rcu().\n\nNote that the returned value of smc_clc_prfx_match() is not\nused in the caller.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.0:kernel-devel-rt-6.4.0-39.1.noarch",
"SUSE Linux Micro 6.0:kernel-rt-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.0:kernel-rt-livepatch-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.0:kernel-source-rt-6.4.0-39.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40168",
"url": "https://www.suse.com/security/cve/CVE-2025-40168"
},
{
"category": "external",
"summary": "SUSE Bug 1253427 for CVE-2025-40168",
"url": "https://bugzilla.suse.com/1253427"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.0:kernel-devel-rt-6.4.0-39.1.noarch",
"SUSE Linux Micro 6.0:kernel-rt-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.0:kernel-rt-livepatch-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.0:kernel-source-rt-6.4.0-39.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.0:kernel-devel-rt-6.4.0-39.1.noarch",
"SUSE Linux Micro 6.0:kernel-rt-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.0:kernel-rt-livepatch-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.0:kernel-source-rt-6.4.0-39.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-07T12:33:45Z",
"details": "moderate"
}
],
"title": "CVE-2025-40168"
},
{
"cve": "CVE-2025-40169",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40169"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nbpf: Reject negative offsets for ALU ops\n\nWhen verifying BPF programs, the check_alu_op() function validates\ninstructions with ALU operations. The \u0027offset\u0027 field in these\ninstructions is a signed 16-bit integer.\n\nThe existing check \u0027insn-\u003eoff \u003e 1\u0027 was intended to ensure the offset is\neither 0, or 1 for BPF_MOD/BPF_DIV. However, because \u0027insn-\u003eoff\u0027 is\nsigned, this check incorrectly accepts all negative values (e.g., -1).\n\nThis commit tightens the validation by changing the condition to\n\u0027(insn-\u003eoff != 0 \u0026\u0026 insn-\u003eoff != 1)\u0027. This ensures that any value\nother than the explicitly permitted 0 and 1 is rejected, hardening the\nverifier against malformed BPF programs.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.0:kernel-devel-rt-6.4.0-39.1.noarch",
"SUSE Linux Micro 6.0:kernel-rt-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.0:kernel-rt-livepatch-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.0:kernel-source-rt-6.4.0-39.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40169",
"url": "https://www.suse.com/security/cve/CVE-2025-40169"
},
{
"category": "external",
"summary": "SUSE Bug 1253416 for CVE-2025-40169",
"url": "https://bugzilla.suse.com/1253416"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.0:kernel-devel-rt-6.4.0-39.1.noarch",
"SUSE Linux Micro 6.0:kernel-rt-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.0:kernel-rt-livepatch-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.0:kernel-source-rt-6.4.0-39.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.8,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.0:kernel-devel-rt-6.4.0-39.1.noarch",
"SUSE Linux Micro 6.0:kernel-rt-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.0:kernel-rt-livepatch-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.0:kernel-source-rt-6.4.0-39.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-07T12:33:45Z",
"details": "moderate"
}
],
"title": "CVE-2025-40169"
},
{
"cve": "CVE-2025-40171",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40171"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnvmet-fc: move lsop put work to nvmet_fc_ls_req_op\n\nIt\u0027s possible for more than one async command to be in flight from\n__nvmet_fc_send_ls_req. For each command, a tgtport reference is taken.\n\nIn the current code, only one put work item is queued at a time, which\nresults in a leaked reference.\n\nTo fix this, move the work item to the nvmet_fc_ls_req_op struct, which\nalready tracks all resources related to the command.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.0:kernel-devel-rt-6.4.0-39.1.noarch",
"SUSE Linux Micro 6.0:kernel-rt-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.0:kernel-rt-livepatch-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.0:kernel-source-rt-6.4.0-39.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40171",
"url": "https://www.suse.com/security/cve/CVE-2025-40171"
},
{
"category": "external",
"summary": "SUSE Bug 1253412 for CVE-2025-40171",
"url": "https://bugzilla.suse.com/1253412"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.0:kernel-devel-rt-6.4.0-39.1.noarch",
"SUSE Linux Micro 6.0:kernel-rt-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.0:kernel-rt-livepatch-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.0:kernel-source-rt-6.4.0-39.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.0:kernel-devel-rt-6.4.0-39.1.noarch",
"SUSE Linux Micro 6.0:kernel-rt-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.0:kernel-rt-livepatch-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.0:kernel-source-rt-6.4.0-39.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-07T12:33:45Z",
"details": "moderate"
}
],
"title": "CVE-2025-40171"
},
{
"cve": "CVE-2025-40172",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40172"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\naccel/qaic: Treat remaining == 0 as error in find_and_map_user_pages()\n\nCurrently, if find_and_map_user_pages() takes a DMA xfer request from the\nuser with a length field set to 0, or in a rare case, the host receives\nQAIC_TRANS_DMA_XFER_CONT from the device where resources-\u003exferred_dma_size\nis equal to the requested transaction size, the function will return 0\nbefore allocating an sgt or setting the fields of the dma_xfer struct.\nIn that case, encode_addr_size_pairs() will try to access the sgt which\nwill lead to a general protection fault.\n\nReturn an EINVAL in case the user provides a zero-sized ALP, or the device\nrequests continuation after all of the bytes have been transferred.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.0:kernel-devel-rt-6.4.0-39.1.noarch",
"SUSE Linux Micro 6.0:kernel-rt-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.0:kernel-rt-livepatch-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.0:kernel-source-rt-6.4.0-39.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40172",
"url": "https://www.suse.com/security/cve/CVE-2025-40172"
},
{
"category": "external",
"summary": "SUSE Bug 1253424 for CVE-2025-40172",
"url": "https://bugzilla.suse.com/1253424"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.0:kernel-devel-rt-6.4.0-39.1.noarch",
"SUSE Linux Micro 6.0:kernel-rt-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.0:kernel-rt-livepatch-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.0:kernel-source-rt-6.4.0-39.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.0:kernel-devel-rt-6.4.0-39.1.noarch",
"SUSE Linux Micro 6.0:kernel-rt-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.0:kernel-rt-livepatch-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.0:kernel-source-rt-6.4.0-39.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-07T12:33:45Z",
"details": "moderate"
}
],
"title": "CVE-2025-40172"
},
{
"cve": "CVE-2025-40173",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40173"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnet/ip6_tunnel: Prevent perpetual tunnel growth\n\nSimilarly to ipv4 tunnel, ipv6 version updates dev-\u003eneeded_headroom, too.\nWhile ipv4 tunnel headroom adjustment growth was limited in\ncommit 5ae1e9922bbd (\"net: ip_tunnel: prevent perpetual headroom growth\"),\nipv6 tunnel yet increases the headroom without any ceiling.\n\nReflect ipv4 tunnel headroom adjustment limit on ipv6 version.\n\nCredits to Francesco Ruggeri, who was originally debugging this issue\nand wrote local Arista-specific patch and a reproducer.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.0:kernel-devel-rt-6.4.0-39.1.noarch",
"SUSE Linux Micro 6.0:kernel-rt-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.0:kernel-rt-livepatch-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.0:kernel-source-rt-6.4.0-39.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40173",
"url": "https://www.suse.com/security/cve/CVE-2025-40173"
},
{
"category": "external",
"summary": "SUSE Bug 1253421 for CVE-2025-40173",
"url": "https://bugzilla.suse.com/1253421"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.0:kernel-devel-rt-6.4.0-39.1.noarch",
"SUSE Linux Micro 6.0:kernel-rt-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.0:kernel-rt-livepatch-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.0:kernel-source-rt-6.4.0-39.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.7,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.0:kernel-devel-rt-6.4.0-39.1.noarch",
"SUSE Linux Micro 6.0:kernel-rt-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.0:kernel-rt-livepatch-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.0:kernel-source-rt-6.4.0-39.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-07T12:33:45Z",
"details": "moderate"
}
],
"title": "CVE-2025-40173"
},
{
"cve": "CVE-2025-40176",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40176"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\ntls: wait for pending async decryptions if tls_strp_msg_hold fails\n\nAsync decryption calls tls_strp_msg_hold to create a clone of the\ninput skb to hold references to the memory it uses. If we fail to\nallocate that clone, proceeding with async decryption can lead to\nvarious issues (UAF on the skb, writing into userspace memory after\nthe recv() call has returned).\n\nIn this case, wait for all pending decryption requests.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.0:kernel-devel-rt-6.4.0-39.1.noarch",
"SUSE Linux Micro 6.0:kernel-rt-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.0:kernel-rt-livepatch-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.0:kernel-source-rt-6.4.0-39.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40176",
"url": "https://www.suse.com/security/cve/CVE-2025-40176"
},
{
"category": "external",
"summary": "SUSE Bug 1253425 for CVE-2025-40176",
"url": "https://bugzilla.suse.com/1253425"
},
{
"category": "external",
"summary": "SUSE Bug 1254100 for CVE-2025-40176",
"url": "https://bugzilla.suse.com/1254100"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.0:kernel-devel-rt-6.4.0-39.1.noarch",
"SUSE Linux Micro 6.0:kernel-rt-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.0:kernel-rt-livepatch-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.0:kernel-source-rt-6.4.0-39.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.0:kernel-devel-rt-6.4.0-39.1.noarch",
"SUSE Linux Micro 6.0:kernel-rt-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.0:kernel-rt-livepatch-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.0:kernel-source-rt-6.4.0-39.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-07T12:33:45Z",
"details": "important"
}
],
"title": "CVE-2025-40176"
},
{
"cve": "CVE-2025-40180",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40180"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nmailbox: zynqmp-ipi: Fix out-of-bounds access in mailbox cleanup loop\n\nThe cleanup loop was starting at the wrong array index, causing\nout-of-bounds access.\nStart the loop at the correct index for zero-indexed arrays to prevent\naccessing memory beyond the allocated array bounds.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.0:kernel-devel-rt-6.4.0-39.1.noarch",
"SUSE Linux Micro 6.0:kernel-rt-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.0:kernel-rt-livepatch-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.0:kernel-source-rt-6.4.0-39.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40180",
"url": "https://www.suse.com/security/cve/CVE-2025-40180"
},
{
"category": "external",
"summary": "SUSE Bug 1253440 for CVE-2025-40180",
"url": "https://bugzilla.suse.com/1253440"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.0:kernel-devel-rt-6.4.0-39.1.noarch",
"SUSE Linux Micro 6.0:kernel-rt-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.0:kernel-rt-livepatch-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.0:kernel-source-rt-6.4.0-39.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.0:kernel-devel-rt-6.4.0-39.1.noarch",
"SUSE Linux Micro 6.0:kernel-rt-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.0:kernel-rt-livepatch-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.0:kernel-source-rt-6.4.0-39.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-07T12:33:45Z",
"details": "moderate"
}
],
"title": "CVE-2025-40180"
},
{
"cve": "CVE-2025-40183",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40183"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nbpf: Fix metadata_dst leak __bpf_redirect_neigh_v{4,6}\n\nCilium has a BPF egress gateway feature which forces outgoing K8s Pod\ntraffic to pass through dedicated egress gateways which then SNAT the\ntraffic in order to interact with stable IPs outside the cluster.\n\nThe traffic is directed to the gateway via vxlan tunnel in collect md\nmode. A recent BPF change utilized the bpf_redirect_neigh() helper to\nforward packets after the arrival and decap on vxlan, which turned out\nover time that the kmalloc-256 slab usage in kernel was ever-increasing.\n\nThe issue was that vxlan allocates the metadata_dst object and attaches\nit through a fake dst entry to the skb. The latter was never released\nthough given bpf_redirect_neigh() was merely setting the new dst entry\nvia skb_dst_set() without dropping an existing one first.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.0:kernel-devel-rt-6.4.0-39.1.noarch",
"SUSE Linux Micro 6.0:kernel-rt-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.0:kernel-rt-livepatch-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.0:kernel-source-rt-6.4.0-39.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40183",
"url": "https://www.suse.com/security/cve/CVE-2025-40183"
},
{
"category": "external",
"summary": "SUSE Bug 1253441 for CVE-2025-40183",
"url": "https://bugzilla.suse.com/1253441"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.0:kernel-devel-rt-6.4.0-39.1.noarch",
"SUSE Linux Micro 6.0:kernel-rt-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.0:kernel-rt-livepatch-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.0:kernel-source-rt-6.4.0-39.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.0:kernel-devel-rt-6.4.0-39.1.noarch",
"SUSE Linux Micro 6.0:kernel-rt-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.0:kernel-rt-livepatch-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.0:kernel-source-rt-6.4.0-39.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-07T12:33:45Z",
"details": "moderate"
}
],
"title": "CVE-2025-40183"
},
{
"cve": "CVE-2025-40186",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40186"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\ntcp: Don\u0027t call reqsk_fastopen_remove() in tcp_conn_request().\n\nsyzbot reported the splat below in tcp_conn_request(). [0]\n\nIf a listener is close()d while a TFO socket is being processed in\ntcp_conn_request(), inet_csk_reqsk_queue_add() does not set reqsk-\u003esk\nand calls inet_child_forget(), which calls tcp_disconnect() for the\nTFO socket.\n\nAfter the cited commit, tcp_disconnect() calls reqsk_fastopen_remove(),\nwhere reqsk_put() is called due to !reqsk-\u003esk.\n\nThen, reqsk_fastopen_remove() in tcp_conn_request() decrements the\nlast req-\u003ersk_refcnt and frees reqsk, and __reqsk_free() at the\ndrop_and_free label causes the refcount underflow for the listener\nand double-free of the reqsk.\n\nLet\u0027s remove reqsk_fastopen_remove() in tcp_conn_request().\n\nNote that other callers make sure tp-\u003efastopen_rsk is not NULL.\n\n[0]:\nrefcount_t: underflow; use-after-free.\nWARNING: CPU: 12 PID: 5563 at lib/refcount.c:28 refcount_warn_saturate (lib/refcount.c:28)\nModules linked in:\nCPU: 12 UID: 0 PID: 5563 Comm: syz-executor Not tainted syzkaller #0 PREEMPT(full)\nHardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025\nRIP: 0010:refcount_warn_saturate (lib/refcount.c:28)\nCode: ab e8 8e b4 98 ff 0f 0b c3 cc cc cc cc cc 80 3d a4 e4 d6 01 00 75 9c c6 05 9b e4 d6 01 01 48 c7 c7 e8 df fb ab e8 6a b4 98 ff \u003c0f\u003e 0b e9 03 5b 76 00 cc 80 3d 7d e4 d6 01 00 0f 85 74 ff ff ff c6\nRSP: 0018:ffffa79fc0304a98 EFLAGS: 00010246\nRAX: d83af4db1c6b3900 RBX: ffff9f65c7a69020 RCX: d83af4db1c6b3900\nRDX: 0000000000000000 RSI: 00000000ffff7fff RDI: ffffffffac78a280\nRBP: 000000009d781b60 R08: 0000000000007fff R09: ffffffffac6ca280\nR10: 0000000000017ffd R11: 0000000000000004 R12: ffff9f65c7b4f100\nR13: ffff9f65c7d23c00 R14: ffff9f65c7d26000 R15: ffff9f65c7a64ef8\nFS: 00007f9f962176c0(0000) GS:ffff9f65fcf00000(0000) knlGS:0000000000000000\nCS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033\nCR2: 0000200000000180 CR3: 000000000dbbe006 CR4: 0000000000372ef0\nCall Trace:\n \u003cIRQ\u003e\n tcp_conn_request (./include/linux/refcount.h:400 ./include/linux/refcount.h:432 ./include/linux/refcount.h:450 ./include/net/sock.h:1965 ./include/net/request_sock.h:131 net/ipv4/tcp_input.c:7301)\n tcp_rcv_state_process (net/ipv4/tcp_input.c:6708)\n tcp_v6_do_rcv (net/ipv6/tcp_ipv6.c:1670)\n tcp_v6_rcv (net/ipv6/tcp_ipv6.c:1906)\n ip6_protocol_deliver_rcu (net/ipv6/ip6_input.c:438)\n ip6_input (net/ipv6/ip6_input.c:500)\n ipv6_rcv (net/ipv6/ip6_input.c:311)\n __netif_receive_skb (net/core/dev.c:6104)\n process_backlog (net/core/dev.c:6456)\n __napi_poll (net/core/dev.c:7506)\n net_rx_action (net/core/dev.c:7569 net/core/dev.c:7696)\n handle_softirqs (kernel/softirq.c:579)\n do_softirq (kernel/softirq.c:480)\n \u003c/IRQ\u003e",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.0:kernel-devel-rt-6.4.0-39.1.noarch",
"SUSE Linux Micro 6.0:kernel-rt-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.0:kernel-rt-livepatch-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.0:kernel-source-rt-6.4.0-39.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40186",
"url": "https://www.suse.com/security/cve/CVE-2025-40186"
},
{
"category": "external",
"summary": "SUSE Bug 1253438 for CVE-2025-40186",
"url": "https://bugzilla.suse.com/1253438"
},
{
"category": "external",
"summary": "SUSE Bug 1253439 for CVE-2025-40186",
"url": "https://bugzilla.suse.com/1253439"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.0:kernel-devel-rt-6.4.0-39.1.noarch",
"SUSE Linux Micro 6.0:kernel-rt-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.0:kernel-rt-livepatch-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.0:kernel-source-rt-6.4.0-39.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.0:kernel-devel-rt-6.4.0-39.1.noarch",
"SUSE Linux Micro 6.0:kernel-rt-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.0:kernel-rt-livepatch-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.0:kernel-source-rt-6.4.0-39.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-07T12:33:45Z",
"details": "important"
}
],
"title": "CVE-2025-40186"
},
{
"cve": "CVE-2025-40188",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40188"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\npwm: berlin: Fix wrong register in suspend/resume\n\nThe \u0027enable\u0027 register should be BERLIN_PWM_EN rather than\nBERLIN_PWM_ENABLE, otherwise, the driver accesses wrong address, there\nwill be cpu exception then kernel panic during suspend/resume.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.0:kernel-devel-rt-6.4.0-39.1.noarch",
"SUSE Linux Micro 6.0:kernel-rt-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.0:kernel-rt-livepatch-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.0:kernel-source-rt-6.4.0-39.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40188",
"url": "https://www.suse.com/security/cve/CVE-2025-40188"
},
{
"category": "external",
"summary": "SUSE Bug 1253449 for CVE-2025-40188",
"url": "https://bugzilla.suse.com/1253449"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.0:kernel-devel-rt-6.4.0-39.1.noarch",
"SUSE Linux Micro 6.0:kernel-rt-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.0:kernel-rt-livepatch-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.0:kernel-source-rt-6.4.0-39.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.0:kernel-devel-rt-6.4.0-39.1.noarch",
"SUSE Linux Micro 6.0:kernel-rt-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.0:kernel-rt-livepatch-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.0:kernel-source-rt-6.4.0-39.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-07T12:33:45Z",
"details": "moderate"
}
],
"title": "CVE-2025-40188"
},
{
"cve": "CVE-2025-40194",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40194"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\ncpufreq: intel_pstate: Fix object lifecycle issue in update_qos_request()\n\nThe cpufreq_cpu_put() call in update_qos_request() takes place too early\nbecause the latter subsequently calls freq_qos_update_request() that\nindirectly accesses the policy object in question through the QoS request\nobject passed to it.\n\nFortunately, update_qos_request() is called under intel_pstate_driver_lock,\nso this issue does not matter for changing the intel_pstate operation\nmode, but it theoretically can cause a crash to occur on CPU device hot\nremoval (which currently can only happen in virt, but it is formally\nsupported nevertheless).\n\nAddress this issue by modifying update_qos_request() to drop the\nreference to the policy later.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.0:kernel-devel-rt-6.4.0-39.1.noarch",
"SUSE Linux Micro 6.0:kernel-rt-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.0:kernel-rt-livepatch-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.0:kernel-source-rt-6.4.0-39.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40194",
"url": "https://www.suse.com/security/cve/CVE-2025-40194"
},
{
"category": "external",
"summary": "SUSE Bug 1253445 for CVE-2025-40194",
"url": "https://bugzilla.suse.com/1253445"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.0:kernel-devel-rt-6.4.0-39.1.noarch",
"SUSE Linux Micro 6.0:kernel-rt-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.0:kernel-rt-livepatch-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.0:kernel-source-rt-6.4.0-39.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.7,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.0:kernel-devel-rt-6.4.0-39.1.noarch",
"SUSE Linux Micro 6.0:kernel-rt-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.0:kernel-rt-livepatch-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.0:kernel-source-rt-6.4.0-39.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-07T12:33:45Z",
"details": "moderate"
}
],
"title": "CVE-2025-40194"
},
{
"cve": "CVE-2025-40198",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40198"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\next4: avoid potential buffer over-read in parse_apply_sb_mount_options()\n\nUnlike other strings in the ext4 superblock, we rely on tune2fs to\nmake sure s_mount_opts is NUL terminated. Harden\nparse_apply_sb_mount_options() by treating s_mount_opts as a potential\n__nonstring.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.0:kernel-devel-rt-6.4.0-39.1.noarch",
"SUSE Linux Micro 6.0:kernel-rt-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.0:kernel-rt-livepatch-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.0:kernel-source-rt-6.4.0-39.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40198",
"url": "https://www.suse.com/security/cve/CVE-2025-40198"
},
{
"category": "external",
"summary": "SUSE Bug 1253453 for CVE-2025-40198",
"url": "https://bugzilla.suse.com/1253453"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.0:kernel-devel-rt-6.4.0-39.1.noarch",
"SUSE Linux Micro 6.0:kernel-rt-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.0:kernel-rt-livepatch-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.0:kernel-source-rt-6.4.0-39.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.0:kernel-devel-rt-6.4.0-39.1.noarch",
"SUSE Linux Micro 6.0:kernel-rt-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.0:kernel-rt-livepatch-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.0:kernel-source-rt-6.4.0-39.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-07T12:33:45Z",
"details": "moderate"
}
],
"title": "CVE-2025-40198"
},
{
"cve": "CVE-2025-40200",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40200"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nSquashfs: reject negative file sizes in squashfs_read_inode()\n\nSyskaller reports a \"WARNING in ovl_copy_up_file\" in overlayfs.\n\nThis warning is ultimately caused because the underlying Squashfs file\nsystem returns a file with a negative file size.\n\nThis commit checks for a negative file size and returns EINVAL.\n\n[phillip@squashfs.org.uk: only need to check 64 bit quantity]",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.0:kernel-devel-rt-6.4.0-39.1.noarch",
"SUSE Linux Micro 6.0:kernel-rt-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.0:kernel-rt-livepatch-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.0:kernel-source-rt-6.4.0-39.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40200",
"url": "https://www.suse.com/security/cve/CVE-2025-40200"
},
{
"category": "external",
"summary": "SUSE Bug 1253448 for CVE-2025-40200",
"url": "https://bugzilla.suse.com/1253448"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.0:kernel-devel-rt-6.4.0-39.1.noarch",
"SUSE Linux Micro 6.0:kernel-rt-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.0:kernel-rt-livepatch-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.0:kernel-source-rt-6.4.0-39.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.0:kernel-devel-rt-6.4.0-39.1.noarch",
"SUSE Linux Micro 6.0:kernel-rt-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.0:kernel-rt-livepatch-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.0:kernel-source-rt-6.4.0-39.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-07T12:33:45Z",
"details": "moderate"
}
],
"title": "CVE-2025-40200"
},
{
"cve": "CVE-2025-40204",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40204"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nsctp: Fix MAC comparison to be constant-time\n\nTo prevent timing attacks, MACs need to be compared in constant time.\nUse the appropriate helper function for this.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.0:kernel-devel-rt-6.4.0-39.1.noarch",
"SUSE Linux Micro 6.0:kernel-rt-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.0:kernel-rt-livepatch-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.0:kernel-source-rt-6.4.0-39.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40204",
"url": "https://www.suse.com/security/cve/CVE-2025-40204"
},
{
"category": "external",
"summary": "SUSE Bug 1253436 for CVE-2025-40204",
"url": "https://bugzilla.suse.com/1253436"
},
{
"category": "external",
"summary": "SUSE Bug 1253437 for CVE-2025-40204",
"url": "https://bugzilla.suse.com/1253437"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.0:kernel-devel-rt-6.4.0-39.1.noarch",
"SUSE Linux Micro 6.0:kernel-rt-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.0:kernel-rt-livepatch-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.0:kernel-source-rt-6.4.0-39.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.0:kernel-devel-rt-6.4.0-39.1.noarch",
"SUSE Linux Micro 6.0:kernel-rt-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.0:kernel-rt-livepatch-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.0:kernel-source-rt-6.4.0-39.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-07T12:33:45Z",
"details": "important"
}
],
"title": "CVE-2025-40204"
},
{
"cve": "CVE-2025-40205",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40205"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nbtrfs: avoid potential out-of-bounds in btrfs_encode_fh()\n\nThe function btrfs_encode_fh() does not properly account for the three\ncases it handles.\n\nBefore writing to the file handle (fh), the function only returns to the\nuser BTRFS_FID_SIZE_NON_CONNECTABLE (5 dwords, 20 bytes) or\nBTRFS_FID_SIZE_CONNECTABLE (8 dwords, 32 bytes).\n\nHowever, when a parent exists and the root ID of the parent and the\ninode are different, the function writes BTRFS_FID_SIZE_CONNECTABLE_ROOT\n(10 dwords, 40 bytes).\n\nIf *max_len is not large enough, this write goes out of bounds because\nBTRFS_FID_SIZE_CONNECTABLE_ROOT is greater than\nBTRFS_FID_SIZE_CONNECTABLE originally returned.\n\nThis results in an 8-byte out-of-bounds write at\nfid-\u003eparent_root_objectid = parent_root_id.\n\nA previous attempt to fix this issue was made but was lost.\n\nhttps://lore.kernel.org/all/4CADAEEC020000780001B32C@vpn.id2.novell.com/\n\nAlthough this issue does not seem to be easily triggerable, it is a\npotential memory corruption bug that should be fixed. This patch\nresolves the issue by ensuring the function returns the appropriate size\nfor all three cases and validates that *max_len is large enough before\nwriting any data.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.0:kernel-devel-rt-6.4.0-39.1.noarch",
"SUSE Linux Micro 6.0:kernel-rt-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.0:kernel-rt-livepatch-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.0:kernel-source-rt-6.4.0-39.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40205",
"url": "https://www.suse.com/security/cve/CVE-2025-40205"
},
{
"category": "external",
"summary": "SUSE Bug 1253456 for CVE-2025-40205",
"url": "https://bugzilla.suse.com/1253456"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.0:kernel-devel-rt-6.4.0-39.1.noarch",
"SUSE Linux Micro 6.0:kernel-rt-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.0:kernel-rt-livepatch-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.0:kernel-source-rt-6.4.0-39.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.0:kernel-devel-rt-6.4.0-39.1.noarch",
"SUSE Linux Micro 6.0:kernel-rt-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.0:kernel-rt-livepatch-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.0:kernel-source-rt-6.4.0-39.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-07T12:33:45Z",
"details": "moderate"
}
],
"title": "CVE-2025-40205"
},
{
"cve": "CVE-2025-40206",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40206"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnetfilter: nft_objref: validate objref and objrefmap expressions\n\nReferencing a synproxy stateful object from OUTPUT hook causes kernel\ncrash due to infinite recursive calls:\n\nBUG: TASK stack guard page was hit at 000000008bda5b8c (stack is 000000003ab1c4a5..00000000494d8b12)\n[...]\nCall Trace:\n __find_rr_leaf+0x99/0x230\n fib6_table_lookup+0x13b/0x2d0\n ip6_pol_route+0xa4/0x400\n fib6_rule_lookup+0x156/0x240\n ip6_route_output_flags+0xc6/0x150\n __nf_ip6_route+0x23/0x50\n synproxy_send_tcp_ipv6+0x106/0x200\n synproxy_send_client_synack_ipv6+0x1aa/0x1f0\n nft_synproxy_do_eval+0x263/0x310\n nft_do_chain+0x5a8/0x5f0 [nf_tables\n nft_do_chain_inet+0x98/0x110\n nf_hook_slow+0x43/0xc0\n __ip6_local_out+0xf0/0x170\n ip6_local_out+0x17/0x70\n synproxy_send_tcp_ipv6+0x1a2/0x200\n synproxy_send_client_synack_ipv6+0x1aa/0x1f0\n[...]\n\nImplement objref and objrefmap expression validate functions.\n\nCurrently, only NFT_OBJECT_SYNPROXY object type requires validation.\nThis will also handle a jump to a chain using a synproxy object from the\nOUTPUT hook.\n\nNow when trying to reference a synproxy object in the OUTPUT hook, nft\nwill produce the following error:\n\nsynproxy_crash.nft: Error: Could not process rule: Operation not supported\n synproxy name mysynproxy\n ^^^^^^^^^^^^^^^^^^^^^^^^",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.0:kernel-devel-rt-6.4.0-39.1.noarch",
"SUSE Linux Micro 6.0:kernel-rt-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.0:kernel-rt-livepatch-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.0:kernel-source-rt-6.4.0-39.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40206",
"url": "https://www.suse.com/security/cve/CVE-2025-40206"
},
{
"category": "external",
"summary": "SUSE Bug 1253393 for CVE-2025-40206",
"url": "https://bugzilla.suse.com/1253393"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.0:kernel-devel-rt-6.4.0-39.1.noarch",
"SUSE Linux Micro 6.0:kernel-rt-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.0:kernel-rt-livepatch-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.0:kernel-source-rt-6.4.0-39.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.1,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.0:kernel-devel-rt-6.4.0-39.1.noarch",
"SUSE Linux Micro 6.0:kernel-rt-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.0:kernel-rt-livepatch-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.0:kernel-source-rt-6.4.0-39.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-07T12:33:45Z",
"details": "moderate"
}
],
"title": "CVE-2025-40206"
},
{
"cve": "CVE-2025-40207",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40207"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nmedia: v4l2-subdev: Fix alloc failure check in v4l2_subdev_call_state_try()\n\nv4l2_subdev_call_state_try() macro allocates a subdev state with\n__v4l2_subdev_state_alloc(), but does not check the returned value. If\n__v4l2_subdev_state_alloc fails, it returns an ERR_PTR, and that would\ncause v4l2_subdev_call_state_try() to crash.\n\nAdd proper error handling to v4l2_subdev_call_state_try().",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.0:kernel-devel-rt-6.4.0-39.1.noarch",
"SUSE Linux Micro 6.0:kernel-rt-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.0:kernel-rt-livepatch-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.0:kernel-source-rt-6.4.0-39.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40207",
"url": "https://www.suse.com/security/cve/CVE-2025-40207"
},
{
"category": "external",
"summary": "SUSE Bug 1253395 for CVE-2025-40207",
"url": "https://bugzilla.suse.com/1253395"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.0:kernel-devel-rt-6.4.0-39.1.noarch",
"SUSE Linux Micro 6.0:kernel-rt-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.0:kernel-rt-livepatch-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.0:kernel-source-rt-6.4.0-39.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.0:kernel-devel-rt-6.4.0-39.1.noarch",
"SUSE Linux Micro 6.0:kernel-rt-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.0:kernel-rt-livepatch-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.0:kernel-source-rt-6.4.0-39.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-07T12:33:45Z",
"details": "moderate"
}
],
"title": "CVE-2025-40207"
}
]
}
SUSE-SU-2025:4517-1
Vulnerability from csaf_suse - Published: 2025-12-23 16:28 - Updated: 2025-12-23 16:28Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Security update for the Linux Kernel",
"title": "Title of the patch"
},
{
"category": "description",
"text": "The SUSE Linux Enterprise 15 SP7 Azure kernel was updated to receive various security bugfixes.\n\n\nThe following security bugs were fixed:\n\n- CVE-2022-50253: bpf: make sure skb-\u003elen != 0 when redirecting to a tunneling device (bsc#1249912).\n- CVE-2023-53676: scsi: target: iscsi: Fix buffer overflow in lio_target_nacl_info_show() (bsc#1251786).\n- CVE-2025-21710: tcp: correct handling of extreme memory squeeze (bsc#1237888).\n- CVE-2025-37916: pds_core: remove write-after-free of client_id (bsc#1243474).\n- CVE-2025-38359: s390/mm: Fix in_atomic() handling in do_secure_storage_access() (bsc#1247076).\n- CVE-2025-38360: drm/amd/display: Add more checks for DSC / HUBP ONO guarantees (bsc#1247078).\n- CVE-2025-38361: drm/amd/display: Check dce_hwseq before dereferencing it (bsc#1247079).\n- CVE-2025-39788: scsi: ufs: exynos: Fix programming of HCI_UTRL_NEXUS_TYPE (bsc#1249547).\n- CVE-2025-39805: net: macb: fix unregister_netdev call order in macb_remove() (bsc#1249982).\n- CVE-2025-39819: fs/smb: Fix inconsistent refcnt update (bsc#1250176).\n- CVE-2025-39822: io_uring/kbuf: fix signedness in this_len calculation (bsc#1250034).\n- CVE-2025-39859: ptp: ocp: fix use-after-free bugs causing by ptp_ocp_watchdog (bsc#1250252).\n- CVE-2025-39944: octeontx2-pf: Fix use-after-free bugs in otx2_sync_tstamp() (bsc#1251120).\n- CVE-2025-39980: nexthop: Forbid FDB status change while nexthop is in a group (bsc#1252063).\n- CVE-2025-40001: scsi: mvsas: Fix use-after-free bugs in mvs_work_queue (bsc#1252303).\n- CVE-2025-40021: tracing: dynevent: Add a missing lockdown check on dynevent (bsc#1252681).\n- CVE-2025-40027: net/9p: fix double req put in p9_fd_cancelled (bsc#1252763).\n- CVE-2025-40030: pinctrl: check the return value of pinmux_ops::get_function_name() (bsc#1252773).\n- CVE-2025-40038: KVM: SVM: Skip fastpath emulation on VM-Exit if next RIP isn\u0027t valid (bsc#1252817).\n- CVE-2025-40040: mm/ksm: fix flag-dropping behavior in ksm_madvise (bsc#1252780).\n- CVE-2025-40047: io_uring/waitid: always prune wait queue entry in io_waitid_wait() (bsc#1252790).\n- CVE-2025-40048: uio_hv_generic: Let userspace take care of interrupt mask (bsc#1252862).\n- CVE-2025-40055: ocfs2: fix double free in user_cluster_connect() (bsc#1252821).\n- CVE-2025-40059: coresight: Fix incorrect handling for return value of devm_kzalloc (bsc#1252809).\n- CVE-2025-40064: smc: Fix use-after-free in __pnet_find_base_ndev() (bsc#1252845).\n- CVE-2025-40070: pps: fix warning in pps_register_cdev when register device fail (bsc#1252836).\n- CVE-2025-40074: ipv4: start using dst_dev_rcu() (bsc#1252794).\n- CVE-2025-40075: tcp_metrics: use dst_dev_net_rcu() (bsc#1252795).\n- CVE-2025-40083: net/sched: sch_qfq: Fix null-deref in agg_dequeue (bsc#1252912).\n- CVE-2025-40086: drm/xe: Don\u0027t allow evicting of BOs in same VM in array of VM binds (bsc#1252923).\n- CVE-2025-40098: ALSA: hda: cs35l41: Fix NULL pointer dereference in cs35l41_get_acpi_mute_state() (bsc#1252917).\n- CVE-2025-40105: vfs: Don\u0027t leak disconnected dentries on umount (bsc#1252928).\n- CVE-2025-40139: smc: Use __sk_dst_get() and dst_dev_rcu() in in smc_clc_prfx_set() (bsc#1253409).\n- CVE-2025-40149: tls: Use __sk_dst_get() and dst_dev_rcu() in get_netdev_for_sock() (bsc#1253355).\n- CVE-2025-40159: xsk: Harden userspace-supplied xdp_desc validation (bsc#1253403).\n- CVE-2025-40168: smc: Use __sk_dst_get() and dst_dev_rcu() in smc_clc_prfx_match() (bsc#1253427).\n- CVE-2025-40169: bpf: Reject negative offsets for ALU ops (bsc#1253416).\n- CVE-2025-40173: net/ip6_tunnel: Prevent perpetual tunnel growth (bsc#1253421).\n- CVE-2025-40176: tls: wait for pending async decryptions if tls_strp_msg_hold fails (bsc#1253425).\n- CVE-2025-40185: ice: ice_adapter: release xa entry on adapter allocation failure (bsc#1253394).\n- CVE-2025-40204: sctp: Fix MAC comparison to be constant-time (bsc#1253436).\n\n\nThe following non-security bugs were fixed:\n\n- ACPI: CPPC: Check _CPC validity for only the online CPUs (git-fixes).\n- ACPI: CPPC: Limit perf ctrs in PCC check only to online CPUs (git-fixes).\n- ACPI: CPPC: Perform fast check switch only for online CPUs (git-fixes).\n- ACPI: PRM: Skip handlers with NULL handler_address or NULL VA (stable-fixes).\n- ACPI: SBS: Fix present test in acpi_battery_read() (git-fixes).\n- ACPI: property: Return present device nodes only on fwnode interface (stable-fixes).\n- ACPI: scan: Add Intel CVS ACPI HIDs to acpi_ignore_dep_ids (stable-fixes).\n- ACPICA: Update dsmethod.c to get rid of unused variable warning (stable-fixes).\n- ACPICA: dispatcher: Use acpi_ds_clear_operands() in acpi_ds_call_control_method() (stable-fixes).\n- ALSA: hda: Fix missing pointer check in hda_component_manager_init function (git-fixes).\n- ALSA: serial-generic: remove shared static buffer (stable-fixes).\n- ALSA: usb-audio: Add validation of UAC2/UAC3 effect units (stable-fixes).\n- ALSA: usb-audio: Fix NULL pointer dereference in snd_usb_mixer_controls_badd (git-fixes).\n- ALSA: usb-audio: Fix potential overflow of PCM transfer buffer (stable-fixes).\n- ALSA: usb-audio: add mono main switch to Presonus S1824c (stable-fixes).\n- ALSA: usb-audio: apply quirk for MOONDROP Quark2 (stable-fixes).\n- ALSA: usb-audio: do not log messages meant for 1810c when initializing 1824c (git-fixes).\n- ALSA: usb-audio: fix uac2 clock source at terminal parser (git-fixes).\n- ASoC: codecs: va-macro: fix resource leak in probe error path (git-fixes).\n- ASoC: cs4271: Fix regulator leak on probe failure (git-fixes).\n- ASoC: max98090/91: fixed max98091 ALSA widget powering up/down (stable-fixes).\n- ASoC: meson: aiu-encoder-i2s: fix bit clock polarity (stable-fixes).\n- ASoC: qcom: sc8280xp: explicitly set S16LE format in sc8280xp_be_hw_params_fixup() (stable-fixes).\n- ASoC: stm32: sai: manage context in set_sysclk callback (stable-fixes).\n- ASoC: tas2781: fix getting the wrong device number (git-fixes).\n- ASoC: tlv320aic3x: Fix class-D initialization for tlv320aic3007 (stable-fixes).\n- Bluetooth: 6lowpan: Do not hold spin lock over sleeping functions (git-fixes).\n- Bluetooth: 6lowpan: add missing l2cap_chan_lock() (git-fixes).\n- Bluetooth: 6lowpan: fix BDADDR_LE vs ADDR_LE_DEV address type confusion (git-fixes).\n- Bluetooth: 6lowpan: reset link-local header on ipv6 recv path (git-fixes).\n- Bluetooth: L2CAP: export l2cap_chan_hold for modules (stable-fixes).\n- Bluetooth: MGMT: Fix OOB access in parse_adv_monitor_pattern() (git-fixes).\n- Bluetooth: MGMT: cancel mesh send timer when hdev removed (git-fixes).\n- Bluetooth: SCO: Fix UAF on sco_conn_free (stable-fixes).\n- Bluetooth: bcsp: receive data only if registered (stable-fixes).\n- Bluetooth: btrtl: Fix memory leak in rtlbt_parse_firmware_v2() (git-fixes).\n- Bluetooth: btusb: Check for unexpected bytes when defragmenting HCI frames (stable-fixes).\n- Bluetooth: btusb: reorder cleanup in btusb_disconnect to avoid UAF (git-fixes).\n- Bluetooth: hci_event: validate skb length for unknown CC opcode (git-fixes).\n- Documentation: ACPI: i2c-muxes: fix I2C device references (git-fixes).\n- Drivers: hv: vmbus: Add utility function for querying ring size (git-fixes).\n- HID: amd_sfh: Stop sensor before starting (git-fixes).\n- HID: hid-ntrig: Prevent memory leak in ntrig_report_version() (git-fixes).\n- HID: quirks: avoid Cooler Master MM712 dongle wakeup bug (stable-fixes).\n- HID: quirks: work around VID/PID conflict for 0x4c4a/0x4155 (git-fixes).\n- HID: uclogic: Fix potential memory leak in error path (git-fixes).\n- Input: atmel_mxt_ts - allow reset GPIO to sleep (stable-fixes).\n- Input: imx_sc_key - fix memory corruption on unload (git-fixes).\n- Input: pegasus-notetaker - fix potential out-of-bounds access (git-fixes).\n- KVM: Pass new routing entries and irqfd when updating IRTEs (git-fixes).\n- KVM: SEV: Enforce minimum GHCB version requirement for SEV-SNP guests (git-fixes).\n- KVM: SVM: Delete IRTE link from previous vCPU before setting new IRTE (git-fixes).\n- KVM: SVM: Delete IRTE link from previous vCPU irrespective of new routing (git-fixes).\n- KVM: SVM: Emulate PERF_CNTR_GLOBAL_STATUS_SET for PerfMonV2 (git-fixes).\n- KVM: SVM: Mark VMCB_LBR dirty when MSR_IA32_DEBUGCTLMSR is updated (git-fixes).\n- KVM: SVM: Re-load current, not host, TSC_AUX on #VMEXIT from SEV-ES guest (git-fixes).\n- KVM: SVM: Track per-vCPU IRTEs using kvm_kernel_irqfd structure (git-fixes).\n- KVM: SVM: WARN if an invalid posted interrupt IRTE entry is added (git-fixes).\n- KVM: VMX: Allow guest to set DEBUGCTL.RTM_DEBUG if RTM is supported (git-fixes).\n- KVM: VMX: Apply MMIO Stale Data mitigation if KVM maps MMIO into the guest (git-fixes).\n- KVM: VMX: Fix check for valid GVA on an EPT violation (git-fixes).\n- KVM: VMX: Preserve host\u0027s DEBUGCTLMSR_FREEZE_IN_SMM while running the guest (git-fixes).\n- KVM: VMX: Wrap all accesses to IA32_DEBUGCTL with getter/setter APIs (git-fixes).\n- KVM: nVMX: Check vmcs12-\u003eguest_ia32_debugctl on nested VM-Enter (git-fixes).\n- KVM: s390: improve interrupt cpu for wakeup (bsc#1235463).\n- KVM: s390: kABI backport for \u0027last_sleep_cpu\u0027 (bsc#1252352).\n- KVM: x86/mmu: Locally cache whether a PFN is host MMIO when making a SPTE (git-fixes).\n- KVM: x86: Add helper to retrieve current value of user return MSR (git-fixes).\n- KVM: x86: Convert vcpu_run()\u0027s immediate exit param into a generic bitmap (git-fixes).\n- KVM: x86: Do not treat ENTER and LEAVE as branches, because they are not (git-fixes).\n- KVM: x86: Drop kvm_x86_ops.set_dr6() in favor of a new KVM_RUN flag (git-fixes).\n- KVM: x86: Have all vendor neutral sub-configs depend on KVM_X86, not just KVM (git-fixes).\n- NFS4: Fix state renewals missing after boot (git-fixes).\n- NFS: check if suid/sgid was cleared after a write as needed (git-fixes).\n- NFSD: Never cache a COMPOUND when the SEQUENCE operation fails (git-fixes).\n- NFSD: Skip close replay processing if XDR encoding fails (git-fixes).\n- NFSD: free copynotify stateid in nfs4_free_ol_stateid() (git-fixes).\n- NFSv4.1: fix mount hang after CREATE_SESSION failure (git-fixes).\n- NFSv4: handle ERR_GRACE on delegation recalls (git-fixes).\n- PCI/P2PDMA: Fix incorrect pointer usage in devm_kfree() call (stable-fixes).\n- PCI/PM: Skip resuming to D0 if device is disconnected (stable-fixes).\n- PCI: Disable MSI on RDC PCI to PCIe bridges (stable-fixes).\n- PCI: cadence: Check for the existence of cdns_pcie::ops before using it (stable-fixes).\n- PCI: dwc: Verify the single eDMA IRQ in dw_pcie_edma_irq_verify() (stable-fixes).\n- PCI: j721e: Fix incorrect error message in probe() (git-fixes).\n- PCI: rcar-host: Convert struct rcar_msi mask_lock into raw spinlock (git-fixes).\n- PCI: tegra194: Reset BARs when running in PCIe endpoint mode (git-fixes).\n- RDMA/bnxt_re: Do not fail destroy QP and cleanup debugfs earlier (git-fixes).\n- RDMA/bnxt_re: Fix a potential memory leak in destroy_gsi_sqp (git-fixes).\n- RDMA/hns: Fix recv CQ and QP cache affinity (git-fixes).\n- RDMA/hns: Fix the modification of max_send_sge (git-fixes).\n- RDMA/hns: Fix wrong WQE data when QP wraps around (git-fixes).\n- RDMA/irdma: Fix SD index calculation (git-fixes).\n- RDMA/irdma: Set irdma_cq cq_num field during CQ create (git-fixes).\n- Revert \u0027drm/tegra: dsi: Clear enable register if powered by bootloader\u0027 (git-fixes).\n- Revert \u0027wifi: ath10k: avoid unnecessary wait for service ready message\u0027 (git-fixes).\n- accel/habanalabs/gaudi2: fix BMON disable configuration (stable-fixes).\n- accel/habanalabs/gaudi2: read preboot status after recovering from dirty state (stable-fixes).\n- accel/habanalabs: return ENOMEM if less than requested pages were pinned (stable-fixes).\n- accel/habanalabs: support mapping cb with vmalloc-backed coherent memory (stable-fixes).\n- acpi,srat: Fix incorrect device handle check for Generic Initiator (git-fixes).\n- acpi/hmat: Fix lockdep warning for hmem_register_resource() (git-fixes).\n- amd/amdkfd: resolve a race in amdgpu_amdkfd_device_fini_sw (stable-fixes).\n- ata: libata-scsi: Add missing scsi_device_put() in ata_scsi_dev_rescan() (git-fixes).\n- block: avoid possible overflow for chunk_sectors check in blk_stack_limits() (git-fixes).\n- block: fix kobject double initialization in add_disk (git-fixes).\n- bpf: Fix test verif_scale_strobemeta_subprogs failure due to llvm19 (bsc#1252368).\n- bpf: improve error message for unsupported helper (bsc#1252370).\n- btrfs: abort transaction on failure to add link to inode (git-fixes).\n- btrfs: avoid page_lockend underflow in btrfs_punch_hole_lock_range() (git-fix).\n- btrfs: avoid using fixed char array size for tree names (git-fix).\n- btrfs: do not update last_log_commit when logging inode due to a new name (git-fixes).\n- btrfs: fix COW handling in run_delalloc_nocow() (git-fix).\n- btrfs: fix inode leak on failure to add link to inode (git-fixes).\n- btrfs: make btrfs_clear_delalloc_extent() free delalloc reserve (git-fix).\n- btrfs: mark dirty extent range for out of bound prealloc extents (git-fixes).\n- btrfs: qgroup: correctly model root qgroup rsv in convert (git-fix).\n- btrfs: rename err to ret in btrfs_link() (git-fixes).\n- btrfs: run btrfs_error_commit_super() early (git-fix).\n- btrfs: scrub: put bio after errors in scrub_raid56_parity_stripe() (git-fixes).\n- btrfs: send: fix duplicated rmdir operations when using extrefs (git-fixes).\n- btrfs: set inode flag BTRFS_INODE_COPY_EVERYTHING when logging new name (git-fixes).\n- btrfs: simplify error handling logic for btrfs_link() (git-fixes).\n- btrfs: tree-checker: add dev extent item checks (git-fix).\n- btrfs: tree-checker: add type and sequence check for inline backrefs (git-fix).\n- btrfs: tree-checker: fix the wrong output of data backref objectid (git-fix).\n- btrfs: tree-checker: reject BTRFS_FT_UNKNOWN dir type (git-fix).\n- btrfs: tree-checker: validate dref root and objectid (git-fix).\n- btrfs: use smp_mb__after_atomic() when forcing COW in create_pending_snapshot() (git-fixes).\n- cgroup/cpuset: Remove remote_partition_check() \u0026 make update_cpumasks_hier() handle remote partition (bsc#1241166).\n- char: misc: Does not request module for miscdevice with dynamic minor (stable-fixes).\n- char: misc: Make misc_register() reentry for miscdevice who wants dynamic minor (stable-fixes).\n- char: misc: restrict the dynamic range to exclude reserved minors (stable-fixes).\n- cpuset: Use new excpus for nocpu error check when enabling root partition (bsc#1241166).\n- cpuset: fix failure to enable isolated partition when containing isolcpus (bsc#1241166).\n- cramfs: Verify inode mode when loading from disk (git-fixes).\n- crypto: aspeed - fix double free caused by devm (git-fixes).\n- crypto: aspeed-acry - Convert to platform remove callback returning void (stable-fixes).\n- crypto: hisilicon/qm - Fix device reference leak in qm_get_qos_value (git-fixes).\n- crypto: iaa - Do not clobber req-\u003ebase.data (git-fixes).\n- crypto: qat - use kcalloc() in qat_uclo_map_objs_from_mof() (stable-fixes).\n- dmaengine: dw-edma: Set status for callback_result (stable-fixes).\n- dmaengine: mv_xor: match alloc_wc and free_wc (stable-fixes).\n- drm/amd/amdgpu: Release xcp drm memory after unplug (stable-fixes).\n- drm/amd/display/dml2: Guard dml21_map_dc_state_into_dml_display_cfg with DC_FP_START (stable-fixes).\n- drm/amd/display: Add AVI infoframe copy in copy_stream_update_to_stream (stable-fixes).\n- drm/amd/display: Add fallback path for YCBCR422 (stable-fixes).\n- drm/amd/display: Allow VRR params change if unsynced with the stream (git-fixes).\n- drm/amd/display: Disable VRR on DCE 6 (stable-fixes).\n- drm/amd/display: Enable mst when it\u0027s detected but yet to be initialized (git-fixes).\n- drm/amd/display: Fix DVI-D/HDMI adapters (stable-fixes).\n- drm/amd/display: Fix NULL deref in debugfs odm_combine_segments (git-fixes).\n- drm/amd/display: Fix black screen with HDMI outputs (git-fixes).\n- drm/amd/display: Fix for test crash due to power gating (stable-fixes).\n- drm/amd/display: Fix incorrect return of vblank enable on unconfigured crtc (stable-fixes).\n- drm/amd/display: Fix pbn_div Calculation Error (stable-fixes).\n- drm/amd/display: Increase AUX Intra-Hop Done Max Wait Duration (stable-fixes).\n- drm/amd/display: Increase minimum clock for TMDS 420 with pipe splitting (stable-fixes).\n- drm/amd/display: Init dispclk from bootup clock for DCN314 (stable-fixes).\n- drm/amd/display: Move setup_stream_attribute (stable-fixes).\n- drm/amd/display: Reject modes with too high pixel clock on DCE6-10 (git-fixes).\n- drm/amd/display: Reset apply_eamless_boot_optimization when dpms_off (stable-fixes).\n- drm/amd/display: Set up pixel encoding for YCBCR422 (stable-fixes).\n- drm/amd/display: Support HW cursor 180 rot for any number of pipe splits (stable-fixes).\n- drm/amd/display: Wait until OTG enable state is cleared (stable-fixes).\n- drm/amd/display: add more cyan skillfish devices (stable-fixes).\n- drm/amd/display: change dc stream color settings only in atomic commit (stable-fixes).\n- drm/amd/display: ensure committing streams is seamless (stable-fixes).\n- drm/amd/display: fix condition for setting timing_adjust_pending (stable-fixes).\n- drm/amd/display: fix dml ms order of operations (stable-fixes).\n- drm/amd/display: incorrect conditions for failing dto calculations (stable-fixes).\n- drm/amd/display: update color on atomic commit time (stable-fixes).\n- drm/amd/display: update dpp/disp clock from smu clock table (stable-fixes).\n- drm/amd/pm: Disable MCLK switching on SI at high pixel clocks (stable-fixes).\n- drm/amd/pm: Use cached metrics data on aldebaran (stable-fixes).\n- drm/amd/pm: Use cached metrics data on arcturus (stable-fixes).\n- drm/amd: Avoid evicting resources at S5 (stable-fixes).\n- drm/amd: Check that VPE has reached DPM0 in idle handler (stable-fixes).\n- drm/amd: Fix suspend failure with secure display TA (git-fixes).\n- drm/amd: add more cyan skillfish PCI ids (stable-fixes).\n- drm/amdgpu/atom: Check kcalloc() for WS buffer in amdgpu_atom_execute_table_locked() (stable-fixes).\n- drm/amdgpu/jpeg: Hold pg_lock before jpeg poweroff (stable-fixes).\n- drm/amdgpu/smu: Handle S0ix for vangogh (stable-fixes).\n- drm/amdgpu: Allow kfd CRIU with no buffer objects (stable-fixes).\n- drm/amdgpu: Check vcn sram load return value (stable-fixes).\n- drm/amdgpu: Correct the counts of nr_banks and nr_errors (stable-fixes).\n- drm/amdgpu: Fix NULL pointer dereference in VRAM logic for APU devices (stable-fixes).\n- drm/amdgpu: Fix function header names in amdgpu_connectors.c (git-fixes).\n- drm/amdgpu: Fix unintended error log in VCN5_0_0 (git-fixes).\n- drm/amdgpu: Respect max pixel clock for HDMI and DVI-D (v2) (stable-fixes).\n- drm/amdgpu: Skip poison aca bank from UE channel (stable-fixes).\n- drm/amdgpu: Use memdup_array_user in amdgpu_cs_wait_fences_ioctl (stable-fixes).\n- drm/amdgpu: add range check for RAS bad page address (stable-fixes).\n- drm/amdgpu: add support for cyan skillfish gpu_info (stable-fixes).\n- drm/amdgpu: disable peer-to-peer access for DCC-enabled GC12 VRAM surfaces (stable-fixes).\n- drm/amdgpu: do not enable SMU on cyan skillfish (stable-fixes).\n- drm/amdgpu: fix nullptr err of vm_handle_moved (stable-fixes).\n- drm/amdgpu: hide VRAM sysfs attributes on GPUs without VRAM (stable-fixes).\n- drm/amdgpu: reject gang submissions under SRIOV (stable-fixes).\n- drm/amdgpu: remove two invalid BUG_ON()s (stable-fixes).\n- drm/amdkfd: Handle lack of READ permissions in SVM mapping (stable-fixes).\n- drm/amdkfd: Tie UNMAP_LATENCY to queue_preemption (stable-fixes).\n- drm/amdkfd: fix vram allocation failure for a special case (stable-fixes).\n- drm/amdkfd: relax checks for over allocation of save area (stable-fixes).\n- drm/amdkfd: return -ENOTTY for unsupported IOCTLs (stable-fixes).\n- drm/ast: Blank with VGACR17 sync enable, always clear VGACRB6 sync off (git-fixes).\n- drm/bridge: cdns-dsi: Do not fail on MIPI_DSI_MODE_VIDEO_BURST (stable-fixes).\n- drm/bridge: cdns-dsi: Fix REG_WAKEUP_TIME value (stable-fixes).\n- drm/bridge: display-connector: do not set OP_DETECT for DisplayPorts (stable-fixes).\n- drm/exynos: exynos7_drm_decon: remove ctx-\u003esuspended (git-fixes).\n- drm/i915/dp_mst: Work around Thunderbolt sink disconnect after SINK_COUNT_ESI read (stable-fixes).\n- drm/i915: Avoid lock inversion when pinning to GGTT on CHV/BXT+VTD (git-fixes).\n- drm/i915: Fix conversion between clock ticks and nanoseconds (git-fixes).\n- drm/mediatek: Add pm_runtime support for GCE power control (git-fixes).\n- drm/mediatek: Disable AFBC support on Mediatek DRM driver (git-fixes).\n- drm/msm/a6xx: Fix PDC sleep sequence (git-fixes).\n- drm/msm/dsi/phy: Toggle back buffer resync after preparing PLL (stable-fixes).\n- drm/msm/dsi/phy_7nm: Fix missing initial VCO rate (stable-fixes).\n- drm/msm/registers: Generate _HI/LO builders for reg64 (stable-fixes).\n- drm/msm: make sure to not queue up recovery more than once (stable-fixes).\n- drm/nouveau: replace snprintf() with scnprintf() in nvkm_snprintbf() (stable-fixes).\n- drm/panthor: Serialize GPU cache flush operations (stable-fixes).\n- drm/panthor: check bo offset alignment in vm bind (stable-fixes).\n- drm/sched: Fix deadlock in drm_sched_entity_kill_jobs_cb (git-fixes).\n- drm/sched: Optimise drm_sched_entity_push_job (stable-fixes).\n- drm/sched: avoid killing parent entity on child SIGKILL (stable-fixes).\n- drm/tegra: Add call to put_pid() (git-fixes).\n- drm/tegra: dc: Fix reference leak in tegra_dc_couple() (git-fixes).\n- drm/tidss: Set crtc modesetting parameters with adjusted mode (stable-fixes).\n- drm/tidss: Use the crtc_* timings when programming the HW (stable-fixes).\n- drm/vmwgfx: Validate command header size against SVGA_CMD_MAX_DATASIZE (git-fixes).\n- drm/xe/guc: Add more GuC load error status codes (stable-fixes).\n- drm/xe/guc: Increase GuC crash dump buffer size (stable-fixes).\n- drm/xe/guc: Return an error code if the GuC load fails (stable-fixes).\n- drm/xe/guc: Set upper limit of H2G retries over CTB (stable-fixes).\n- drm/xe/guc: Synchronize Dead CT worker with unbind (git-fixes).\n- drm/xe: Do clean shutdown also when using flr (git-fixes).\n- drm/xe: Do not wake device during a GT reset (git-fixes).\n- drm/xe: Fix oops in xe_gem_fault when running core_hotunplug test (stable-fixes).\n- drm/xe: Move declarations under conditional branch (stable-fixes).\n- drm/xe: Remove duplicate DRM_EXEC selection from Kconfig (git-fixes).\n- drm: panel-backlight-quirks: Make EDID match optional (stable-fixes).\n- exfat: limit log print for IO error (git-fixes).\n- extcon: adc-jack: Cleanup wakeup source only if it was enabled (git-fixes).\n- extcon: adc-jack: Fix wakeup source leaks on device unbind (stable-fixes).\n- fbcon: Set fb_display[i]-\u003emode to NULL when the mode is released (stable-fixes).\n- fbdev: Add bounds checking in bit_putcs to fix vmalloc-out-of-bounds (stable-fixes).\n- fbdev: bitblit: bound-check glyph index in bit_putcs* (stable-fixes).\n- fbdev: pvr2fb: Fix leftover reference to ONCHIP_NR_DMA_CHANNELS (stable-fixes).\n- hwmon: (asus-ec-sensors) increase timeout for locking ACPI mutex (stable-fixes).\n- hwmon: (dell-smm) Add support for Dell OptiPlex 7040 (stable-fixes).\n- hwmon: (k10temp) Add device ID for Strix Halo (stable-fixes).\n- hwmon: (k10temp) Add thermal support for AMD Family 1Ah-based models (stable-fixes).\n- hwmon: (sbtsi_temp) AMD CPU extended temperature range support (stable-fixes).\n- hwmon: sy7636a: add alias (stable-fixes).\n- hyperv: Remove the spurious null directive line (git-fixes).\n- iio: adc: imx93_adc: load calibrated values even calibration failed (stable-fixes).\n- iio: adc: spear_adc: mask SPEAR_ADC_STATUS channel and avg sample before setting register (stable-fixes).\n- ima: do not clear IMA_DIGSIG flag when setting or removing non-IMA xattr (stable-fixes).\n- iommu/amd: Return an error if vCPU affinity is set for non-vCPU IRTE (git-fixes).\n- isdn: mISDN: hfcsusb: fix memory leak in hfcsusb_probe() (git-fixes).\n- ixgbe: fix memory leak and use-after-free in ixgbe_recovery_probe() (git-fixes).\n- jfs: Verify inode mode when loading from disk (git-fixes).\n- jfs: fix uninitialized waitqueue in transaction manager (git-fixes).\n- kABI fix for KVM: VMX: Apply MMIO Stale Data mitigation if KVM maps MMIO into the guest (git-fixes).\n- kabi/severities: drop xfer_to_guest_mode_handle_work.\n- lib/crypto: curve25519-hacl64: Fix older clang KASAN workaround for GCC (git-fixes).\n- md/raid1: fix data lost for writemostly rdev (git-fixes).\n- md: fix mssing blktrace bio split events (git-fixes).\n- media: adv7180: Add missing lock in suspend callback (stable-fixes).\n- media: adv7180: Do not write format to device in set_fmt (stable-fixes).\n- media: adv7180: Only validate format in querystd (stable-fixes).\n- media: amphion: Delete v4l2_fh synchronously in .release() (stable-fixes).\n- media: fix uninitialized symbol warnings (stable-fixes).\n- media: i2c: Kconfig: Ensure a dependency on HAVE_CLK for VIDEO_CAMERA_SENSOR (stable-fixes).\n- media: i2c: og01a1b: Specify monochrome media bus format instead of Bayer (stable-fixes).\n- media: imon: make send_packet() more robust (stable-fixes).\n- media: ov08x40: Fix the horizontal flip control (stable-fixes).\n- media: redrat3: use int type to store negative error codes (stable-fixes).\n- media: uvcvideo: Use heuristic to find stream entity (git-fixes).\n- media: videobuf2: forbid remove_bufs when legacy fileio is active (git-fixes).\n- memstick: Add timeout to prevent indefinite waiting (stable-fixes).\n- mfd: da9063: Split chip variant reading in two bus transactions (stable-fixes).\n- mfd: madera: Work around false-positive -Wininitialized warning (stable-fixes).\n- mfd: stmpe-i2c: Add missing MODULE_LICENSE (stable-fixes).\n- mfd: stmpe: Remove IRQ domain upon removal (stable-fixes).\n- minixfs: Verify inode mode when loading from disk (git-fixes).\n- mm/mm_init: fix hash table order logging in alloc_large_system_hash() (git-fixes).\n- mm/secretmem: fix use-after-free race in fault handler (git-fixes).\n- mmc: host: renesas_sdhi: Fix the actual clock (stable-fixes).\n- mmc: sdhci-msm: Enable tuning for SDR50 mode for SD card (stable-fixes).\n- mmc: sdhci-of-dwcmshc: Change DLL_STRBIN_TAPNUM_DEFAULT to 0x4 (git-fixes).\n- mtd: onenand: Pass correct pointer to IRQ handler (git-fixes).\n- mtd: rawnand: cadence: fix DMA device NULL pointer dereference (git-fixes).\n- mtdchar: fix integer overflow in read/write ioctls (git-fixes).\n- net/mana: fix warning in the writer of client oob (git-fixes).\n- net/smc: Remove validation of reserved bits in CLC Decline message (bsc#1253779).\n- net: nfc: nci: Increase NCI_DATA_TIMEOUT to 3000 ms (stable-fixes).\n- net: phy: clear link parameters on admin link down (stable-fixes).\n- net: phy: fixed_phy: let fixed_phy_unregister free the phy_device (stable-fixes).\n- net: phy: marvell: Fix 88e1510 downshift counter errata (stable-fixes).\n- net: tcp: send zero-window ACK when no memory (bsc#1253779).\n- net: usb: qmi_wwan: initialize MAC header offset in qmimux_rx_fixup (git-fixes).\n- nfs4_setup_readdir(): insufficient locking for -\u003ed_parent-\u003ed_inode dereferencing (git-fixes).\n- nfsd: do not defer requests during idmap lookup in v4 compound decode (bsc#1232223).\n- nfsd: fix return error codes for nfsd_map_name_to_id (bsc#1232223).\n- nouveau/firmware: Add missing kfree() of nvkm_falcon_fw::boot (git-fixes).\n- nvme-auth: add hkdf_expand_label() (bsc#1247683).\n- nvme-auth: use hkdf_expand_label() (bsc#1247683).\n- perf script: add --addr2line option (bsc#1247509).\n- phy: cadence: cdns-dphy: Enable lower resolutions in dphy (stable-fixes).\n- phy: renesas: r8a779f0-ether-serdes: add new step added to latest datasheet (stable-fixes).\n- phy: rockchip: phy-rockchip-inno-csidphy: allow writes to grf register 0 (stable-fixes).\n- pinctrl: s32cc: fix uninitialized memory in s32_pinctrl_desc (git-fixes).\n- pinctrl: s32cc: initialize gpio_pin_config::list after kmalloc() (git-fixes).\n- pinctrl: single: fix bias pull up/down handling in pin_config_set (stable-fixes).\n- platform/x86/intel/speed_select_if: Convert PCIBIOS_* return codes to errnos (git-fixes).\n- power: supply: qcom_battmgr: add OOI chemistry (stable-fixes).\n- power: supply: qcom_battmgr: handle charging state change notifications (stable-fixes).\n- power: supply: sbs-charger: Support multiple devices (stable-fixes).\n- powerpc: export MIN RMA size (bsc#1236743).\n- powerpc: increase MIN RMA size for CAS negotiation (bsc#1236743, bsc#1252269).\n- regulator: fixed: fix GPIO descriptor leak on register failure (git-fixes).\n- rtc: rx8025: fix incorrect register reference (git-fixes).\n- s390/mm,fault: simplify kfence fault handling (bsc#1247076).\n- scsi: Fix sas_user_scan() to handle wildcard and multi-channel scans (git-fixes).\n- scsi: aacraid: Stop using PCI_IRQ_AFFINITY (git-fixes).\n- scsi: core: sysfs: Correct sysfs attributes access rights (git-fixes).\n- scsi: hpsa: Fix potential memory leak in hpsa_big_passthru_ioctl() (git-fixes).\n- scsi: libfc: Prevent integer overflow in fc_fcp_recv_data() (git-fixes).\n- scsi: mpi3mr: Correctly handle ATA device errors (git-fixes).\n- scsi: mpi3mr: Drop unnecessary volatile from __iomem pointers (git-fixes).\n- scsi: mpt3sas: Correctly handle ATA device errors (git-fixes).\n- scsi: mpt3sas: Fix crash in transport port remove by using ioc_info() (git-fixes).\n- scsi: pm80xx: Fix array-index-out-of-of-bounds on rmmod (git-fixes).\n- scsi: storvsc: Prefer returning channel with the same CPU as on the I/O issuing CPU (bsc#1252267).\n- selftests/bpf: Check for timeout in perf_link test (bsc#1253648).\n- selftests/bpf: Close fd in error path in drop_on_reuseport (git-fixes).\n- selftests/bpf: Close obj in error path in xdp_adjust_tail (git-fixes).\n- selftests/bpf: Fix missing ARRAY_SIZE() definition in bench.c (git-fixes).\n- selftests/bpf: Fix missing BUILD_BUG_ON() declaration (git-fixes).\n- selftests/bpf: Fix missing UINT_MAX definitions in benchmarks (git-fixes).\n- selftests/bpf: Fix string read in strncmp benchmark (git-fixes).\n- selftests/bpf: Mitigate sockmap_ktls disconnect_after_delete failure (git-fixes).\n- selftests/bpf: Remove sockmap_ktls disconnect_after_delete test (bsc#1252365).\n- selftests/bpf: Remove tests for zeroed-array kptr (bsc#1252366).\n- selftests/bpf: Use pid_t consistently in test_progs.c (git-fixes).\n- selftests/bpf: fix signedness bug in redir_partial() (git-fixes).\n- selftests/net/forwarding: add slowwait functions (bsc#1254235).\n- selftests/net/lib: no need to record ns name if it already exist (bsc#1254235).\n- selftests/net/lib: update busywait timeout value (bsc#1254235).\n- selftests/net: add lib.sh (bsc#1254235).\n- selftests/net: add variable NS_LIST for lib.sh (bsc#1254235).\n- selftests/net: use tc rule to filter the na packet (bsc#1254235).\n- selftests/run_kselftest.sh: Add `--skip` argument option (bsc#1254221).\n- selftests: forwarding.config.sample: Move overrides to lib.sh (bsc#1254235).\n- selftests: forwarding: Add a test for testing lib.sh functionality (bsc#1254235).\n- selftests: forwarding: Avoid failures to source net/lib.sh (bsc#1254235).\n- selftests: forwarding: Change inappropriate log_test_skip() calls (bsc#1254235).\n- selftests: forwarding: Convert log_test() to recognize RET values (bsc#1254235).\n- selftests: forwarding: Have RET track kselftest framework constants (bsc#1254235).\n- selftests: forwarding: Parametrize mausezahn delay (bsc#1254235).\n- selftests: forwarding: Redefine relative_path variable (bsc#1254235).\n- selftests: forwarding: Remove duplicated lib.sh content (bsc#1254235).\n- selftests: forwarding: Support for performance sensitive tests (bsc#1254235).\n- selftests: lib: Define more kselftest exit codes (bsc#1254235).\n- selftests: lib: tc_rule_stats_get(): Move default to argument definition (bsc#1254235).\n- selftests: net: List helper scripts in TEST_FILES Makefile variable (bsc#1254235).\n- selftests: net: Unify code of busywait() and slowwait() (bsc#1254235).\n- selftests: net: add helper for checking if nettest is available (bsc#1254235).\n- selftests: net: lib: Do not overwrite error messages (bsc#1254235).\n- selftests: net: lib: Move logging from forwarding/lib.sh here (bsc#1254235).\n- selftests: net: lib: avoid error removing empty netns name (bsc#1254235).\n- selftests: net: lib: do not set ns var as readonly (bsc#1254235).\n- selftests: net: lib: fix shift count out of range (bsc#1254235).\n- selftests: net: lib: ignore possible errors (bsc#1254235).\n- selftests: net: lib: kill PIDs before del netns (bsc#1254235).\n- selftests: net: lib: remove \u0027ns\u0027 var in setup_ns (bsc#1254235).\n- selftests: net: lib: remove ns from list after clean-up (bsc#1254235).\n- selftests: net: lib: set \u0027i\u0027 as local (bsc#1254235).\n- selftests: net: lib: support errexit with busywait (bsc#1254235).\n- selftests: net: libs: Change variable fallback syntax (bsc#1254235).\n- serial: 8250_exar: add support for Advantech 2 port card with Device ID 0x0018 (git-fixes).\n- serial: 8250_mtk: Enable baud clock and manage in runtime PM (git-fixes).\n- soc/tegra: fuse: Add Tegra114 nvmem cells and fuse lookups (stable-fixes).\n- soc: aspeed: socinfo: Add AST27xx silicon IDs (stable-fixes).\n- soc: qcom: smem: Fix endian-unaware access of num_entries (stable-fixes).\n- spi: Try to get ACPI GPIO IRQ earlier (git-fixes).\n- spi: loopback-test: Do not use %pK through printk (stable-fixes).\n- spi: rpc-if: Add resume support for RZ/G3E (stable-fixes).\n- strparser: Fix signed/unsigned mismatch bug (git-fixes).\n- tcp_bpf: Call sk_msg_free() when tcp_bpf_send_verdict() fails to allocate psock-\u003ecork (bsc#1250705).\n- thunderbolt: Use is_pciehp instead of is_hotplug_bridge (stable-fixes).\n- tools/cpupower: Fix incorrect size in cpuidle_state_disable() (stable-fixes).\n- tools/cpupower: fix error return value in cpupower_write_sysfs() (stable-fixes).\n- tools/hv: fcopy: Fix incorrect file path conversion (git-fixes).\n- tools/power x86_energy_perf_policy: Enhance HWP enable (stable-fixes).\n- tools/power x86_energy_perf_policy: Fix incorrect fopen mode usage (stable-fixes).\n- tools/power x86_energy_perf_policy: Prefer driver HWP limits (stable-fixes).\n- tools: lib: thermal: do not preserve owner in install (stable-fixes).\n- tools: lib: thermal: use pkg-config to locate libnl3 (stable-fixes).\n- uio_hv_generic: Query the ringbuffer size for device (git-fixes).\n- usb/core/quirks: Add Huawei ME906S to wakeup quirk (git-fixes).\n- usb: cdns3: gadget: Use-after-free during failed initialization and exit of cdnsp gadget (stable-fixes).\n- usb: gadget: f_fs: Fix epfile null pointer access after ep enable (stable-fixes).\n- usb: gadget: f_hid: Fix zero length packet transfer (stable-fixes).\n- usb: gadget: f_ncm: Fix MAC assignment NCM ethernet (stable-fixes).\n- usb: mon: Increase BUFF_MAX to 64 MiB to support multi-MB URBs (stable-fixes).\n- usb: xhci: plat: Facilitate using autosuspend for xhci plat devices (stable-fixes).\n- video: backlight: lp855x_bl: Set correct EPROM start for LP8556 (stable-fixes).\n- watchdog: s3c2410_wdt: Fix max_timeout being calculated larger (stable-fixes).\n- wifi: ath10k: Fix connection after GTK rekeying (stable-fixes).\n- wifi: ath11k: Add quirk entries for Thinkpad T14s Gen3 AMD (bsc#1254181).\n- wifi: ath11k: zero init info-\u003estatus in wmi_process_mgmt_tx_comp() (git-fixes).\n- wifi: ath12k: Increase DP_REO_CMD_RING_SIZE to 256 (stable-fixes).\n- wifi: iwlwifi: fw: Add ASUS to PPAG and TAS list (stable-fixes).\n- wifi: mac80211: Fix 6 GHz Band capabilities element advertisement in lower bands (stable-fixes).\n- wifi: mac80211: Fix HE capabilities element check (stable-fixes).\n- wifi: mac80211: Track NAN interface start/stop (stable-fixes).\n- wifi: mac80211: do not mark keys for inactive links as uploaded (stable-fixes).\n- wifi: mac80211: fix key tailroom accounting leak (git-fixes).\n- wifi: mac80211: reject address change while connecting (git-fixes).\n- wifi: mac80211: skip rate verification for not captured PSDUs (git-fixes).\n- wifi: mac80211_hwsim: Limit destroy_on_close radio removal to netgroup (git-fixes).\n- wifi: mt76: mt7921: Add 160MHz beamformee capability for mt7922 device (stable-fixes).\n- wifi: mt76: mt7996: Temporarily disable EPCS (stable-fixes).\n- wifi: mt76: mt7996: fix memory leak on mt7996_mcu_sta_key_tlv error (stable-fixes).\n- wifi: mwl8k: inject DSSS Parameter Set element into beacons if missing (git-fixes).\n- wifi: rtw88: sdio: use indirect IO for device registers before power-on (stable-fixes).\n- wifi: rtw89: print just once for unknown C2H events (stable-fixes).\n- wifi: zd1211rw: fix potential memory leak in __zd_usb_enable_rx() (git-fixes).\n- x86/CPU/AMD: Add RDSEED fix for Zen5 (git-fixes).\n- x86/CPU/AMD: Add additional fixed RDSEED microcode revisions (git-fixes).\n- x86/CPU/AMD: Add missing terminator for zen5_rdseed_microcode (git-fixes).\n- x86/CPU/AMD: Do the common init on future Zens too (git-fixes).\n- x86/amd_nb: Add new PCI IDs for AMD family 0x1a (stable-fixes).\n- x86/bugs: Fix reporting of LFENCE retpoline (git-fixes).\n- x86/bugs: Report correct retbleed mitigation status (git-fixes).\n- x86/vmscape: Add old Intel CPUs to affected list (git-fixes).\n- xe/oa: Fix query mode of operation for OAR/OAC (git-fixes).\n- xhci: dbc: Allow users to modify DbC poll interval via sysfs (stable-fixes).\n- xhci: dbc: Avoid event polling busyloop if pending rx transfers are inactive (git-fixes).\n- xhci: dbc: Improve performance by removing delay in transfer event polling (stable-fixes).\n- xhci: dbc: fix bogus 1024 byte prefix if ttyDBC read races with stall event (git-fixes).\n- xhci: dbc: poll at different rate depending on data transfer activity (stable-fixes).\n",
"title": "Description of the patch"
},
{
"category": "details",
"text": "SUSE-2025-4517,SUSE-SLE-Module-Public-Cloud-15-SP7-2025-4517",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2025_4517-1.json"
},
{
"category": "self",
"summary": "URL for SUSE-SU-2025:4517-1",
"url": "https://www.suse.com/support/update/announcement/2025/suse-su-20254517-1/"
},
{
"category": "self",
"summary": "E-Mail link for SUSE-SU-2025:4517-1",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-December/023649.html"
},
{
"category": "self",
"summary": "SUSE Bug 1232223",
"url": "https://bugzilla.suse.com/1232223"
},
{
"category": "self",
"summary": "SUSE Bug 1235463",
"url": "https://bugzilla.suse.com/1235463"
},
{
"category": "self",
"summary": "SUSE Bug 1236743",
"url": "https://bugzilla.suse.com/1236743"
},
{
"category": "self",
"summary": "SUSE Bug 1237888",
"url": "https://bugzilla.suse.com/1237888"
},
{
"category": "self",
"summary": "SUSE Bug 1241166",
"url": "https://bugzilla.suse.com/1241166"
},
{
"category": "self",
"summary": "SUSE Bug 1243474",
"url": "https://bugzilla.suse.com/1243474"
},
{
"category": "self",
"summary": "SUSE Bug 1245193",
"url": "https://bugzilla.suse.com/1245193"
},
{
"category": "self",
"summary": "SUSE Bug 1247076",
"url": "https://bugzilla.suse.com/1247076"
},
{
"category": "self",
"summary": "SUSE Bug 1247078",
"url": "https://bugzilla.suse.com/1247078"
},
{
"category": "self",
"summary": "SUSE Bug 1247079",
"url": "https://bugzilla.suse.com/1247079"
},
{
"category": "self",
"summary": "SUSE Bug 1247500",
"url": "https://bugzilla.suse.com/1247500"
},
{
"category": "self",
"summary": "SUSE Bug 1247509",
"url": "https://bugzilla.suse.com/1247509"
},
{
"category": "self",
"summary": "SUSE Bug 1247683",
"url": "https://bugzilla.suse.com/1247683"
},
{
"category": "self",
"summary": "SUSE Bug 1249547",
"url": "https://bugzilla.suse.com/1249547"
},
{
"category": "self",
"summary": "SUSE Bug 1249912",
"url": "https://bugzilla.suse.com/1249912"
},
{
"category": "self",
"summary": "SUSE Bug 1249982",
"url": "https://bugzilla.suse.com/1249982"
},
{
"category": "self",
"summary": "SUSE Bug 1250034",
"url": "https://bugzilla.suse.com/1250034"
},
{
"category": "self",
"summary": "SUSE Bug 1250176",
"url": "https://bugzilla.suse.com/1250176"
},
{
"category": "self",
"summary": "SUSE Bug 1250237",
"url": "https://bugzilla.suse.com/1250237"
},
{
"category": "self",
"summary": "SUSE Bug 1250252",
"url": "https://bugzilla.suse.com/1250252"
},
{
"category": "self",
"summary": "SUSE Bug 1250705",
"url": "https://bugzilla.suse.com/1250705"
},
{
"category": "self",
"summary": "SUSE Bug 1251120",
"url": "https://bugzilla.suse.com/1251120"
},
{
"category": "self",
"summary": "SUSE Bug 1251786",
"url": "https://bugzilla.suse.com/1251786"
},
{
"category": "self",
"summary": "SUSE Bug 1252063",
"url": "https://bugzilla.suse.com/1252063"
},
{
"category": "self",
"summary": "SUSE Bug 1252267",
"url": "https://bugzilla.suse.com/1252267"
},
{
"category": "self",
"summary": "SUSE Bug 1252269",
"url": "https://bugzilla.suse.com/1252269"
},
{
"category": "self",
"summary": "SUSE Bug 1252303",
"url": "https://bugzilla.suse.com/1252303"
},
{
"category": "self",
"summary": "SUSE Bug 1252352",
"url": "https://bugzilla.suse.com/1252352"
},
{
"category": "self",
"summary": "SUSE Bug 1252353",
"url": "https://bugzilla.suse.com/1252353"
},
{
"category": "self",
"summary": "SUSE Bug 1252365",
"url": "https://bugzilla.suse.com/1252365"
},
{
"category": "self",
"summary": "SUSE Bug 1252366",
"url": "https://bugzilla.suse.com/1252366"
},
{
"category": "self",
"summary": "SUSE Bug 1252368",
"url": "https://bugzilla.suse.com/1252368"
},
{
"category": "self",
"summary": "SUSE Bug 1252370",
"url": "https://bugzilla.suse.com/1252370"
},
{
"category": "self",
"summary": "SUSE Bug 1252681",
"url": "https://bugzilla.suse.com/1252681"
},
{
"category": "self",
"summary": "SUSE Bug 1252763",
"url": "https://bugzilla.suse.com/1252763"
},
{
"category": "self",
"summary": "SUSE Bug 1252773",
"url": "https://bugzilla.suse.com/1252773"
},
{
"category": "self",
"summary": "SUSE Bug 1252780",
"url": "https://bugzilla.suse.com/1252780"
},
{
"category": "self",
"summary": "SUSE Bug 1252790",
"url": "https://bugzilla.suse.com/1252790"
},
{
"category": "self",
"summary": "SUSE Bug 1252794",
"url": "https://bugzilla.suse.com/1252794"
},
{
"category": "self",
"summary": "SUSE Bug 1252795",
"url": "https://bugzilla.suse.com/1252795"
},
{
"category": "self",
"summary": "SUSE Bug 1252809",
"url": "https://bugzilla.suse.com/1252809"
},
{
"category": "self",
"summary": "SUSE Bug 1252817",
"url": "https://bugzilla.suse.com/1252817"
},
{
"category": "self",
"summary": "SUSE Bug 1252821",
"url": "https://bugzilla.suse.com/1252821"
},
{
"category": "self",
"summary": "SUSE Bug 1252836",
"url": "https://bugzilla.suse.com/1252836"
},
{
"category": "self",
"summary": "SUSE Bug 1252845",
"url": "https://bugzilla.suse.com/1252845"
},
{
"category": "self",
"summary": "SUSE Bug 1252862",
"url": "https://bugzilla.suse.com/1252862"
},
{
"category": "self",
"summary": "SUSE Bug 1252912",
"url": "https://bugzilla.suse.com/1252912"
},
{
"category": "self",
"summary": "SUSE Bug 1252917",
"url": "https://bugzilla.suse.com/1252917"
},
{
"category": "self",
"summary": "SUSE Bug 1252923",
"url": "https://bugzilla.suse.com/1252923"
},
{
"category": "self",
"summary": "SUSE Bug 1252928",
"url": "https://bugzilla.suse.com/1252928"
},
{
"category": "self",
"summary": "SUSE Bug 1253018",
"url": "https://bugzilla.suse.com/1253018"
},
{
"category": "self",
"summary": "SUSE Bug 1253176",
"url": "https://bugzilla.suse.com/1253176"
},
{
"category": "self",
"summary": "SUSE Bug 1253275",
"url": "https://bugzilla.suse.com/1253275"
},
{
"category": "self",
"summary": "SUSE Bug 1253318",
"url": "https://bugzilla.suse.com/1253318"
},
{
"category": "self",
"summary": "SUSE Bug 1253324",
"url": "https://bugzilla.suse.com/1253324"
},
{
"category": "self",
"summary": "SUSE Bug 1253349",
"url": "https://bugzilla.suse.com/1253349"
},
{
"category": "self",
"summary": "SUSE Bug 1253352",
"url": "https://bugzilla.suse.com/1253352"
},
{
"category": "self",
"summary": "SUSE Bug 1253355",
"url": "https://bugzilla.suse.com/1253355"
},
{
"category": "self",
"summary": "SUSE Bug 1253360",
"url": "https://bugzilla.suse.com/1253360"
},
{
"category": "self",
"summary": "SUSE Bug 1253362",
"url": "https://bugzilla.suse.com/1253362"
},
{
"category": "self",
"summary": "SUSE Bug 1253363",
"url": "https://bugzilla.suse.com/1253363"
},
{
"category": "self",
"summary": "SUSE Bug 1253367",
"url": "https://bugzilla.suse.com/1253367"
},
{
"category": "self",
"summary": "SUSE Bug 1253369",
"url": "https://bugzilla.suse.com/1253369"
},
{
"category": "self",
"summary": "SUSE Bug 1253393",
"url": "https://bugzilla.suse.com/1253393"
},
{
"category": "self",
"summary": "SUSE Bug 1253394",
"url": "https://bugzilla.suse.com/1253394"
},
{
"category": "self",
"summary": "SUSE Bug 1253395",
"url": "https://bugzilla.suse.com/1253395"
},
{
"category": "self",
"summary": "SUSE Bug 1253403",
"url": "https://bugzilla.suse.com/1253403"
},
{
"category": "self",
"summary": "SUSE Bug 1253407",
"url": "https://bugzilla.suse.com/1253407"
},
{
"category": "self",
"summary": "SUSE Bug 1253409",
"url": "https://bugzilla.suse.com/1253409"
},
{
"category": "self",
"summary": "SUSE Bug 1253412",
"url": "https://bugzilla.suse.com/1253412"
},
{
"category": "self",
"summary": "SUSE Bug 1253416",
"url": "https://bugzilla.suse.com/1253416"
},
{
"category": "self",
"summary": "SUSE Bug 1253421",
"url": "https://bugzilla.suse.com/1253421"
},
{
"category": "self",
"summary": "SUSE Bug 1253423",
"url": "https://bugzilla.suse.com/1253423"
},
{
"category": "self",
"summary": "SUSE Bug 1253424",
"url": "https://bugzilla.suse.com/1253424"
},
{
"category": "self",
"summary": "SUSE Bug 1253425",
"url": "https://bugzilla.suse.com/1253425"
},
{
"category": "self",
"summary": "SUSE Bug 1253427",
"url": "https://bugzilla.suse.com/1253427"
},
{
"category": "self",
"summary": "SUSE Bug 1253428",
"url": "https://bugzilla.suse.com/1253428"
},
{
"category": "self",
"summary": "SUSE Bug 1253431",
"url": "https://bugzilla.suse.com/1253431"
},
{
"category": "self",
"summary": "SUSE Bug 1253436",
"url": "https://bugzilla.suse.com/1253436"
},
{
"category": "self",
"summary": "SUSE Bug 1253438",
"url": "https://bugzilla.suse.com/1253438"
},
{
"category": "self",
"summary": "SUSE Bug 1253440",
"url": "https://bugzilla.suse.com/1253440"
},
{
"category": "self",
"summary": "SUSE Bug 1253441",
"url": "https://bugzilla.suse.com/1253441"
},
{
"category": "self",
"summary": "SUSE Bug 1253445",
"url": "https://bugzilla.suse.com/1253445"
},
{
"category": "self",
"summary": "SUSE Bug 1253448",
"url": "https://bugzilla.suse.com/1253448"
},
{
"category": "self",
"summary": "SUSE Bug 1253449",
"url": "https://bugzilla.suse.com/1253449"
},
{
"category": "self",
"summary": "SUSE Bug 1253453",
"url": "https://bugzilla.suse.com/1253453"
},
{
"category": "self",
"summary": "SUSE Bug 1253456",
"url": "https://bugzilla.suse.com/1253456"
},
{
"category": "self",
"summary": "SUSE Bug 1253472",
"url": "https://bugzilla.suse.com/1253472"
},
{
"category": "self",
"summary": "SUSE Bug 1253648",
"url": "https://bugzilla.suse.com/1253648"
},
{
"category": "self",
"summary": "SUSE Bug 1253779",
"url": "https://bugzilla.suse.com/1253779"
},
{
"category": "self",
"summary": "SUSE Bug 1254181",
"url": "https://bugzilla.suse.com/1254181"
},
{
"category": "self",
"summary": "SUSE Bug 1254221",
"url": "https://bugzilla.suse.com/1254221"
},
{
"category": "self",
"summary": "SUSE Bug 1254235",
"url": "https://bugzilla.suse.com/1254235"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-50253 page",
"url": "https://www.suse.com/security/cve/CVE-2022-50253/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2023-53676 page",
"url": "https://www.suse.com/security/cve/CVE-2023-53676/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-21710 page",
"url": "https://www.suse.com/security/cve/CVE-2025-21710/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-37916 page",
"url": "https://www.suse.com/security/cve/CVE-2025-37916/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-38359 page",
"url": "https://www.suse.com/security/cve/CVE-2025-38359/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-38360 page",
"url": "https://www.suse.com/security/cve/CVE-2025-38360/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-38361 page",
"url": "https://www.suse.com/security/cve/CVE-2025-38361/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-39788 page",
"url": "https://www.suse.com/security/cve/CVE-2025-39788/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-39805 page",
"url": "https://www.suse.com/security/cve/CVE-2025-39805/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-39819 page",
"url": "https://www.suse.com/security/cve/CVE-2025-39819/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-39822 page",
"url": "https://www.suse.com/security/cve/CVE-2025-39822/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-39859 page",
"url": "https://www.suse.com/security/cve/CVE-2025-39859/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-39944 page",
"url": "https://www.suse.com/security/cve/CVE-2025-39944/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-39980 page",
"url": "https://www.suse.com/security/cve/CVE-2025-39980/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40001 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40001/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40021 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40021/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40027 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40027/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40030 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40030/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40038 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40038/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40040 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40040/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40047 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40047/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40048 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40048/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40055 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40055/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40059 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40059/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40064 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40064/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40070 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40070/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40074 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40074/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40075 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40075/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40083 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40083/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40086 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40086/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40098 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40098/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40105 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40105/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40107 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40107/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40109 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40109/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40110 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40110/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40111 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40111/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40115 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40115/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40116 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40116/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40118 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40118/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40120 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40120/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40121 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40121/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40127 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40127/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40129 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40129/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40139 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40139/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40140 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40140/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40141 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40141/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40149 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40149/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40154 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40154/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40156 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40156/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40157 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40157/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40159 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40159/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40164 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40164/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40168 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40168/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40169 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40169/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40171 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40171/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40172 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40172/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40173 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40173/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40176 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40176/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40180 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40180/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40183 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40183/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40185 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40185/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40186 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40186/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40188 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40188/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40194 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40194/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40198 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40198/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40200 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40200/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40204 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40204/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40205 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40205/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40206 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40206/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40207 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40207/"
}
],
"title": "Security update for the Linux Kernel",
"tracking": {
"current_release_date": "2025-12-23T16:28:51Z",
"generator": {
"date": "2025-12-23T16:28:51Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "SUSE-SU-2025:4517-1",
"initial_release_date": "2025-12-23T16:28:51Z",
"revision_history": [
{
"date": "2025-12-23T16:28:51Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "cluster-md-kmp-azure-6.4.0-150700.20.21.1.aarch64",
"product": {
"name": "cluster-md-kmp-azure-6.4.0-150700.20.21.1.aarch64",
"product_id": "cluster-md-kmp-azure-6.4.0-150700.20.21.1.aarch64"
}
},
{
"category": "product_version",
"name": "dlm-kmp-azure-6.4.0-150700.20.21.1.aarch64",
"product": {
"name": "dlm-kmp-azure-6.4.0-150700.20.21.1.aarch64",
"product_id": "dlm-kmp-azure-6.4.0-150700.20.21.1.aarch64"
}
},
{
"category": "product_version",
"name": "gfs2-kmp-azure-6.4.0-150700.20.21.1.aarch64",
"product": {
"name": "gfs2-kmp-azure-6.4.0-150700.20.21.1.aarch64",
"product_id": "gfs2-kmp-azure-6.4.0-150700.20.21.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-azure-6.4.0-150700.20.21.1.aarch64",
"product": {
"name": "kernel-azure-6.4.0-150700.20.21.1.aarch64",
"product_id": "kernel-azure-6.4.0-150700.20.21.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-azure-devel-6.4.0-150700.20.21.1.aarch64",
"product": {
"name": "kernel-azure-devel-6.4.0-150700.20.21.1.aarch64",
"product_id": "kernel-azure-devel-6.4.0-150700.20.21.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-azure-extra-6.4.0-150700.20.21.1.aarch64",
"product": {
"name": "kernel-azure-extra-6.4.0-150700.20.21.1.aarch64",
"product_id": "kernel-azure-extra-6.4.0-150700.20.21.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-azure-optional-6.4.0-150700.20.21.1.aarch64",
"product": {
"name": "kernel-azure-optional-6.4.0-150700.20.21.1.aarch64",
"product_id": "kernel-azure-optional-6.4.0-150700.20.21.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-syms-azure-6.4.0-150700.20.21.1.aarch64",
"product": {
"name": "kernel-syms-azure-6.4.0-150700.20.21.1.aarch64",
"product_id": "kernel-syms-azure-6.4.0-150700.20.21.1.aarch64"
}
},
{
"category": "product_version",
"name": "kselftests-kmp-azure-6.4.0-150700.20.21.1.aarch64",
"product": {
"name": "kselftests-kmp-azure-6.4.0-150700.20.21.1.aarch64",
"product_id": "kselftests-kmp-azure-6.4.0-150700.20.21.1.aarch64"
}
},
{
"category": "product_version",
"name": "ocfs2-kmp-azure-6.4.0-150700.20.21.1.aarch64",
"product": {
"name": "ocfs2-kmp-azure-6.4.0-150700.20.21.1.aarch64",
"product_id": "ocfs2-kmp-azure-6.4.0-150700.20.21.1.aarch64"
}
},
{
"category": "product_version",
"name": "reiserfs-kmp-azure-6.4.0-150700.20.21.1.aarch64",
"product": {
"name": "reiserfs-kmp-azure-6.4.0-150700.20.21.1.aarch64",
"product_id": "reiserfs-kmp-azure-6.4.0-150700.20.21.1.aarch64"
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-devel-azure-6.4.0-150700.20.21.1.noarch",
"product": {
"name": "kernel-devel-azure-6.4.0-150700.20.21.1.noarch",
"product_id": "kernel-devel-azure-6.4.0-150700.20.21.1.noarch"
}
},
{
"category": "product_version",
"name": "kernel-source-azure-6.4.0-150700.20.21.1.noarch",
"product": {
"name": "kernel-source-azure-6.4.0-150700.20.21.1.noarch",
"product_id": "kernel-source-azure-6.4.0-150700.20.21.1.noarch"
}
}
],
"category": "architecture",
"name": "noarch"
},
{
"branches": [
{
"category": "product_version",
"name": "cluster-md-kmp-azure-6.4.0-150700.20.21.1.x86_64",
"product": {
"name": "cluster-md-kmp-azure-6.4.0-150700.20.21.1.x86_64",
"product_id": "cluster-md-kmp-azure-6.4.0-150700.20.21.1.x86_64"
}
},
{
"category": "product_version",
"name": "dlm-kmp-azure-6.4.0-150700.20.21.1.x86_64",
"product": {
"name": "dlm-kmp-azure-6.4.0-150700.20.21.1.x86_64",
"product_id": "dlm-kmp-azure-6.4.0-150700.20.21.1.x86_64"
}
},
{
"category": "product_version",
"name": "gfs2-kmp-azure-6.4.0-150700.20.21.1.x86_64",
"product": {
"name": "gfs2-kmp-azure-6.4.0-150700.20.21.1.x86_64",
"product_id": "gfs2-kmp-azure-6.4.0-150700.20.21.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-azure-6.4.0-150700.20.21.1.x86_64",
"product": {
"name": "kernel-azure-6.4.0-150700.20.21.1.x86_64",
"product_id": "kernel-azure-6.4.0-150700.20.21.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-azure-devel-6.4.0-150700.20.21.1.x86_64",
"product": {
"name": "kernel-azure-devel-6.4.0-150700.20.21.1.x86_64",
"product_id": "kernel-azure-devel-6.4.0-150700.20.21.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-azure-extra-6.4.0-150700.20.21.1.x86_64",
"product": {
"name": "kernel-azure-extra-6.4.0-150700.20.21.1.x86_64",
"product_id": "kernel-azure-extra-6.4.0-150700.20.21.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-azure-optional-6.4.0-150700.20.21.1.x86_64",
"product": {
"name": "kernel-azure-optional-6.4.0-150700.20.21.1.x86_64",
"product_id": "kernel-azure-optional-6.4.0-150700.20.21.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-azure-vdso-6.4.0-150700.20.21.1.x86_64",
"product": {
"name": "kernel-azure-vdso-6.4.0-150700.20.21.1.x86_64",
"product_id": "kernel-azure-vdso-6.4.0-150700.20.21.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-syms-azure-6.4.0-150700.20.21.1.x86_64",
"product": {
"name": "kernel-syms-azure-6.4.0-150700.20.21.1.x86_64",
"product_id": "kernel-syms-azure-6.4.0-150700.20.21.1.x86_64"
}
},
{
"category": "product_version",
"name": "kselftests-kmp-azure-6.4.0-150700.20.21.1.x86_64",
"product": {
"name": "kselftests-kmp-azure-6.4.0-150700.20.21.1.x86_64",
"product_id": "kselftests-kmp-azure-6.4.0-150700.20.21.1.x86_64"
}
},
{
"category": "product_version",
"name": "ocfs2-kmp-azure-6.4.0-150700.20.21.1.x86_64",
"product": {
"name": "ocfs2-kmp-azure-6.4.0-150700.20.21.1.x86_64",
"product_id": "ocfs2-kmp-azure-6.4.0-150700.20.21.1.x86_64"
}
},
{
"category": "product_version",
"name": "reiserfs-kmp-azure-6.4.0-150700.20.21.1.x86_64",
"product": {
"name": "reiserfs-kmp-azure-6.4.0-150700.20.21.1.x86_64",
"product_id": "reiserfs-kmp-azure-6.4.0-150700.20.21.1.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "SUSE Linux Enterprise Module for Public Cloud 15 SP7",
"product": {
"name": "SUSE Linux Enterprise Module for Public Cloud 15 SP7",
"product_id": "SUSE Linux Enterprise Module for Public Cloud 15 SP7",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-module-public-cloud:15:sp7"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-azure-6.4.0-150700.20.21.1.aarch64 as component of SUSE Linux Enterprise Module for Public Cloud 15 SP7",
"product_id": "SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.20.21.1.aarch64"
},
"product_reference": "kernel-azure-6.4.0-150700.20.21.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Public Cloud 15 SP7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-azure-6.4.0-150700.20.21.1.x86_64 as component of SUSE Linux Enterprise Module for Public Cloud 15 SP7",
"product_id": "SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.20.21.1.x86_64"
},
"product_reference": "kernel-azure-6.4.0-150700.20.21.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Public Cloud 15 SP7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-azure-devel-6.4.0-150700.20.21.1.aarch64 as component of SUSE Linux Enterprise Module for Public Cloud 15 SP7",
"product_id": "SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.20.21.1.aarch64"
},
"product_reference": "kernel-azure-devel-6.4.0-150700.20.21.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Public Cloud 15 SP7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-azure-devel-6.4.0-150700.20.21.1.x86_64 as component of SUSE Linux Enterprise Module for Public Cloud 15 SP7",
"product_id": "SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.20.21.1.x86_64"
},
"product_reference": "kernel-azure-devel-6.4.0-150700.20.21.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Public Cloud 15 SP7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-azure-6.4.0-150700.20.21.1.noarch as component of SUSE Linux Enterprise Module for Public Cloud 15 SP7",
"product_id": "SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-devel-azure-6.4.0-150700.20.21.1.noarch"
},
"product_reference": "kernel-devel-azure-6.4.0-150700.20.21.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Public Cloud 15 SP7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-source-azure-6.4.0-150700.20.21.1.noarch as component of SUSE Linux Enterprise Module for Public Cloud 15 SP7",
"product_id": "SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-source-azure-6.4.0-150700.20.21.1.noarch"
},
"product_reference": "kernel-source-azure-6.4.0-150700.20.21.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Public Cloud 15 SP7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-azure-6.4.0-150700.20.21.1.aarch64 as component of SUSE Linux Enterprise Module for Public Cloud 15 SP7",
"product_id": "SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-syms-azure-6.4.0-150700.20.21.1.aarch64"
},
"product_reference": "kernel-syms-azure-6.4.0-150700.20.21.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Public Cloud 15 SP7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-azure-6.4.0-150700.20.21.1.x86_64 as component of SUSE Linux Enterprise Module for Public Cloud 15 SP7",
"product_id": "SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-syms-azure-6.4.0-150700.20.21.1.x86_64"
},
"product_reference": "kernel-syms-azure-6.4.0-150700.20.21.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Public Cloud 15 SP7"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2022-50253",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-50253"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nbpf: make sure skb-\u003elen != 0 when redirecting to a tunneling device\n\nsyzkaller managed to trigger another case where skb-\u003elen == 0\nwhen we enter __dev_queue_xmit:\n\nWARNING: CPU: 0 PID: 2470 at include/linux/skbuff.h:2576 skb_assert_len include/linux/skbuff.h:2576 [inline]\nWARNING: CPU: 0 PID: 2470 at include/linux/skbuff.h:2576 __dev_queue_xmit+0x2069/0x35e0 net/core/dev.c:4295\n\nCall Trace:\n dev_queue_xmit+0x17/0x20 net/core/dev.c:4406\n __bpf_tx_skb net/core/filter.c:2115 [inline]\n __bpf_redirect_no_mac net/core/filter.c:2140 [inline]\n __bpf_redirect+0x5fb/0xda0 net/core/filter.c:2163\n ____bpf_clone_redirect net/core/filter.c:2447 [inline]\n bpf_clone_redirect+0x247/0x390 net/core/filter.c:2419\n bpf_prog_48159a89cb4a9a16+0x59/0x5e\n bpf_dispatcher_nop_func include/linux/bpf.h:897 [inline]\n __bpf_prog_run include/linux/filter.h:596 [inline]\n bpf_prog_run include/linux/filter.h:603 [inline]\n bpf_test_run+0x46c/0x890 net/bpf/test_run.c:402\n bpf_prog_test_run_skb+0xbdc/0x14c0 net/bpf/test_run.c:1170\n bpf_prog_test_run+0x345/0x3c0 kernel/bpf/syscall.c:3648\n __sys_bpf+0x43a/0x6c0 kernel/bpf/syscall.c:5005\n __do_sys_bpf kernel/bpf/syscall.c:5091 [inline]\n __se_sys_bpf kernel/bpf/syscall.c:5089 [inline]\n __x64_sys_bpf+0x7c/0x90 kernel/bpf/syscall.c:5089\n do_syscall_64+0x54/0x70 arch/x86/entry/common.c:48\n entry_SYSCALL_64_after_hwframe+0x61/0xc6\n\nThe reproducer doesn\u0027t really reproduce outside of syzkaller\nenvironment, so I\u0027m taking a guess here. It looks like we\ndo generate correct ETH_HLEN-sized packet, but we redirect\nthe packet to the tunneling device. Before we do so, we\n__skb_pull l2 header and arrive again at skb-\u003elen == 0.\nDoesn\u0027t seem like we can do anything better than having\nan explicit check after __skb_pull?",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.20.21.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.20.21.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.20.21.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.20.21.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-devel-azure-6.4.0-150700.20.21.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-source-azure-6.4.0-150700.20.21.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-syms-azure-6.4.0-150700.20.21.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-syms-azure-6.4.0-150700.20.21.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-50253",
"url": "https://www.suse.com/security/cve/CVE-2022-50253"
},
{
"category": "external",
"summary": "SUSE Bug 1249912 for CVE-2022-50253",
"url": "https://bugzilla.suse.com/1249912"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.20.21.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.20.21.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.20.21.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.20.21.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-devel-azure-6.4.0-150700.20.21.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-source-azure-6.4.0-150700.20.21.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-syms-azure-6.4.0-150700.20.21.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-syms-azure-6.4.0-150700.20.21.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.20.21.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.20.21.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.20.21.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.20.21.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-devel-azure-6.4.0-150700.20.21.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-source-azure-6.4.0-150700.20.21.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-syms-azure-6.4.0-150700.20.21.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-syms-azure-6.4.0-150700.20.21.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-23T16:28:51Z",
"details": "moderate"
}
],
"title": "CVE-2022-50253"
},
{
"cve": "CVE-2023-53676",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2023-53676"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nscsi: target: iscsi: Fix buffer overflow in lio_target_nacl_info_show()\n\nThe function lio_target_nacl_info_show() uses sprintf() in a loop to print\ndetails for every iSCSI connection in a session without checking for the\nbuffer length. With enough iSCSI connections it\u0027s possible to overflow the\nbuffer provided by configfs and corrupt the memory.\n\nThis patch replaces sprintf() with sysfs_emit_at() that checks for buffer\nboundries.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.20.21.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.20.21.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.20.21.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.20.21.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-devel-azure-6.4.0-150700.20.21.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-source-azure-6.4.0-150700.20.21.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-syms-azure-6.4.0-150700.20.21.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-syms-azure-6.4.0-150700.20.21.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2023-53676",
"url": "https://www.suse.com/security/cve/CVE-2023-53676"
},
{
"category": "external",
"summary": "SUSE Bug 1251786 for CVE-2023-53676",
"url": "https://bugzilla.suse.com/1251786"
},
{
"category": "external",
"summary": "SUSE Bug 1251787 for CVE-2023-53676",
"url": "https://bugzilla.suse.com/1251787"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.20.21.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.20.21.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.20.21.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.20.21.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-devel-azure-6.4.0-150700.20.21.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-source-azure-6.4.0-150700.20.21.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-syms-azure-6.4.0-150700.20.21.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-syms-azure-6.4.0-150700.20.21.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.20.21.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.20.21.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.20.21.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.20.21.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-devel-azure-6.4.0-150700.20.21.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-source-azure-6.4.0-150700.20.21.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-syms-azure-6.4.0-150700.20.21.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-syms-azure-6.4.0-150700.20.21.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-23T16:28:51Z",
"details": "important"
}
],
"title": "CVE-2023-53676"
},
{
"cve": "CVE-2025-21710",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-21710"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\ntcp: correct handling of extreme memory squeeze\n\nTesting with iperf3 using the \"pasta\" protocol splicer has revealed\na problem in the way tcp handles window advertising in extreme memory\nsqueeze situations.\n\nUnder memory pressure, a socket endpoint may temporarily advertise\na zero-sized window, but this is not stored as part of the socket data.\nThe reasoning behind this is that it is considered a temporary setting\nwhich shouldn\u0027t influence any further calculations.\n\nHowever, if we happen to stall at an unfortunate value of the current\nwindow size, the algorithm selecting a new value will consistently fail\nto advertise a non-zero window once we have freed up enough memory.\nThis means that this side\u0027s notion of the current window size is\ndifferent from the one last advertised to the peer, causing the latter\nto not send any data to resolve the sitution.\n\nThe problem occurs on the iperf3 server side, and the socket in question\nis a completely regular socket with the default settings for the\nfedora40 kernel. We do not use SO_PEEK or SO_RCVBUF on the socket.\n\nThe following excerpt of a logging session, with own comments added,\nshows more in detail what is happening:\n\n// tcp_v4_rcv(-\u003e)\n// tcp_rcv_established(-\u003e)\n[5201\u003c-\u003e39222]: ==== Activating log @ net/ipv4/tcp_input.c/tcp_data_queue()/5257 ====\n[5201\u003c-\u003e39222]: tcp_data_queue(-\u003e)\n[5201\u003c-\u003e39222]: DROPPING skb [265600160..265665640], reason: SKB_DROP_REASON_PROTO_MEM\n [rcv_nxt 265600160, rcv_wnd 262144, snt_ack 265469200, win_now 131184]\n [copied_seq 259909392-\u003e260034360 (124968), unread 5565800, qlen 85, ofoq 0]\n [OFO queue: gap: 65480, len: 0]\n[5201\u003c-\u003e39222]: tcp_data_queue(\u003c-)\n[5201\u003c-\u003e39222]: __tcp_transmit_skb(-\u003e)\n [tp-\u003ercv_wup: 265469200, tp-\u003ercv_wnd: 262144, tp-\u003ercv_nxt 265600160]\n[5201\u003c-\u003e39222]: tcp_select_window(-\u003e)\n[5201\u003c-\u003e39222]: (inet_csk(sk)-\u003eicsk_ack.pending \u0026 ICSK_ACK_NOMEM) ? --\u003e TRUE\n [tp-\u003ercv_wup: 265469200, tp-\u003ercv_wnd: 262144, tp-\u003ercv_nxt 265600160]\n returning 0\n[5201\u003c-\u003e39222]: tcp_select_window(\u003c-)\n[5201\u003c-\u003e39222]: ADVERTISING WIN 0, ACK_SEQ: 265600160\n[5201\u003c-\u003e39222]: [__tcp_transmit_skb(\u003c-)\n[5201\u003c-\u003e39222]: tcp_rcv_established(\u003c-)\n[5201\u003c-\u003e39222]: tcp_v4_rcv(\u003c-)\n\n// Receive queue is at 85 buffers and we are out of memory.\n// We drop the incoming buffer, although it is in sequence, and decide\n// to send an advertisement with a window of zero.\n// We don\u0027t update tp-\u003ercv_wnd and tp-\u003ercv_wup accordingly, which means\n// we unconditionally shrink the window.\n\n[5201\u003c-\u003e39222]: tcp_recvmsg_locked(-\u003e)\n[5201\u003c-\u003e39222]: __tcp_cleanup_rbuf(-\u003e) tp-\u003ercv_wup: 265469200, tp-\u003ercv_wnd: 262144, tp-\u003ercv_nxt 265600160\n[5201\u003c-\u003e39222]: [new_win = 0, win_now = 131184, 2 * win_now = 262368]\n[5201\u003c-\u003e39222]: [new_win \u003e= (2 * win_now) ? --\u003e time_to_ack = 0]\n[5201\u003c-\u003e39222]: NOT calling tcp_send_ack()\n [tp-\u003ercv_wup: 265469200, tp-\u003ercv_wnd: 262144, tp-\u003ercv_nxt 265600160]\n[5201\u003c-\u003e39222]: __tcp_cleanup_rbuf(\u003c-)\n [rcv_nxt 265600160, rcv_wnd 262144, snt_ack 265469200, win_now 131184]\n [copied_seq 260040464-\u003e260040464 (0), unread 5559696, qlen 85, ofoq 0]\n returning 6104 bytes\n[5201\u003c-\u003e39222]: tcp_recvmsg_locked(\u003c-)\n\n// After each read, the algorithm for calculating the new receive\n// window in __tcp_cleanup_rbuf() finds it is too small to advertise\n// or to update tp-\u003ercv_wnd.\n// Meanwhile, the peer thinks the window is zero, and will not send\n// any more data to trigger an update from the interrupt mode side.\n\n[5201\u003c-\u003e39222]: tcp_recvmsg_locked(-\u003e)\n[5201\u003c-\u003e39222]: __tcp_cleanup_rbuf(-\u003e) tp-\u003ercv_wup: 265469200, tp-\u003ercv_wnd: 262144, tp-\u003ercv_nxt 265600160\n[5201\u003c-\u003e39222]: [new_win = 262144, win_now = 131184, 2 * win_n\n---truncated---",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.20.21.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.20.21.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.20.21.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.20.21.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-devel-azure-6.4.0-150700.20.21.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-source-azure-6.4.0-150700.20.21.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-syms-azure-6.4.0-150700.20.21.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-syms-azure-6.4.0-150700.20.21.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-21710",
"url": "https://www.suse.com/security/cve/CVE-2025-21710"
},
{
"category": "external",
"summary": "SUSE Bug 1237888 for CVE-2025-21710",
"url": "https://bugzilla.suse.com/1237888"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.20.21.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.20.21.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.20.21.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.20.21.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-devel-azure-6.4.0-150700.20.21.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-source-azure-6.4.0-150700.20.21.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-syms-azure-6.4.0-150700.20.21.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-syms-azure-6.4.0-150700.20.21.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.20.21.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.20.21.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.20.21.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.20.21.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-devel-azure-6.4.0-150700.20.21.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-source-azure-6.4.0-150700.20.21.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-syms-azure-6.4.0-150700.20.21.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-syms-azure-6.4.0-150700.20.21.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-23T16:28:51Z",
"details": "moderate"
}
],
"title": "CVE-2025-21710"
},
{
"cve": "CVE-2025-37916",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-37916"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\npds_core: remove write-after-free of client_id\n\nA use-after-free error popped up in stress testing:\n\n[Mon Apr 21 21:21:33 2025] BUG: KFENCE: use-after-free write in pdsc_auxbus_dev_del+0xef/0x160 [pds_core]\n[Mon Apr 21 21:21:33 2025] Use-after-free write at 0x000000007013ecd1 (in kfence-#47):\n[Mon Apr 21 21:21:33 2025] pdsc_auxbus_dev_del+0xef/0x160 [pds_core]\n[Mon Apr 21 21:21:33 2025] pdsc_remove+0xc0/0x1b0 [pds_core]\n[Mon Apr 21 21:21:33 2025] pci_device_remove+0x24/0x70\n[Mon Apr 21 21:21:33 2025] device_release_driver_internal+0x11f/0x180\n[Mon Apr 21 21:21:33 2025] driver_detach+0x45/0x80\n[Mon Apr 21 21:21:33 2025] bus_remove_driver+0x83/0xe0\n[Mon Apr 21 21:21:33 2025] pci_unregister_driver+0x1a/0x80\n\nThe actual device uninit usually happens on a separate thread\nscheduled after this code runs, but there is no guarantee of order\nof thread execution, so this could be a problem. There\u0027s no\nactual need to clear the client_id at this point, so simply\nremove the offending code.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.20.21.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.20.21.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.20.21.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.20.21.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-devel-azure-6.4.0-150700.20.21.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-source-azure-6.4.0-150700.20.21.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-syms-azure-6.4.0-150700.20.21.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-syms-azure-6.4.0-150700.20.21.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-37916",
"url": "https://www.suse.com/security/cve/CVE-2025-37916"
},
{
"category": "external",
"summary": "SUSE Bug 1243474 for CVE-2025-37916",
"url": "https://bugzilla.suse.com/1243474"
},
{
"category": "external",
"summary": "SUSE Bug 1243535 for CVE-2025-37916",
"url": "https://bugzilla.suse.com/1243535"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.20.21.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.20.21.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.20.21.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.20.21.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-devel-azure-6.4.0-150700.20.21.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-source-azure-6.4.0-150700.20.21.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-syms-azure-6.4.0-150700.20.21.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-syms-azure-6.4.0-150700.20.21.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.20.21.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.20.21.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.20.21.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.20.21.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-devel-azure-6.4.0-150700.20.21.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-source-azure-6.4.0-150700.20.21.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-syms-azure-6.4.0-150700.20.21.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-syms-azure-6.4.0-150700.20.21.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-23T16:28:51Z",
"details": "moderate"
}
],
"title": "CVE-2025-37916"
},
{
"cve": "CVE-2025-38359",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-38359"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\ns390/mm: Fix in_atomic() handling in do_secure_storage_access()\n\nKernel user spaces accesses to not exported pages in atomic context\nincorrectly try to resolve the page fault.\nWith debug options enabled call traces like this can be seen:\n\nBUG: sleeping function called from invalid context at kernel/locking/rwsem.c:1523\nin_atomic(): 1, irqs_disabled(): 0, non_block: 0, pid: 419074, name: qemu-system-s39\npreempt_count: 1, expected: 0\nRCU nest depth: 0, expected: 0\nINFO: lockdep is turned off.\nPreemption disabled at:\n[\u003c00000383ea47cfa2\u003e] copy_page_from_iter_atomic+0xa2/0x8a0\nCPU: 12 UID: 0 PID: 419074 Comm: qemu-system-s39\nTainted: G W 6.16.0-20250531.rc0.git0.69b3a602feac.63.fc42.s390x+debug #1 PREEMPT\nTainted: [W]=WARN\nHardware name: IBM 3931 A01 703 (LPAR)\nCall Trace:\n [\u003c00000383e990d282\u003e] dump_stack_lvl+0xa2/0xe8\n [\u003c00000383e99bf152\u003e] __might_resched+0x292/0x2d0\n [\u003c00000383eaa7c374\u003e] down_read+0x34/0x2d0\n [\u003c00000383e99432f8\u003e] do_secure_storage_access+0x108/0x360\n [\u003c00000383eaa724b0\u003e] __do_pgm_check+0x130/0x220\n [\u003c00000383eaa842e4\u003e] pgm_check_handler+0x114/0x160\n [\u003c00000383ea47d028\u003e] copy_page_from_iter_atomic+0x128/0x8a0\n([\u003c00000383ea47d016\u003e] copy_page_from_iter_atomic+0x116/0x8a0)\n [\u003c00000383e9c45eae\u003e] generic_perform_write+0x16e/0x310\n [\u003c00000383e9eb87f4\u003e] ext4_buffered_write_iter+0x84/0x160\n [\u003c00000383e9da0de4\u003e] vfs_write+0x1c4/0x460\n [\u003c00000383e9da123c\u003e] ksys_write+0x7c/0x100\n [\u003c00000383eaa7284e\u003e] __do_syscall+0x15e/0x280\n [\u003c00000383eaa8417e\u003e] system_call+0x6e/0x90\nINFO: lockdep is turned off.\n\nIt is not allowed to take the mmap_lock while in atomic context. Therefore\nhandle such a secure storage access fault as if the accessed page is not\nmapped: the uaccess function will return -EFAULT, and the caller has to\ndeal with this. Usually this means that the access is retried in process\ncontext, which allows to resolve the page fault (or in this case export the\npage).",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.20.21.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.20.21.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.20.21.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.20.21.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-devel-azure-6.4.0-150700.20.21.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-source-azure-6.4.0-150700.20.21.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-syms-azure-6.4.0-150700.20.21.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-syms-azure-6.4.0-150700.20.21.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-38359",
"url": "https://www.suse.com/security/cve/CVE-2025-38359"
},
{
"category": "external",
"summary": "SUSE Bug 1247076 for CVE-2025-38359",
"url": "https://bugzilla.suse.com/1247076"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.20.21.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.20.21.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.20.21.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.20.21.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-devel-azure-6.4.0-150700.20.21.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-source-azure-6.4.0-150700.20.21.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-syms-azure-6.4.0-150700.20.21.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-syms-azure-6.4.0-150700.20.21.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.20.21.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.20.21.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.20.21.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.20.21.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-devel-azure-6.4.0-150700.20.21.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-source-azure-6.4.0-150700.20.21.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-syms-azure-6.4.0-150700.20.21.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-syms-azure-6.4.0-150700.20.21.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-23T16:28:51Z",
"details": "moderate"
}
],
"title": "CVE-2025-38359"
},
{
"cve": "CVE-2025-38360",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-38360"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\ndrm/amd/display: Add more checks for DSC / HUBP ONO guarantees\n\n[WHY]\nFor non-zero DSC instances it\u0027s possible that the HUBP domain required\nto drive it for sequential ONO ASICs isn\u0027t met, potentially causing\nthe logic to the tile to enter an undefined state leading to a system\nhang.\n\n[HOW]\nAdd more checks to ensure that the HUBP domain matching the DSC instance\nis appropriately powered.\n\n(cherry picked from commit da63df07112e5a9857a8d2aaa04255c4206754ec)",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.20.21.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.20.21.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.20.21.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.20.21.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-devel-azure-6.4.0-150700.20.21.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-source-azure-6.4.0-150700.20.21.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-syms-azure-6.4.0-150700.20.21.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-syms-azure-6.4.0-150700.20.21.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-38360",
"url": "https://www.suse.com/security/cve/CVE-2025-38360"
},
{
"category": "external",
"summary": "SUSE Bug 1247078 for CVE-2025-38360",
"url": "https://bugzilla.suse.com/1247078"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.20.21.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.20.21.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.20.21.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.20.21.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-devel-azure-6.4.0-150700.20.21.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-source-azure-6.4.0-150700.20.21.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-syms-azure-6.4.0-150700.20.21.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-syms-azure-6.4.0-150700.20.21.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.20.21.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.20.21.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.20.21.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.20.21.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-devel-azure-6.4.0-150700.20.21.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-source-azure-6.4.0-150700.20.21.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-syms-azure-6.4.0-150700.20.21.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-syms-azure-6.4.0-150700.20.21.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-23T16:28:51Z",
"details": "moderate"
}
],
"title": "CVE-2025-38360"
},
{
"cve": "CVE-2025-38361",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-38361"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\ndrm/amd/display: Check dce_hwseq before dereferencing it\n\n[WHAT]\n\nhws was checked for null earlier in dce110_blank_stream, indicating hws\ncan be null, and should be checked whenever it is used.\n\n(cherry picked from commit 79db43611ff61280b6de58ce1305e0b2ecf675ad)",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.20.21.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.20.21.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.20.21.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.20.21.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-devel-azure-6.4.0-150700.20.21.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-source-azure-6.4.0-150700.20.21.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-syms-azure-6.4.0-150700.20.21.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-syms-azure-6.4.0-150700.20.21.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-38361",
"url": "https://www.suse.com/security/cve/CVE-2025-38361"
},
{
"category": "external",
"summary": "SUSE Bug 1247079 for CVE-2025-38361",
"url": "https://bugzilla.suse.com/1247079"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.20.21.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.20.21.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.20.21.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.20.21.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-devel-azure-6.4.0-150700.20.21.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-source-azure-6.4.0-150700.20.21.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-syms-azure-6.4.0-150700.20.21.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-syms-azure-6.4.0-150700.20.21.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.20.21.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.20.21.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.20.21.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.20.21.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-devel-azure-6.4.0-150700.20.21.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-source-azure-6.4.0-150700.20.21.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-syms-azure-6.4.0-150700.20.21.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-syms-azure-6.4.0-150700.20.21.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-23T16:28:51Z",
"details": "moderate"
}
],
"title": "CVE-2025-38361"
},
{
"cve": "CVE-2025-39788",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-39788"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nscsi: ufs: exynos: Fix programming of HCI_UTRL_NEXUS_TYPE\n\nOn Google gs101, the number of UTP transfer request slots (nutrs) is 32,\nand in this case the driver ends up programming the UTRL_NEXUS_TYPE\nincorrectly as 0.\n\nThis is because the left hand side of the shift is 1, which is of type\nint, i.e. 31 bits wide. Shifting by more than that width results in\nundefined behaviour.\n\nFix this by switching to the BIT() macro, which applies correct type\ncasting as required. This ensures the correct value is written to\nUTRL_NEXUS_TYPE (0xffffffff on gs101), and it also fixes a UBSAN shift\nwarning:\n\n UBSAN: shift-out-of-bounds in drivers/ufs/host/ufs-exynos.c:1113:21\n shift exponent 32 is too large for 32-bit type \u0027int\u0027\n\nFor consistency, apply the same change to the nutmrs / UTMRL_NEXUS_TYPE\nwrite.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.20.21.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.20.21.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.20.21.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.20.21.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-devel-azure-6.4.0-150700.20.21.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-source-azure-6.4.0-150700.20.21.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-syms-azure-6.4.0-150700.20.21.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-syms-azure-6.4.0-150700.20.21.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-39788",
"url": "https://www.suse.com/security/cve/CVE-2025-39788"
},
{
"category": "external",
"summary": "SUSE Bug 1249547 for CVE-2025-39788",
"url": "https://bugzilla.suse.com/1249547"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.20.21.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.20.21.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.20.21.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.20.21.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-devel-azure-6.4.0-150700.20.21.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-source-azure-6.4.0-150700.20.21.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-syms-azure-6.4.0-150700.20.21.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-syms-azure-6.4.0-150700.20.21.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.20.21.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.20.21.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.20.21.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.20.21.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-devel-azure-6.4.0-150700.20.21.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-source-azure-6.4.0-150700.20.21.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-syms-azure-6.4.0-150700.20.21.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-syms-azure-6.4.0-150700.20.21.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-23T16:28:51Z",
"details": "moderate"
}
],
"title": "CVE-2025-39788"
},
{
"cve": "CVE-2025-39805",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-39805"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnet: macb: fix unregister_netdev call order in macb_remove()\n\nWhen removing a macb device, the driver calls phy_exit() before\nunregister_netdev(). This leads to a WARN from kernfs:\n\n ------------[ cut here ]------------\n kernfs: can not remove \u0027attached_dev\u0027, no directory\n WARNING: CPU: 1 PID: 27146 at fs/kernfs/dir.c:1683\n Call trace:\n kernfs_remove_by_name_ns+0xd8/0xf0\n sysfs_remove_link+0x24/0x58\n phy_detach+0x5c/0x168\n phy_disconnect+0x4c/0x70\n phylink_disconnect_phy+0x6c/0xc0 [phylink]\n macb_close+0x6c/0x170 [macb]\n ...\n macb_remove+0x60/0x168 [macb]\n platform_remove+0x5c/0x80\n ...\n\nThe warning happens because the PHY is being exited while the netdev\nis still registered. The correct order is to unregister the netdev\nbefore shutting down the PHY and cleaning up the MDIO bus.\n\nFix this by moving unregister_netdev() ahead of phy_exit() in\nmacb_remove().",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.20.21.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.20.21.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.20.21.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.20.21.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-devel-azure-6.4.0-150700.20.21.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-source-azure-6.4.0-150700.20.21.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-syms-azure-6.4.0-150700.20.21.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-syms-azure-6.4.0-150700.20.21.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-39805",
"url": "https://www.suse.com/security/cve/CVE-2025-39805"
},
{
"category": "external",
"summary": "SUSE Bug 1249982 for CVE-2025-39805",
"url": "https://bugzilla.suse.com/1249982"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.20.21.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.20.21.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.20.21.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.20.21.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-devel-azure-6.4.0-150700.20.21.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-source-azure-6.4.0-150700.20.21.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-syms-azure-6.4.0-150700.20.21.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-syms-azure-6.4.0-150700.20.21.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.20.21.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.20.21.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.20.21.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.20.21.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-devel-azure-6.4.0-150700.20.21.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-source-azure-6.4.0-150700.20.21.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-syms-azure-6.4.0-150700.20.21.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-syms-azure-6.4.0-150700.20.21.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-23T16:28:51Z",
"details": "moderate"
}
],
"title": "CVE-2025-39805"
},
{
"cve": "CVE-2025-39819",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-39819"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nfs/smb: Fix inconsistent refcnt update\n\nA possible inconsistent update of refcount was identified in `smb2_compound_op`.\nSuch inconsistent update could lead to possible resource leaks.\n\nWhy it is a possible bug:\n1. In the comment section of the function, it clearly states that the\nreference to `cfile` should be dropped after calling this function.\n2. Every control flow path would check and drop the reference to\n`cfile`, except the patched one.\n3. Existing callers would not handle refcount update of `cfile` if\n-ENOMEM is returned.\n\nTo fix the bug, an extra goto label \"out\" is added, to make sure that the\ncleanup logic would always be respected. As the problem is caused by the\nallocation failure of `vars`, the cleanup logic between label \"finished\"\nand \"out\" can be safely ignored. According to the definition of function\n`is_replayable_error`, the error code of \"-ENOMEM\" is not recoverable.\nTherefore, the replay logic also gets ignored.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.20.21.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.20.21.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.20.21.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.20.21.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-devel-azure-6.4.0-150700.20.21.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-source-azure-6.4.0-150700.20.21.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-syms-azure-6.4.0-150700.20.21.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-syms-azure-6.4.0-150700.20.21.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-39819",
"url": "https://www.suse.com/security/cve/CVE-2025-39819"
},
{
"category": "external",
"summary": "SUSE Bug 1250176 for CVE-2025-39819",
"url": "https://bugzilla.suse.com/1250176"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.20.21.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.20.21.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.20.21.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.20.21.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-devel-azure-6.4.0-150700.20.21.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-source-azure-6.4.0-150700.20.21.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-syms-azure-6.4.0-150700.20.21.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-syms-azure-6.4.0-150700.20.21.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.20.21.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.20.21.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.20.21.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.20.21.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-devel-azure-6.4.0-150700.20.21.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-source-azure-6.4.0-150700.20.21.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-syms-azure-6.4.0-150700.20.21.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-syms-azure-6.4.0-150700.20.21.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-23T16:28:51Z",
"details": "moderate"
}
],
"title": "CVE-2025-39819"
},
{
"cve": "CVE-2025-39822",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-39822"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nio_uring/kbuf: fix signedness in this_len calculation\n\nWhen importing and using buffers, buf-\u003elen is considered unsigned.\nHowever, buf-\u003elen is converted to signed int when committing. This can\nlead to unexpected behavior if the buffer is large enough to be\ninterpreted as a negative value. Make min_t calculation unsigned.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.20.21.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.20.21.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.20.21.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.20.21.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-devel-azure-6.4.0-150700.20.21.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-source-azure-6.4.0-150700.20.21.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-syms-azure-6.4.0-150700.20.21.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-syms-azure-6.4.0-150700.20.21.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-39822",
"url": "https://www.suse.com/security/cve/CVE-2025-39822"
},
{
"category": "external",
"summary": "SUSE Bug 1250034 for CVE-2025-39822",
"url": "https://bugzilla.suse.com/1250034"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.20.21.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.20.21.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.20.21.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.20.21.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-devel-azure-6.4.0-150700.20.21.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-source-azure-6.4.0-150700.20.21.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-syms-azure-6.4.0-150700.20.21.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-syms-azure-6.4.0-150700.20.21.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.20.21.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.20.21.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.20.21.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.20.21.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-devel-azure-6.4.0-150700.20.21.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-source-azure-6.4.0-150700.20.21.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-syms-azure-6.4.0-150700.20.21.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-syms-azure-6.4.0-150700.20.21.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-23T16:28:51Z",
"details": "moderate"
}
],
"title": "CVE-2025-39822"
},
{
"cve": "CVE-2025-39859",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-39859"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nptp: ocp: fix use-after-free bugs causing by ptp_ocp_watchdog\n\nThe ptp_ocp_detach() only shuts down the watchdog timer if it is\npending. However, if the timer handler is already running, the\ntimer_delete_sync() is not called. This leads to race conditions\nwhere the devlink that contains the ptp_ocp is deallocated while\nthe timer handler is still accessing it, resulting in use-after-free\nbugs. The following details one of the race scenarios.\n\n(thread 1) | (thread 2)\nptp_ocp_remove() |\n ptp_ocp_detach() | ptp_ocp_watchdog()\n if (timer_pending(\u0026bp-\u003ewatchdog))| bp = timer_container_of()\n timer_delete_sync() |\n |\n devlink_free(devlink) //free |\n | bp-\u003e //use\n\nResolve this by unconditionally calling timer_delete_sync() to ensure\nthe timer is reliably deactivated, preventing any access after free.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.20.21.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.20.21.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.20.21.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.20.21.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-devel-azure-6.4.0-150700.20.21.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-source-azure-6.4.0-150700.20.21.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-syms-azure-6.4.0-150700.20.21.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-syms-azure-6.4.0-150700.20.21.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-39859",
"url": "https://www.suse.com/security/cve/CVE-2025-39859"
},
{
"category": "external",
"summary": "SUSE Bug 1250252 for CVE-2025-39859",
"url": "https://bugzilla.suse.com/1250252"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.20.21.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.20.21.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.20.21.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.20.21.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-devel-azure-6.4.0-150700.20.21.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-source-azure-6.4.0-150700.20.21.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-syms-azure-6.4.0-150700.20.21.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-syms-azure-6.4.0-150700.20.21.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.20.21.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.20.21.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.20.21.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.20.21.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-devel-azure-6.4.0-150700.20.21.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-source-azure-6.4.0-150700.20.21.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-syms-azure-6.4.0-150700.20.21.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-syms-azure-6.4.0-150700.20.21.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-23T16:28:51Z",
"details": "moderate"
}
],
"title": "CVE-2025-39859"
},
{
"cve": "CVE-2025-39944",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-39944"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nocteontx2-pf: Fix use-after-free bugs in otx2_sync_tstamp()\n\nThe original code relies on cancel_delayed_work() in otx2_ptp_destroy(),\nwhich does not ensure that the delayed work item synctstamp_work has fully\ncompleted if it was already running. This leads to use-after-free scenarios\nwhere otx2_ptp is deallocated by otx2_ptp_destroy(), while synctstamp_work\nremains active and attempts to dereference otx2_ptp in otx2_sync_tstamp().\nFurthermore, the synctstamp_work is cyclic, the likelihood of triggering\nthe bug is nonnegligible.\n\nA typical race condition is illustrated below:\n\nCPU 0 (cleanup) | CPU 1 (delayed work callback)\notx2_remove() |\n otx2_ptp_destroy() | otx2_sync_tstamp()\n cancel_delayed_work() |\n kfree(ptp) |\n | ptp = container_of(...); //UAF\n | ptp-\u003e //UAF\n\nThis is confirmed by a KASAN report:\n\nBUG: KASAN: slab-use-after-free in __run_timer_base.part.0+0x7d7/0x8c0\nWrite of size 8 at addr ffff88800aa09a18 by task bash/136\n...\nCall Trace:\n \u003cIRQ\u003e\n dump_stack_lvl+0x55/0x70\n print_report+0xcf/0x610\n ? __run_timer_base.part.0+0x7d7/0x8c0\n kasan_report+0xb8/0xf0\n ? __run_timer_base.part.0+0x7d7/0x8c0\n __run_timer_base.part.0+0x7d7/0x8c0\n ? __pfx___run_timer_base.part.0+0x10/0x10\n ? __pfx_read_tsc+0x10/0x10\n ? ktime_get+0x60/0x140\n ? lapic_next_event+0x11/0x20\n ? clockevents_program_event+0x1d4/0x2a0\n run_timer_softirq+0xd1/0x190\n handle_softirqs+0x16a/0x550\n irq_exit_rcu+0xaf/0xe0\n sysvec_apic_timer_interrupt+0x70/0x80\n \u003c/IRQ\u003e\n...\nAllocated by task 1:\n kasan_save_stack+0x24/0x50\n kasan_save_track+0x14/0x30\n __kasan_kmalloc+0x7f/0x90\n otx2_ptp_init+0xb1/0x860\n otx2_probe+0x4eb/0xc30\n local_pci_probe+0xdc/0x190\n pci_device_probe+0x2fe/0x470\n really_probe+0x1ca/0x5c0\n __driver_probe_device+0x248/0x310\n driver_probe_device+0x44/0x120\n __driver_attach+0xd2/0x310\n bus_for_each_dev+0xed/0x170\n bus_add_driver+0x208/0x500\n driver_register+0x132/0x460\n do_one_initcall+0x89/0x300\n kernel_init_freeable+0x40d/0x720\n kernel_init+0x1a/0x150\n ret_from_fork+0x10c/0x1a0\n ret_from_fork_asm+0x1a/0x30\n\nFreed by task 136:\n kasan_save_stack+0x24/0x50\n kasan_save_track+0x14/0x30\n kasan_save_free_info+0x3a/0x60\n __kasan_slab_free+0x3f/0x50\n kfree+0x137/0x370\n otx2_ptp_destroy+0x38/0x80\n otx2_remove+0x10d/0x4c0\n pci_device_remove+0xa6/0x1d0\n device_release_driver_internal+0xf8/0x210\n pci_stop_bus_device+0x105/0x150\n pci_stop_and_remove_bus_device_locked+0x15/0x30\n remove_store+0xcc/0xe0\n kernfs_fop_write_iter+0x2c3/0x440\n vfs_write+0x871/0xd70\n ksys_write+0xee/0x1c0\n do_syscall_64+0xac/0x280\n entry_SYSCALL_64_after_hwframe+0x77/0x7f\n...\n\nReplace cancel_delayed_work() with cancel_delayed_work_sync() to ensure\nthat the delayed work item is properly canceled before the otx2_ptp is\ndeallocated.\n\nThis bug was initially identified through static analysis. To reproduce\nand test it, I simulated the OcteonTX2 PCI device in QEMU and introduced\nartificial delays within the otx2_sync_tstamp() function to increase the\nlikelihood of triggering the bug.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.20.21.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.20.21.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.20.21.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.20.21.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-devel-azure-6.4.0-150700.20.21.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-source-azure-6.4.0-150700.20.21.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-syms-azure-6.4.0-150700.20.21.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-syms-azure-6.4.0-150700.20.21.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-39944",
"url": "https://www.suse.com/security/cve/CVE-2025-39944"
},
{
"category": "external",
"summary": "SUSE Bug 1251120 for CVE-2025-39944",
"url": "https://bugzilla.suse.com/1251120"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.20.21.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.20.21.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.20.21.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.20.21.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-devel-azure-6.4.0-150700.20.21.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-source-azure-6.4.0-150700.20.21.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-syms-azure-6.4.0-150700.20.21.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-syms-azure-6.4.0-150700.20.21.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.20.21.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.20.21.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.20.21.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.20.21.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-devel-azure-6.4.0-150700.20.21.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-source-azure-6.4.0-150700.20.21.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-syms-azure-6.4.0-150700.20.21.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-syms-azure-6.4.0-150700.20.21.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-23T16:28:51Z",
"details": "moderate"
}
],
"title": "CVE-2025-39944"
},
{
"cve": "CVE-2025-39980",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-39980"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnexthop: Forbid FDB status change while nexthop is in a group\n\nThe kernel forbids the creation of non-FDB nexthop groups with FDB\nnexthops:\n\n # ip nexthop add id 1 via 192.0.2.1 fdb\n # ip nexthop add id 2 group 1\n Error: Non FDB nexthop group cannot have fdb nexthops.\n\nAnd vice versa:\n\n # ip nexthop add id 3 via 192.0.2.2 dev dummy1\n # ip nexthop add id 4 group 3 fdb\n Error: FDB nexthop group can only have fdb nexthops.\n\nHowever, as long as no routes are pointing to a non-FDB nexthop group,\nthe kernel allows changing the type of a nexthop from FDB to non-FDB and\nvice versa:\n\n # ip nexthop add id 5 via 192.0.2.2 dev dummy1\n # ip nexthop add id 6 group 5\n # ip nexthop replace id 5 via 192.0.2.2 fdb\n # echo $?\n 0\n\nThis configuration is invalid and can result in a NPD [1] since FDB\nnexthops are not associated with a nexthop device:\n\n # ip route add 198.51.100.1/32 nhid 6\n # ping 198.51.100.1\n\nFix by preventing nexthop FDB status change while the nexthop is in a\ngroup:\n\n # ip nexthop add id 7 via 192.0.2.2 dev dummy1\n # ip nexthop add id 8 group 7\n # ip nexthop replace id 7 via 192.0.2.2 fdb\n Error: Cannot change nexthop FDB status while in a group.\n\n[1]\nBUG: kernel NULL pointer dereference, address: 00000000000003c0\n[...]\nOops: Oops: 0000 [#1] SMP\nCPU: 6 UID: 0 PID: 367 Comm: ping Not tainted 6.17.0-rc6-virtme-gb65678cacc03 #1 PREEMPT(voluntary)\nHardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.17.0-4.fc41 04/01/2014\nRIP: 0010:fib_lookup_good_nhc+0x1e/0x80\n[...]\nCall Trace:\n \u003cTASK\u003e\n fib_table_lookup+0x541/0x650\n ip_route_output_key_hash_rcu+0x2ea/0x970\n ip_route_output_key_hash+0x55/0x80\n __ip4_datagram_connect+0x250/0x330\n udp_connect+0x2b/0x60\n __sys_connect+0x9c/0xd0\n __x64_sys_connect+0x18/0x20\n do_syscall_64+0xa4/0x2a0\n entry_SYSCALL_64_after_hwframe+0x4b/0x53",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.20.21.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.20.21.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.20.21.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.20.21.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-devel-azure-6.4.0-150700.20.21.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-source-azure-6.4.0-150700.20.21.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-syms-azure-6.4.0-150700.20.21.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-syms-azure-6.4.0-150700.20.21.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-39980",
"url": "https://www.suse.com/security/cve/CVE-2025-39980"
},
{
"category": "external",
"summary": "SUSE Bug 1252063 for CVE-2025-39980",
"url": "https://bugzilla.suse.com/1252063"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.20.21.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.20.21.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.20.21.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.20.21.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-devel-azure-6.4.0-150700.20.21.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-source-azure-6.4.0-150700.20.21.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-syms-azure-6.4.0-150700.20.21.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-syms-azure-6.4.0-150700.20.21.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.20.21.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.20.21.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.20.21.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.20.21.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-devel-azure-6.4.0-150700.20.21.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-source-azure-6.4.0-150700.20.21.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-syms-azure-6.4.0-150700.20.21.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-syms-azure-6.4.0-150700.20.21.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-23T16:28:51Z",
"details": "moderate"
}
],
"title": "CVE-2025-39980"
},
{
"cve": "CVE-2025-40001",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40001"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nscsi: mvsas: Fix use-after-free bugs in mvs_work_queue\n\nDuring the detaching of Marvell\u0027s SAS/SATA controller, the original code\ncalls cancel_delayed_work() in mvs_free() to cancel the delayed work\nitem mwq-\u003ework_q. However, if mwq-\u003ework_q is already running, the\ncancel_delayed_work() may fail to cancel it. This can lead to\nuse-after-free scenarios where mvs_free() frees the mvs_info while\nmvs_work_queue() is still executing and attempts to access the\nalready-freed mvs_info.\n\nA typical race condition is illustrated below:\n\nCPU 0 (remove) | CPU 1 (delayed work callback)\nmvs_pci_remove() |\n mvs_free() | mvs_work_queue()\n cancel_delayed_work() |\n kfree(mvi) |\n | mvi-\u003e // UAF\n\nReplace cancel_delayed_work() with cancel_delayed_work_sync() to ensure\nthat the delayed work item is properly canceled and any executing\ndelayed work item completes before the mvs_info is deallocated.\n\nThis bug was found by static analysis.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.20.21.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.20.21.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.20.21.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.20.21.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-devel-azure-6.4.0-150700.20.21.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-source-azure-6.4.0-150700.20.21.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-syms-azure-6.4.0-150700.20.21.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-syms-azure-6.4.0-150700.20.21.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40001",
"url": "https://www.suse.com/security/cve/CVE-2025-40001"
},
{
"category": "external",
"summary": "SUSE Bug 1252303 for CVE-2025-40001",
"url": "https://bugzilla.suse.com/1252303"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.20.21.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.20.21.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.20.21.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.20.21.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-devel-azure-6.4.0-150700.20.21.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-source-azure-6.4.0-150700.20.21.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-syms-azure-6.4.0-150700.20.21.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-syms-azure-6.4.0-150700.20.21.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.8,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.20.21.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.20.21.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.20.21.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.20.21.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-devel-azure-6.4.0-150700.20.21.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-source-azure-6.4.0-150700.20.21.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-syms-azure-6.4.0-150700.20.21.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-syms-azure-6.4.0-150700.20.21.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-23T16:28:51Z",
"details": "moderate"
}
],
"title": "CVE-2025-40001"
},
{
"cve": "CVE-2025-40021",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40021"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\ntracing: dynevent: Add a missing lockdown check on dynevent\n\nSince dynamic_events interface on tracefs is compatible with\nkprobe_events and uprobe_events, it should also check the lockdown\nstatus and reject if it is set.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.20.21.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.20.21.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.20.21.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.20.21.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-devel-azure-6.4.0-150700.20.21.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-source-azure-6.4.0-150700.20.21.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-syms-azure-6.4.0-150700.20.21.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-syms-azure-6.4.0-150700.20.21.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40021",
"url": "https://www.suse.com/security/cve/CVE-2025-40021"
},
{
"category": "external",
"summary": "SUSE Bug 1252681 for CVE-2025-40021",
"url": "https://bugzilla.suse.com/1252681"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.20.21.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.20.21.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.20.21.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.20.21.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-devel-azure-6.4.0-150700.20.21.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-source-azure-6.4.0-150700.20.21.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-syms-azure-6.4.0-150700.20.21.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-syms-azure-6.4.0-150700.20.21.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.20.21.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.20.21.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.20.21.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.20.21.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-devel-azure-6.4.0-150700.20.21.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-source-azure-6.4.0-150700.20.21.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-syms-azure-6.4.0-150700.20.21.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-syms-azure-6.4.0-150700.20.21.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-23T16:28:51Z",
"details": "moderate"
}
],
"title": "CVE-2025-40021"
},
{
"cve": "CVE-2025-40027",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40027"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnet/9p: fix double req put in p9_fd_cancelled\n\nSyzkaller reports a KASAN issue as below:\n\ngeneral protection fault, probably for non-canonical address 0xfbd59c0000000021: 0000 [#1] PREEMPT SMP KASAN NOPTI\nKASAN: maybe wild-memory-access in range [0xdead000000000108-0xdead00000000010f]\nCPU: 0 PID: 5083 Comm: syz-executor.2 Not tainted 6.1.134-syzkaller-00037-g855bd1d7d838 #0\nHardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014\nRIP: 0010:__list_del include/linux/list.h:114 [inline]\nRIP: 0010:__list_del_entry include/linux/list.h:137 [inline]\nRIP: 0010:list_del include/linux/list.h:148 [inline]\nRIP: 0010:p9_fd_cancelled+0xe9/0x200 net/9p/trans_fd.c:734\n\nCall Trace:\n \u003cTASK\u003e\n p9_client_flush+0x351/0x440 net/9p/client.c:614\n p9_client_rpc+0xb6b/0xc70 net/9p/client.c:734\n p9_client_version net/9p/client.c:920 [inline]\n p9_client_create+0xb51/0x1240 net/9p/client.c:1027\n v9fs_session_init+0x1f0/0x18f0 fs/9p/v9fs.c:408\n v9fs_mount+0xba/0xcb0 fs/9p/vfs_super.c:126\n legacy_get_tree+0x108/0x220 fs/fs_context.c:632\n vfs_get_tree+0x8e/0x300 fs/super.c:1573\n do_new_mount fs/namespace.c:3056 [inline]\n path_mount+0x6a6/0x1e90 fs/namespace.c:3386\n do_mount fs/namespace.c:3399 [inline]\n __do_sys_mount fs/namespace.c:3607 [inline]\n __se_sys_mount fs/namespace.c:3584 [inline]\n __x64_sys_mount+0x283/0x300 fs/namespace.c:3584\n do_syscall_x64 arch/x86/entry/common.c:51 [inline]\n do_syscall_64+0x35/0x80 arch/x86/entry/common.c:81\n entry_SYSCALL_64_after_hwframe+0x6e/0xd8\n\nThis happens because of a race condition between:\n\n- The 9p client sending an invalid flush request and later cleaning it up;\n- The 9p client in p9_read_work() canceled all pending requests.\n\n Thread 1 Thread 2\n ...\n p9_client_create()\n ...\n p9_fd_create()\n ...\n p9_conn_create()\n ...\n // start Thread 2\n INIT_WORK(\u0026m-\u003erq, p9_read_work);\n p9_read_work()\n ...\n p9_client_rpc()\n ...\n ...\n p9_conn_cancel()\n ...\n spin_lock(\u0026m-\u003ereq_lock);\n ...\n p9_fd_cancelled()\n ...\n ...\n spin_unlock(\u0026m-\u003ereq_lock);\n // status rewrite\n p9_client_cb(m-\u003eclient, req, REQ_STATUS_ERROR)\n // first remove\n list_del(\u0026req-\u003ereq_list);\n ...\n\n spin_lock(\u0026m-\u003ereq_lock)\n ...\n // second remove\n list_del(\u0026req-\u003ereq_list);\n spin_unlock(\u0026m-\u003ereq_lock)\n ...\n\nCommit 74d6a5d56629 (\"9p/trans_fd: Fix concurrency del of req_list in\np9_fd_cancelled/p9_read_work\") fixes a concurrency issue in the 9p filesystem\nclient where the req_list could be deleted simultaneously by both\np9_read_work and p9_fd_cancelled functions, but for the case where req-\u003estatus\nequals REQ_STATUS_RCVD.\n\nUpdate the check for req-\u003estatus in p9_fd_cancelled to skip processing not\njust received requests, but anything that is not SENT, as whatever\nchanged the state from SENT also removed the request from its list.\n\nFound by Linux Verification Center (linuxtesting.org) with Syzkaller.\n\n[updated the check from status == RECV || status == ERROR to status != SENT]",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.20.21.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.20.21.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.20.21.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.20.21.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-devel-azure-6.4.0-150700.20.21.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-source-azure-6.4.0-150700.20.21.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-syms-azure-6.4.0-150700.20.21.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-syms-azure-6.4.0-150700.20.21.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40027",
"url": "https://www.suse.com/security/cve/CVE-2025-40027"
},
{
"category": "external",
"summary": "SUSE Bug 1252763 for CVE-2025-40027",
"url": "https://bugzilla.suse.com/1252763"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.20.21.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.20.21.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.20.21.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.20.21.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-devel-azure-6.4.0-150700.20.21.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-source-azure-6.4.0-150700.20.21.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-syms-azure-6.4.0-150700.20.21.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-syms-azure-6.4.0-150700.20.21.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.20.21.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.20.21.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.20.21.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.20.21.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-devel-azure-6.4.0-150700.20.21.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-source-azure-6.4.0-150700.20.21.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-syms-azure-6.4.0-150700.20.21.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-syms-azure-6.4.0-150700.20.21.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-23T16:28:51Z",
"details": "moderate"
}
],
"title": "CVE-2025-40027"
},
{
"cve": "CVE-2025-40030",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40030"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\npinctrl: check the return value of pinmux_ops::get_function_name()\n\nWhile the API contract in docs doesn\u0027t specify it explicitly, the\ngeneric implementation of the get_function_name() callback from struct\npinmux_ops - pinmux_generic_get_function_name() - can fail and return\nNULL. This is already checked in pinmux_check_ops() so add a similar\ncheck in pinmux_func_name_to_selector() instead of passing the returned\npointer right down to strcmp() where the NULL can get dereferenced. This\nis normal operation when adding new pinfunctions.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.20.21.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.20.21.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.20.21.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.20.21.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-devel-azure-6.4.0-150700.20.21.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-source-azure-6.4.0-150700.20.21.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-syms-azure-6.4.0-150700.20.21.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-syms-azure-6.4.0-150700.20.21.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40030",
"url": "https://www.suse.com/security/cve/CVE-2025-40030"
},
{
"category": "external",
"summary": "SUSE Bug 1252773 for CVE-2025-40030",
"url": "https://bugzilla.suse.com/1252773"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.20.21.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.20.21.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.20.21.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.20.21.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-devel-azure-6.4.0-150700.20.21.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-source-azure-6.4.0-150700.20.21.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-syms-azure-6.4.0-150700.20.21.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-syms-azure-6.4.0-150700.20.21.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.20.21.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.20.21.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.20.21.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.20.21.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-devel-azure-6.4.0-150700.20.21.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-source-azure-6.4.0-150700.20.21.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-syms-azure-6.4.0-150700.20.21.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-syms-azure-6.4.0-150700.20.21.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-23T16:28:51Z",
"details": "moderate"
}
],
"title": "CVE-2025-40030"
},
{
"cve": "CVE-2025-40038",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40038"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nKVM: SVM: Skip fastpath emulation on VM-Exit if next RIP isn\u0027t valid\n\nSkip the WRMSR and HLT fastpaths in SVM\u0027s VM-Exit handler if the next RIP\nisn\u0027t valid, e.g. because KVM is running with nrips=false. SVM must\ndecode and emulate to skip the instruction if the CPU doesn\u0027t provide the\nnext RIP, and getting the instruction bytes to decode requires reading\nguest memory. Reading guest memory through the emulator can fault, i.e.\ncan sleep, which is disallowed since the fastpath handlers run with IRQs\ndisabled.\n\n BUG: sleeping function called from invalid context at ./include/linux/uaccess.h:106\n in_atomic(): 1, irqs_disabled(): 1, non_block: 0, pid: 32611, name: qemu\n preempt_count: 1, expected: 0\n INFO: lockdep is turned off.\n irq event stamp: 30580\n hardirqs last enabled at (30579): [\u003cffffffffc08b2527\u003e] vcpu_run+0x1787/0x1db0 [kvm]\n hardirqs last disabled at (30580): [\u003cffffffffb4f62e32\u003e] __schedule+0x1e2/0xed0\n softirqs last enabled at (30570): [\u003cffffffffb4247a64\u003e] fpu_swap_kvm_fpstate+0x44/0x210\n softirqs last disabled at (30568): [\u003cffffffffb4247a64\u003e] fpu_swap_kvm_fpstate+0x44/0x210\n CPU: 298 UID: 0 PID: 32611 Comm: qemu Tainted: G U 6.16.0-smp--e6c618b51cfe-sleep #782 NONE\n Tainted: [U]=USER\n Hardware name: Google Astoria-Turin/astoria, BIOS 0.20241223.2-0 01/17/2025\n Call Trace:\n \u003cTASK\u003e\n dump_stack_lvl+0x7d/0xb0\n __might_resched+0x271/0x290\n __might_fault+0x28/0x80\n kvm_vcpu_read_guest_page+0x8d/0xc0 [kvm]\n kvm_fetch_guest_virt+0x92/0xc0 [kvm]\n __do_insn_fetch_bytes+0xf3/0x1e0 [kvm]\n x86_decode_insn+0xd1/0x1010 [kvm]\n x86_emulate_instruction+0x105/0x810 [kvm]\n __svm_skip_emulated_instruction+0xc4/0x140 [kvm_amd]\n handle_fastpath_invd+0xc4/0x1a0 [kvm]\n vcpu_run+0x11a1/0x1db0 [kvm]\n kvm_arch_vcpu_ioctl_run+0x5cc/0x730 [kvm]\n kvm_vcpu_ioctl+0x578/0x6a0 [kvm]\n __se_sys_ioctl+0x6d/0xb0\n do_syscall_64+0x8a/0x2c0\n entry_SYSCALL_64_after_hwframe+0x4b/0x53\n RIP: 0033:0x7f479d57a94b\n \u003c/TASK\u003e\n\nNote, this is essentially a reapply of commit 5c30e8101e8d (\"KVM: SVM:\nSkip WRMSR fastpath on VM-Exit if next RIP isn\u0027t valid\"), but with\ndifferent justification (KVM now grabs SRCU when skipping the instruction\nfor other reasons).",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.20.21.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.20.21.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.20.21.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.20.21.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-devel-azure-6.4.0-150700.20.21.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-source-azure-6.4.0-150700.20.21.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-syms-azure-6.4.0-150700.20.21.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-syms-azure-6.4.0-150700.20.21.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40038",
"url": "https://www.suse.com/security/cve/CVE-2025-40038"
},
{
"category": "external",
"summary": "SUSE Bug 1252817 for CVE-2025-40038",
"url": "https://bugzilla.suse.com/1252817"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.20.21.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.20.21.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.20.21.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.20.21.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-devel-azure-6.4.0-150700.20.21.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-source-azure-6.4.0-150700.20.21.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-syms-azure-6.4.0-150700.20.21.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-syms-azure-6.4.0-150700.20.21.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.20.21.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.20.21.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.20.21.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.20.21.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-devel-azure-6.4.0-150700.20.21.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-source-azure-6.4.0-150700.20.21.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-syms-azure-6.4.0-150700.20.21.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-syms-azure-6.4.0-150700.20.21.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-23T16:28:51Z",
"details": "moderate"
}
],
"title": "CVE-2025-40038"
},
{
"cve": "CVE-2025-40040",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40040"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nmm/ksm: fix flag-dropping behavior in ksm_madvise\n\nsyzkaller discovered the following crash: (kernel BUG)\n\n[ 44.607039] ------------[ cut here ]------------\n[ 44.607422] kernel BUG at mm/userfaultfd.c:2067!\n[ 44.608148] Oops: invalid opcode: 0000 [#1] SMP DEBUG_PAGEALLOC KASAN NOPTI\n[ 44.608814] CPU: 1 UID: 0 PID: 2475 Comm: reproducer Not tainted 6.16.0-rc6 #1 PREEMPT(none)\n[ 44.609635] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.16.3-0-ga6ed6b701f0a-prebuilt.qemu.org 04/01/2014\n[ 44.610695] RIP: 0010:userfaultfd_release_all+0x3a8/0x460\n\n\u003csnip other registers, drop unreliable trace\u003e\n\n[ 44.617726] Call Trace:\n[ 44.617926] \u003cTASK\u003e\n[ 44.619284] userfaultfd_release+0xef/0x1b0\n[ 44.620976] __fput+0x3f9/0xb60\n[ 44.621240] fput_close_sync+0x110/0x210\n[ 44.622222] __x64_sys_close+0x8f/0x120\n[ 44.622530] do_syscall_64+0x5b/0x2f0\n[ 44.622840] entry_SYSCALL_64_after_hwframe+0x76/0x7e\n[ 44.623244] RIP: 0033:0x7f365bb3f227\n\nKernel panics because it detects UFFD inconsistency during\nuserfaultfd_release_all(). Specifically, a VMA which has a valid pointer\nto vma-\u003evm_userfaultfd_ctx, but no UFFD flags in vma-\u003evm_flags.\n\nThe inconsistency is caused in ksm_madvise(): when user calls madvise()\nwith MADV_UNMEARGEABLE on a VMA that is registered for UFFD in MINOR mode,\nit accidentally clears all flags stored in the upper 32 bits of\nvma-\u003evm_flags.\n\nAssuming x86_64 kernel build, unsigned long is 64-bit and unsigned int and\nint are 32-bit wide. This setup causes the following mishap during the \u0026=\n~VM_MERGEABLE assignment.\n\nVM_MERGEABLE is a 32-bit constant of type unsigned int, 0x8000\u00270000. \nAfter ~ is applied, it becomes 0x7fff\u0027ffff unsigned int, which is then\npromoted to unsigned long before the \u0026 operation. This promotion fills\nupper 32 bits with leading 0s, as we\u0027re doing unsigned conversion (and\neven for a signed conversion, this wouldn\u0027t help as the leading bit is 0).\n\u0026 operation thus ends up AND-ing vm_flags with 0x0000\u00270000\u00277fff\u0027ffff\ninstead of intended 0xffff\u0027ffff\u00277fff\u0027ffff and hence accidentally clears\nthe upper 32-bits of its value.\n\nFix it by changing `VM_MERGEABLE` constant to unsigned long, using the\nBIT() macro.\n\nNote: other VM_* flags are not affected: This only happens to the\nVM_MERGEABLE flag, as the other VM_* flags are all constants of type int\nand after ~ operation, they end up with leading 1 and are thus converted\nto unsigned long with leading 1s.\n\nNote 2:\nAfter commit 31defc3b01d9 (\"userfaultfd: remove (VM_)BUG_ON()s\"), this is\nno longer a kernel BUG, but a WARNING at the same place:\n\n[ 45.595973] WARNING: CPU: 1 PID: 2474 at mm/userfaultfd.c:2067\n\nbut the root-cause (flag-drop) remains the same.\n\n[akpm@linux-foundation.org: rust bindgen wasn\u0027t able to handle BIT(), from Miguel]",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.20.21.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.20.21.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.20.21.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.20.21.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-devel-azure-6.4.0-150700.20.21.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-source-azure-6.4.0-150700.20.21.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-syms-azure-6.4.0-150700.20.21.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-syms-azure-6.4.0-150700.20.21.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40040",
"url": "https://www.suse.com/security/cve/CVE-2025-40040"
},
{
"category": "external",
"summary": "SUSE Bug 1252780 for CVE-2025-40040",
"url": "https://bugzilla.suse.com/1252780"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.20.21.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.20.21.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.20.21.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.20.21.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-devel-azure-6.4.0-150700.20.21.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-source-azure-6.4.0-150700.20.21.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-syms-azure-6.4.0-150700.20.21.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-syms-azure-6.4.0-150700.20.21.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.20.21.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.20.21.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.20.21.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.20.21.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-devel-azure-6.4.0-150700.20.21.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-source-azure-6.4.0-150700.20.21.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-syms-azure-6.4.0-150700.20.21.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-syms-azure-6.4.0-150700.20.21.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-23T16:28:51Z",
"details": "moderate"
}
],
"title": "CVE-2025-40040"
},
{
"cve": "CVE-2025-40047",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40047"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nio_uring/waitid: always prune wait queue entry in io_waitid_wait()\n\nFor a successful return, always remove our entry from the wait queue\nentry list. Previously this was skipped if a cancelation was in\nprogress, but this can race with another invocation of the wait queue\nentry callback.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.20.21.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.20.21.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.20.21.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.20.21.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-devel-azure-6.4.0-150700.20.21.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-source-azure-6.4.0-150700.20.21.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-syms-azure-6.4.0-150700.20.21.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-syms-azure-6.4.0-150700.20.21.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40047",
"url": "https://www.suse.com/security/cve/CVE-2025-40047"
},
{
"category": "external",
"summary": "SUSE Bug 1252790 for CVE-2025-40047",
"url": "https://bugzilla.suse.com/1252790"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.20.21.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.20.21.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.20.21.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.20.21.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-devel-azure-6.4.0-150700.20.21.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-source-azure-6.4.0-150700.20.21.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-syms-azure-6.4.0-150700.20.21.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-syms-azure-6.4.0-150700.20.21.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.7,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.20.21.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.20.21.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.20.21.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.20.21.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-devel-azure-6.4.0-150700.20.21.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-source-azure-6.4.0-150700.20.21.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-syms-azure-6.4.0-150700.20.21.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-syms-azure-6.4.0-150700.20.21.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-23T16:28:51Z",
"details": "moderate"
}
],
"title": "CVE-2025-40047"
},
{
"cve": "CVE-2025-40048",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40048"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nuio_hv_generic: Let userspace take care of interrupt mask\n\nRemove the logic to set interrupt mask by default in uio_hv_generic\ndriver as the interrupt mask value is supposed to be controlled\ncompletely by the user space. If the mask bit gets changed\nby the driver, concurrently with user mode operating on the ring,\nthe mask bit may be set when it is supposed to be clear, and the\nuser-mode driver will miss an interrupt which will cause a hang.\n\nFor eg- when the driver sets inbound ring buffer interrupt mask to 1,\nthe host does not interrupt the guest on the UIO VMBus channel.\nHowever, setting the mask does not prevent the host from putting a\nmessage in the inbound ring buffer. So let\u0027s assume that happens,\nthe host puts a message into the ring buffer but does not interrupt.\n\nSubsequently, the user space code in the guest sets the inbound ring\nbuffer interrupt mask to 0, saying \"Hey, I\u0027m ready for interrupts\".\nUser space code then calls pread() to wait for an interrupt.\nThen one of two things happens:\n\n* The host never sends another message. So the pread() waits forever.\n* The host does send another message. But because there\u0027s already a\n message in the ring buffer, it doesn\u0027t generate an interrupt.\n This is the correct behavior, because the host should only send an\n interrupt when the inbound ring buffer transitions from empty to\n not-empty. Adding an additional message to a ring buffer that is not\n empty is not supposed to generate an interrupt on the guest.\n Since the guest is waiting in pread() and not removing messages from\n the ring buffer, the pread() waits forever.\n\nThis could be easily reproduced in hv_fcopy_uio_daemon if we delay\nsetting interrupt mask to 0.\n\nSimilarly if hv_uio_channel_cb() sets the interrupt_mask to 1,\nthere\u0027s a race condition. Once user space empties the inbound ring\nbuffer, but before user space sets interrupt_mask to 0, the host could\nput another message in the ring buffer but it wouldn\u0027t interrupt.\nThen the next pread() would hang.\n\nFix these by removing all instances where interrupt_mask is changed,\nwhile keeping the one in set_event() unchanged to enable userspace\ncontrol the interrupt mask by writing 0/1 to /dev/uioX.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.20.21.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.20.21.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.20.21.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.20.21.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-devel-azure-6.4.0-150700.20.21.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-source-azure-6.4.0-150700.20.21.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-syms-azure-6.4.0-150700.20.21.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-syms-azure-6.4.0-150700.20.21.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40048",
"url": "https://www.suse.com/security/cve/CVE-2025-40048"
},
{
"category": "external",
"summary": "SUSE Bug 1252862 for CVE-2025-40048",
"url": "https://bugzilla.suse.com/1252862"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.20.21.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.20.21.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.20.21.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.20.21.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-devel-azure-6.4.0-150700.20.21.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-source-azure-6.4.0-150700.20.21.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-syms-azure-6.4.0-150700.20.21.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-syms-azure-6.4.0-150700.20.21.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.20.21.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.20.21.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.20.21.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.20.21.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-devel-azure-6.4.0-150700.20.21.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-source-azure-6.4.0-150700.20.21.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-syms-azure-6.4.0-150700.20.21.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-syms-azure-6.4.0-150700.20.21.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-23T16:28:51Z",
"details": "moderate"
}
],
"title": "CVE-2025-40048"
},
{
"cve": "CVE-2025-40055",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40055"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nocfs2: fix double free in user_cluster_connect()\n\nuser_cluster_disconnect() frees \"conn-\u003ecc_private\" which is \"lc\" but then\nthe error handling frees \"lc\" a second time. Set \"lc\" to NULL on this\npath to avoid a double free.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.20.21.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.20.21.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.20.21.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.20.21.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-devel-azure-6.4.0-150700.20.21.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-source-azure-6.4.0-150700.20.21.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-syms-azure-6.4.0-150700.20.21.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-syms-azure-6.4.0-150700.20.21.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40055",
"url": "https://www.suse.com/security/cve/CVE-2025-40055"
},
{
"category": "external",
"summary": "SUSE Bug 1252821 for CVE-2025-40055",
"url": "https://bugzilla.suse.com/1252821"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.20.21.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.20.21.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.20.21.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.20.21.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-devel-azure-6.4.0-150700.20.21.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-source-azure-6.4.0-150700.20.21.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-syms-azure-6.4.0-150700.20.21.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-syms-azure-6.4.0-150700.20.21.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.20.21.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.20.21.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.20.21.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.20.21.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-devel-azure-6.4.0-150700.20.21.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-source-azure-6.4.0-150700.20.21.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-syms-azure-6.4.0-150700.20.21.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-syms-azure-6.4.0-150700.20.21.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-23T16:28:51Z",
"details": "moderate"
}
],
"title": "CVE-2025-40055"
},
{
"cve": "CVE-2025-40059",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40059"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\ncoresight: Fix incorrect handling for return value of devm_kzalloc\n\nThe return value of devm_kzalloc could be an null pointer,\nuse \"!desc.pdata\" to fix incorrect handling return value\nof devm_kzalloc.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.20.21.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.20.21.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.20.21.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.20.21.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-devel-azure-6.4.0-150700.20.21.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-source-azure-6.4.0-150700.20.21.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-syms-azure-6.4.0-150700.20.21.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-syms-azure-6.4.0-150700.20.21.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40059",
"url": "https://www.suse.com/security/cve/CVE-2025-40059"
},
{
"category": "external",
"summary": "SUSE Bug 1252809 for CVE-2025-40059",
"url": "https://bugzilla.suse.com/1252809"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.20.21.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.20.21.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.20.21.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.20.21.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-devel-azure-6.4.0-150700.20.21.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-source-azure-6.4.0-150700.20.21.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-syms-azure-6.4.0-150700.20.21.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-syms-azure-6.4.0-150700.20.21.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.20.21.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.20.21.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.20.21.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.20.21.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-devel-azure-6.4.0-150700.20.21.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-source-azure-6.4.0-150700.20.21.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-syms-azure-6.4.0-150700.20.21.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-syms-azure-6.4.0-150700.20.21.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-23T16:28:51Z",
"details": "moderate"
}
],
"title": "CVE-2025-40059"
},
{
"cve": "CVE-2025-40064",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40064"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nsmc: Fix use-after-free in __pnet_find_base_ndev().\n\nsyzbot reported use-after-free of net_device in __pnet_find_base_ndev(),\nwhich was called during connect(). [0]\n\nsmc_pnet_find_ism_resource() fetches sk_dst_get(sk)-\u003edev and passes\ndown to pnet_find_base_ndev(), where RTNL is held. Then, UAF happened\nat __pnet_find_base_ndev() when the dev is first used.\n\nThis means dev had already been freed before acquiring RTNL in\npnet_find_base_ndev().\n\nWhile dev is going away, dst-\u003edev could be swapped with blackhole_netdev,\nand the dev\u0027s refcnt by dst will be released.\n\nWe must hold dev\u0027s refcnt before calling smc_pnet_find_ism_resource().\n\nAlso, smc_pnet_find_roce_resource() has the same problem.\n\nLet\u0027s use __sk_dst_get() and dst_dev_rcu() in the two functions.\n\n[0]:\nBUG: KASAN: use-after-free in __pnet_find_base_ndev+0x1b1/0x1c0 net/smc/smc_pnet.c:926\nRead of size 1 at addr ffff888036bac33a by task syz.0.3632/18609\n\nCPU: 1 UID: 0 PID: 18609 Comm: syz.0.3632 Not tainted syzkaller #0 PREEMPT(full)\nHardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/18/2025\nCall Trace:\n \u003cTASK\u003e\n dump_stack_lvl+0x189/0x250 lib/dump_stack.c:120\n print_address_description mm/kasan/report.c:378 [inline]\n print_report+0xca/0x240 mm/kasan/report.c:482\n kasan_report+0x118/0x150 mm/kasan/report.c:595\n __pnet_find_base_ndev+0x1b1/0x1c0 net/smc/smc_pnet.c:926\n pnet_find_base_ndev net/smc/smc_pnet.c:946 [inline]\n smc_pnet_find_ism_by_pnetid net/smc/smc_pnet.c:1103 [inline]\n smc_pnet_find_ism_resource+0xef/0x390 net/smc/smc_pnet.c:1154\n smc_find_ism_device net/smc/af_smc.c:1030 [inline]\n smc_find_proposal_devices net/smc/af_smc.c:1115 [inline]\n __smc_connect+0x372/0x1890 net/smc/af_smc.c:1545\n smc_connect+0x877/0xd90 net/smc/af_smc.c:1715\n __sys_connect_file net/socket.c:2086 [inline]\n __sys_connect+0x313/0x440 net/socket.c:2105\n __do_sys_connect net/socket.c:2111 [inline]\n __se_sys_connect net/socket.c:2108 [inline]\n __x64_sys_connect+0x7a/0x90 net/socket.c:2108\n do_syscall_x64 arch/x86/entry/syscall_64.c:63 [inline]\n do_syscall_64+0xfa/0x3b0 arch/x86/entry/syscall_64.c:94\n entry_SYSCALL_64_after_hwframe+0x77/0x7f\nRIP: 0033:0x7f47cbf8eba9\nCode: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 \u003c48\u003e 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48\nRSP: 002b:00007f47ccdb1038 EFLAGS: 00000246 ORIG_RAX: 000000000000002a\nRAX: ffffffffffffffda RBX: 00007f47cc1d5fa0 RCX: 00007f47cbf8eba9\nRDX: 0000000000000010 RSI: 0000200000000280 RDI: 000000000000000b\nRBP: 00007f47cc011e19 R08: 0000000000000000 R09: 0000000000000000\nR10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000\nR13: 00007f47cc1d6038 R14: 00007f47cc1d5fa0 R15: 00007ffc512f8aa8\n \u003c/TASK\u003e\n\nThe buggy address belongs to the physical page:\npage: refcount:0 mapcount:0 mapping:0000000000000000 index:0xffff888036bacd00 pfn:0x36bac\nflags: 0xfff00000000000(node=0|zone=1|lastcpupid=0x7ff)\nraw: 00fff00000000000 ffffea0001243d08 ffff8880b863fdc0 0000000000000000\nraw: ffff888036bacd00 0000000000000000 00000000ffffffff 0000000000000000\npage dumped because: kasan: bad access detected\npage_owner tracks the page as freed\npage last allocated via order 2, migratetype Unmovable, gfp_mask 0x446dc0(GFP_KERNEL_ACCOUNT|__GFP_ZERO|__GFP_NOWARN|__GFP_RETRY_MAYFAIL|__GFP_COMP), pid 16741, tgid 16741 (syz-executor), ts 343313197788, free_ts 380670750466\n set_page_owner include/linux/page_owner.h:32 [inline]\n post_alloc_hook+0x240/0x2a0 mm/page_alloc.c:1851\n prep_new_page mm/page_alloc.c:1859 [inline]\n get_page_from_freelist+0x21e4/0x22c0 mm/page_alloc.c:3858\n __alloc_frozen_pages_noprof+0x181/0x370 mm/page_alloc.c:5148\n alloc_pages_mpol+0x232/0x4a0 mm/mempolicy.c:2416\n ___kmalloc_large_node+0x5f/0x1b0 mm/slub.c:4317\n __kmalloc_large_node_noprof+0x18/0x90 mm/slub.c:4348\n __do_kmalloc_node mm/slub.c:4364 [inline]\n __kvmalloc_node\n---truncated---",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.20.21.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.20.21.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.20.21.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.20.21.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-devel-azure-6.4.0-150700.20.21.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-source-azure-6.4.0-150700.20.21.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-syms-azure-6.4.0-150700.20.21.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-syms-azure-6.4.0-150700.20.21.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40064",
"url": "https://www.suse.com/security/cve/CVE-2025-40064"
},
{
"category": "external",
"summary": "SUSE Bug 1252845 for CVE-2025-40064",
"url": "https://bugzilla.suse.com/1252845"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.20.21.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.20.21.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.20.21.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.20.21.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-devel-azure-6.4.0-150700.20.21.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-source-azure-6.4.0-150700.20.21.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-syms-azure-6.4.0-150700.20.21.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-syms-azure-6.4.0-150700.20.21.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.20.21.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.20.21.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.20.21.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.20.21.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-devel-azure-6.4.0-150700.20.21.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-source-azure-6.4.0-150700.20.21.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-syms-azure-6.4.0-150700.20.21.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-syms-azure-6.4.0-150700.20.21.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-23T16:28:51Z",
"details": "moderate"
}
],
"title": "CVE-2025-40064"
},
{
"cve": "CVE-2025-40070",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40070"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\npps: fix warning in pps_register_cdev when register device fail\n\nSimilar to previous commit 2a934fdb01db (\"media: v4l2-dev: fix error\nhandling in __video_register_device()\"), the release hook should be set\nbefore device_register(). Otherwise, when device_register() return error\nand put_device() try to callback the release function, the below warning\nmay happen.\n\n ------------[ cut here ]------------\n WARNING: CPU: 1 PID: 4760 at drivers/base/core.c:2567 device_release+0x1bd/0x240 drivers/base/core.c:2567\n Modules linked in:\n CPU: 1 UID: 0 PID: 4760 Comm: syz.4.914 Not tainted 6.17.0-rc3+ #1 NONE\n RIP: 0010:device_release+0x1bd/0x240 drivers/base/core.c:2567\n Call Trace:\n \u003cTASK\u003e\n kobject_cleanup+0x136/0x410 lib/kobject.c:689\n kobject_release lib/kobject.c:720 [inline]\n kref_put include/linux/kref.h:65 [inline]\n kobject_put+0xe9/0x130 lib/kobject.c:737\n put_device+0x24/0x30 drivers/base/core.c:3797\n pps_register_cdev+0x2da/0x370 drivers/pps/pps.c:402\n pps_register_source+0x2f6/0x480 drivers/pps/kapi.c:108\n pps_tty_open+0x190/0x310 drivers/pps/clients/pps-ldisc.c:57\n tty_ldisc_open+0xa7/0x120 drivers/tty/tty_ldisc.c:432\n tty_set_ldisc+0x333/0x780 drivers/tty/tty_ldisc.c:563\n tiocsetd drivers/tty/tty_io.c:2429 [inline]\n tty_ioctl+0x5d1/0x1700 drivers/tty/tty_io.c:2728\n vfs_ioctl fs/ioctl.c:51 [inline]\n __do_sys_ioctl fs/ioctl.c:598 [inline]\n __se_sys_ioctl fs/ioctl.c:584 [inline]\n __x64_sys_ioctl+0x194/0x210 fs/ioctl.c:584\n do_syscall_x64 arch/x86/entry/syscall_64.c:63 [inline]\n do_syscall_64+0x5f/0x2a0 arch/x86/entry/syscall_64.c:94\n entry_SYSCALL_64_after_hwframe+0x76/0x7e\n \u003c/TASK\u003e\n\nBefore commit c79a39dc8d06 (\"pps: Fix a use-after-free\"),\npps_register_cdev() call device_create() to create pps-\u003edev, which will\ninit dev-\u003erelease to device_create_release(). Now the comment is outdated,\njust remove it.\n\nThanks for the reminder from Calvin Owens, \u0027kfree_pps\u0027 should be removed\nin pps_register_source() to avoid a double free in the failure case.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.20.21.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.20.21.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.20.21.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.20.21.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-devel-azure-6.4.0-150700.20.21.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-source-azure-6.4.0-150700.20.21.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-syms-azure-6.4.0-150700.20.21.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-syms-azure-6.4.0-150700.20.21.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40070",
"url": "https://www.suse.com/security/cve/CVE-2025-40070"
},
{
"category": "external",
"summary": "SUSE Bug 1252836 for CVE-2025-40070",
"url": "https://bugzilla.suse.com/1252836"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.20.21.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.20.21.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.20.21.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.20.21.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-devel-azure-6.4.0-150700.20.21.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-source-azure-6.4.0-150700.20.21.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-syms-azure-6.4.0-150700.20.21.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-syms-azure-6.4.0-150700.20.21.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.20.21.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.20.21.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.20.21.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.20.21.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-devel-azure-6.4.0-150700.20.21.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-source-azure-6.4.0-150700.20.21.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-syms-azure-6.4.0-150700.20.21.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-syms-azure-6.4.0-150700.20.21.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-23T16:28:51Z",
"details": "moderate"
}
],
"title": "CVE-2025-40070"
},
{
"cve": "CVE-2025-40074",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40074"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nipv4: start using dst_dev_rcu()\n\nChange icmpv4_xrlim_allow(), ip_defrag() to prevent possible UAF.\n\nChange ipmr_prepare_xmit(), ipmr_queue_fwd_xmit(), ip_mr_output(),\nipv4_neigh_lookup() to use lockdep enabled dst_dev_rcu().",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.20.21.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.20.21.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.20.21.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.20.21.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-devel-azure-6.4.0-150700.20.21.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-source-azure-6.4.0-150700.20.21.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-syms-azure-6.4.0-150700.20.21.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-syms-azure-6.4.0-150700.20.21.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40074",
"url": "https://www.suse.com/security/cve/CVE-2025-40074"
},
{
"category": "external",
"summary": "SUSE Bug 1252794 for CVE-2025-40074",
"url": "https://bugzilla.suse.com/1252794"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.20.21.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.20.21.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.20.21.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.20.21.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-devel-azure-6.4.0-150700.20.21.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-source-azure-6.4.0-150700.20.21.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-syms-azure-6.4.0-150700.20.21.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-syms-azure-6.4.0-150700.20.21.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.20.21.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.20.21.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.20.21.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.20.21.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-devel-azure-6.4.0-150700.20.21.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-source-azure-6.4.0-150700.20.21.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-syms-azure-6.4.0-150700.20.21.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-syms-azure-6.4.0-150700.20.21.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-23T16:28:51Z",
"details": "moderate"
}
],
"title": "CVE-2025-40074"
},
{
"cve": "CVE-2025-40075",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40075"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\ntcp_metrics: use dst_dev_net_rcu()\n\nReplace three dst_dev() with a lockdep enabled helper.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.20.21.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.20.21.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.20.21.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.20.21.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-devel-azure-6.4.0-150700.20.21.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-source-azure-6.4.0-150700.20.21.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-syms-azure-6.4.0-150700.20.21.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-syms-azure-6.4.0-150700.20.21.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40075",
"url": "https://www.suse.com/security/cve/CVE-2025-40075"
},
{
"category": "external",
"summary": "SUSE Bug 1252795 for CVE-2025-40075",
"url": "https://bugzilla.suse.com/1252795"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.20.21.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.20.21.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.20.21.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.20.21.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-devel-azure-6.4.0-150700.20.21.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-source-azure-6.4.0-150700.20.21.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-syms-azure-6.4.0-150700.20.21.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-syms-azure-6.4.0-150700.20.21.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.20.21.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.20.21.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.20.21.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.20.21.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-devel-azure-6.4.0-150700.20.21.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-source-azure-6.4.0-150700.20.21.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-syms-azure-6.4.0-150700.20.21.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-syms-azure-6.4.0-150700.20.21.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-23T16:28:51Z",
"details": "moderate"
}
],
"title": "CVE-2025-40075"
},
{
"cve": "CVE-2025-40083",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40083"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnet/sched: sch_qfq: Fix null-deref in agg_dequeue\n\nTo prevent a potential crash in agg_dequeue (net/sched/sch_qfq.c)\nwhen cl-\u003eqdisc-\u003eops-\u003epeek(cl-\u003eqdisc) returns NULL, we check the return\nvalue before using it, similar to the existing approach in sch_hfsc.c.\n\nTo avoid code duplication, the following changes are made:\n\n1. Changed qdisc_warn_nonwc(include/net/pkt_sched.h) into a static\ninline function.\n\n2. Moved qdisc_peek_len from net/sched/sch_hfsc.c to\ninclude/net/pkt_sched.h so that sch_qfq can reuse it.\n\n3. Applied qdisc_peek_len in agg_dequeue to avoid crashing.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.20.21.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.20.21.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.20.21.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.20.21.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-devel-azure-6.4.0-150700.20.21.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-source-azure-6.4.0-150700.20.21.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-syms-azure-6.4.0-150700.20.21.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-syms-azure-6.4.0-150700.20.21.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40083",
"url": "https://www.suse.com/security/cve/CVE-2025-40083"
},
{
"category": "external",
"summary": "SUSE Bug 1252912 for CVE-2025-40083",
"url": "https://bugzilla.suse.com/1252912"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.20.21.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.20.21.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.20.21.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.20.21.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-devel-azure-6.4.0-150700.20.21.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-source-azure-6.4.0-150700.20.21.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-syms-azure-6.4.0-150700.20.21.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-syms-azure-6.4.0-150700.20.21.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.20.21.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.20.21.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.20.21.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.20.21.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-devel-azure-6.4.0-150700.20.21.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-source-azure-6.4.0-150700.20.21.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-syms-azure-6.4.0-150700.20.21.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-syms-azure-6.4.0-150700.20.21.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-23T16:28:51Z",
"details": "moderate"
}
],
"title": "CVE-2025-40083"
},
{
"cve": "CVE-2025-40086",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40086"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\ndrm/xe: Don\u0027t allow evicting of BOs in same VM in array of VM binds\n\nAn array of VM binds can potentially evict other buffer objects (BOs)\nwithin the same VM under certain conditions, which may lead to NULL\npointer dereferences later in the bind pipeline. To prevent this, clear\nthe allow_res_evict flag in the xe_bo_validate call.\n\nv2:\n - Invert polarity of no_res_evict (Thomas)\n - Add comment in code explaining issue (Thomas)\n\n(cherry picked from commit 8b9ba8d6d95fe75fed6b0480bb03da4b321bea08)",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.20.21.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.20.21.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.20.21.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.20.21.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-devel-azure-6.4.0-150700.20.21.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-source-azure-6.4.0-150700.20.21.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-syms-azure-6.4.0-150700.20.21.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-syms-azure-6.4.0-150700.20.21.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40086",
"url": "https://www.suse.com/security/cve/CVE-2025-40086"
},
{
"category": "external",
"summary": "SUSE Bug 1252923 for CVE-2025-40086",
"url": "https://bugzilla.suse.com/1252923"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.20.21.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.20.21.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.20.21.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.20.21.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-devel-azure-6.4.0-150700.20.21.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-source-azure-6.4.0-150700.20.21.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-syms-azure-6.4.0-150700.20.21.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-syms-azure-6.4.0-150700.20.21.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.1,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.20.21.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.20.21.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.20.21.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.20.21.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-devel-azure-6.4.0-150700.20.21.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-source-azure-6.4.0-150700.20.21.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-syms-azure-6.4.0-150700.20.21.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-syms-azure-6.4.0-150700.20.21.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-23T16:28:51Z",
"details": "moderate"
}
],
"title": "CVE-2025-40086"
},
{
"cve": "CVE-2025-40098",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40098"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nALSA: hda: cs35l41: Fix NULL pointer dereference in cs35l41_get_acpi_mute_state()\n\nReturn value of a function acpi_evaluate_dsm() is dereferenced without\nchecking for NULL, but it is usually checked for this function.\n\nacpi_evaluate_dsm() may return NULL, when acpi_evaluate_object() returns\nacpi_status other than ACPI_SUCCESS, so add a check to prevent the crach.\n\nFound by Linux Verification Center (linuxtesting.org) with SVACE.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.20.21.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.20.21.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.20.21.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.20.21.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-devel-azure-6.4.0-150700.20.21.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-source-azure-6.4.0-150700.20.21.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-syms-azure-6.4.0-150700.20.21.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-syms-azure-6.4.0-150700.20.21.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40098",
"url": "https://www.suse.com/security/cve/CVE-2025-40098"
},
{
"category": "external",
"summary": "SUSE Bug 1252917 for CVE-2025-40098",
"url": "https://bugzilla.suse.com/1252917"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.20.21.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.20.21.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.20.21.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.20.21.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-devel-azure-6.4.0-150700.20.21.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-source-azure-6.4.0-150700.20.21.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-syms-azure-6.4.0-150700.20.21.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-syms-azure-6.4.0-150700.20.21.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.20.21.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.20.21.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.20.21.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.20.21.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-devel-azure-6.4.0-150700.20.21.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-source-azure-6.4.0-150700.20.21.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-syms-azure-6.4.0-150700.20.21.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-syms-azure-6.4.0-150700.20.21.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-23T16:28:51Z",
"details": "moderate"
}
],
"title": "CVE-2025-40098"
},
{
"cve": "CVE-2025-40105",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40105"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nvfs: Don\u0027t leak disconnected dentries on umount\n\nWhen user calls open_by_handle_at() on some inode that is not cached, we\nwill create disconnected dentry for it. If such dentry is a directory,\nexportfs_decode_fh_raw() will then try to connect this dentry to the\ndentry tree through reconnect_path(). It may happen for various reasons\n(such as corrupted fs or race with rename) that the call to\nlookup_one_unlocked() in reconnect_one() will fail to find the dentry we\nare trying to reconnect and instead create a new dentry under the\nparent. Now this dentry will not be marked as disconnected although the\nparent still may well be disconnected (at least in case this\ninconsistency happened because the fs is corrupted and .. doesn\u0027t point\nto the real parent directory). This creates inconsistency in\ndisconnected flags but AFAICS it was mostly harmless. At least until\ncommit f1ee616214cb (\"VFS: don\u0027t keep disconnected dentries on d_anon\")\nwhich removed adding of most disconnected dentries to sb-\u003es_anon list.\nThus after this commit cleanup of disconnected dentries implicitely\nrelies on the fact that dput() will immediately reclaim such dentries.\nHowever when some leaf dentry isn\u0027t marked as disconnected, as in the\nscenario described above, the reclaim doesn\u0027t happen and the dentries\nare \"leaked\". Memory reclaim can eventually reclaim them but otherwise\nthey stay in memory and if umount comes first, we hit infamous \"Busy\ninodes after unmount\" bug. Make sure all dentries created under a\ndisconnected parent are marked as disconnected as well.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.20.21.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.20.21.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.20.21.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.20.21.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-devel-azure-6.4.0-150700.20.21.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-source-azure-6.4.0-150700.20.21.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-syms-azure-6.4.0-150700.20.21.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-syms-azure-6.4.0-150700.20.21.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40105",
"url": "https://www.suse.com/security/cve/CVE-2025-40105"
},
{
"category": "external",
"summary": "SUSE Bug 1252928 for CVE-2025-40105",
"url": "https://bugzilla.suse.com/1252928"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.20.21.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.20.21.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.20.21.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.20.21.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-devel-azure-6.4.0-150700.20.21.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-source-azure-6.4.0-150700.20.21.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-syms-azure-6.4.0-150700.20.21.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-syms-azure-6.4.0-150700.20.21.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.3,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.20.21.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.20.21.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.20.21.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.20.21.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-devel-azure-6.4.0-150700.20.21.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-source-azure-6.4.0-150700.20.21.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-syms-azure-6.4.0-150700.20.21.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-syms-azure-6.4.0-150700.20.21.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-23T16:28:51Z",
"details": "low"
}
],
"title": "CVE-2025-40105"
},
{
"cve": "CVE-2025-40107",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40107"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\ncan: hi311x: fix null pointer dereference when resuming from sleep before interface was enabled\n\nThis issue is similar to the vulnerability in the `mcp251x` driver,\nwhich was fixed in commit 03c427147b2d (\"can: mcp251x: fix resume from\nsleep before interface was brought up\").\n\nIn the `hi311x` driver, when the device resumes from sleep, the driver\nschedules `priv-\u003erestart_work`. However, if the network interface was\nnot previously enabled, the `priv-\u003ewq` (workqueue) is not allocated and\ninitialized, leading to a null pointer dereference.\n\nTo fix this, we move the allocation and initialization of the workqueue\nfrom the `hi3110_open` function to the `hi3110_can_probe` function.\nThis ensures that the workqueue is properly initialized before it is\nused during device resume. And added logic to destroy the workqueue\nin the error handling paths of `hi3110_can_probe` and in the\n`hi3110_can_remove` function to prevent resource leaks.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.20.21.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.20.21.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.20.21.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.20.21.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-devel-azure-6.4.0-150700.20.21.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-source-azure-6.4.0-150700.20.21.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-syms-azure-6.4.0-150700.20.21.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-syms-azure-6.4.0-150700.20.21.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40107",
"url": "https://www.suse.com/security/cve/CVE-2025-40107"
},
{
"category": "external",
"summary": "SUSE Bug 1253018 for CVE-2025-40107",
"url": "https://bugzilla.suse.com/1253018"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.20.21.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.20.21.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.20.21.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.20.21.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-devel-azure-6.4.0-150700.20.21.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-source-azure-6.4.0-150700.20.21.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-syms-azure-6.4.0-150700.20.21.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-syms-azure-6.4.0-150700.20.21.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.20.21.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.20.21.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.20.21.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.20.21.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-devel-azure-6.4.0-150700.20.21.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-source-azure-6.4.0-150700.20.21.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-syms-azure-6.4.0-150700.20.21.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-syms-azure-6.4.0-150700.20.21.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-23T16:28:51Z",
"details": "moderate"
}
],
"title": "CVE-2025-40107"
},
{
"cve": "CVE-2025-40109",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40109"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\ncrypto: rng - Ensure set_ent is always present\n\nEnsure that set_ent is always set since only drbg provides it.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.20.21.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.20.21.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.20.21.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.20.21.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-devel-azure-6.4.0-150700.20.21.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-source-azure-6.4.0-150700.20.21.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-syms-azure-6.4.0-150700.20.21.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-syms-azure-6.4.0-150700.20.21.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40109",
"url": "https://www.suse.com/security/cve/CVE-2025-40109"
},
{
"category": "external",
"summary": "SUSE Bug 1253176 for CVE-2025-40109",
"url": "https://bugzilla.suse.com/1253176"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.20.21.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.20.21.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.20.21.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.20.21.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-devel-azure-6.4.0-150700.20.21.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-source-azure-6.4.0-150700.20.21.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-syms-azure-6.4.0-150700.20.21.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-syms-azure-6.4.0-150700.20.21.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.20.21.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.20.21.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.20.21.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.20.21.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-devel-azure-6.4.0-150700.20.21.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-source-azure-6.4.0-150700.20.21.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-syms-azure-6.4.0-150700.20.21.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-syms-azure-6.4.0-150700.20.21.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-23T16:28:51Z",
"details": "moderate"
}
],
"title": "CVE-2025-40109"
},
{
"cve": "CVE-2025-40110",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40110"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\ndrm/vmwgfx: Fix a null-ptr access in the cursor snooper\n\nCheck that the resource which is converted to a surface exists before\ntrying to use the cursor snooper on it.\n\nvmw_cmd_res_check allows explicit invalid (SVGA3D_INVALID_ID) identifiers\nbecause some svga commands accept SVGA3D_INVALID_ID to mean \"no surface\",\nunfortunately functions that accept the actual surfaces as objects might\n(and in case of the cursor snooper, do not) be able to handle null\nobjects. Make sure that we validate not only the identifier (via the\nvmw_cmd_res_check) but also check that the actual resource exists before\ntrying to do something with it.\n\nFixes unchecked null-ptr reference in the snooping code.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.20.21.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.20.21.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.20.21.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.20.21.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-devel-azure-6.4.0-150700.20.21.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-source-azure-6.4.0-150700.20.21.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-syms-azure-6.4.0-150700.20.21.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-syms-azure-6.4.0-150700.20.21.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40110",
"url": "https://www.suse.com/security/cve/CVE-2025-40110"
},
{
"category": "external",
"summary": "SUSE Bug 1253275 for CVE-2025-40110",
"url": "https://bugzilla.suse.com/1253275"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.20.21.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.20.21.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.20.21.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.20.21.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-devel-azure-6.4.0-150700.20.21.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-source-azure-6.4.0-150700.20.21.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-syms-azure-6.4.0-150700.20.21.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-syms-azure-6.4.0-150700.20.21.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.1,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.20.21.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.20.21.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.20.21.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.20.21.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-devel-azure-6.4.0-150700.20.21.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-source-azure-6.4.0-150700.20.21.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-syms-azure-6.4.0-150700.20.21.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-syms-azure-6.4.0-150700.20.21.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-23T16:28:51Z",
"details": "moderate"
}
],
"title": "CVE-2025-40110"
},
{
"cve": "CVE-2025-40111",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40111"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\ndrm/vmwgfx: Fix Use-after-free in validation\n\nNodes stored in the validation duplicates hashtable come from an arena\nallocator that is cleared at the end of vmw_execbuf_process. All nodes\nare expected to be cleared in vmw_validation_drop_ht but this node escaped\nbecause its resource was destroyed prematurely.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.20.21.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.20.21.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.20.21.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.20.21.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-devel-azure-6.4.0-150700.20.21.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-source-azure-6.4.0-150700.20.21.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-syms-azure-6.4.0-150700.20.21.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-syms-azure-6.4.0-150700.20.21.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40111",
"url": "https://www.suse.com/security/cve/CVE-2025-40111"
},
{
"category": "external",
"summary": "SUSE Bug 1253362 for CVE-2025-40111",
"url": "https://bugzilla.suse.com/1253362"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.20.21.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.20.21.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.20.21.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.20.21.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-devel-azure-6.4.0-150700.20.21.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-source-azure-6.4.0-150700.20.21.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-syms-azure-6.4.0-150700.20.21.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-syms-azure-6.4.0-150700.20.21.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.7,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:L/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.20.21.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.20.21.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.20.21.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.20.21.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-devel-azure-6.4.0-150700.20.21.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-source-azure-6.4.0-150700.20.21.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-syms-azure-6.4.0-150700.20.21.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-syms-azure-6.4.0-150700.20.21.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-23T16:28:51Z",
"details": "moderate"
}
],
"title": "CVE-2025-40111"
},
{
"cve": "CVE-2025-40115",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40115"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nscsi: mpt3sas: Fix crash in transport port remove by using ioc_info()\n\nDuring mpt3sas_transport_port_remove(), messages were logged with\ndev_printk() against \u0026mpt3sas_port-\u003eport-\u003edev. At this point the SAS\ntransport device may already be partially unregistered or freed, leading\nto a crash when accessing its struct device.\n\nUsing ioc_info(), which logs via the PCI device (ioc-\u003epdev-\u003edev),\nguaranteed to remain valid until driver removal.\n\n[83428.295776] Oops: general protection fault, probably for non-canonical address 0x6f702f323a33312d: 0000 [#1] SMP NOPTI\n[83428.295785] CPU: 145 UID: 0 PID: 113296 Comm: rmmod Kdump: loaded Tainted: G OE 6.16.0-rc1+ #1 PREEMPT(voluntary)\n[83428.295792] Tainted: [O]=OOT_MODULE, [E]=UNSIGNED_MODULE\n[83428.295795] Hardware name: Dell Inc. Precision 7875 Tower/, BIOS 89.1.67 02/23/2024\n[83428.295799] RIP: 0010:__dev_printk+0x1f/0x70\n[83428.295805] Code: 90 90 90 90 90 90 90 90 90 90 90 0f 1f 44 00 00 49 89 d1 48 85 f6 74 52 4c 8b 46 50 4d 85 c0 74 1f 48 8b 46 68 48 85 c0 74 22 \u003c48\u003e 8b 08 0f b6 7f 01 48 c7 c2 db e8 42 ad 83 ef 30 e9 7b f8 ff ff\n[83428.295813] RSP: 0018:ff85aeafc3137bb0 EFLAGS: 00010206\n[83428.295817] RAX: 6f702f323a33312d RBX: ff4290ee81292860 RCX: 5000cca25103be32\n[83428.295820] RDX: ff85aeafc3137bb8 RSI: ff4290eeb1966c00 RDI: ffffffffc1560845\n[83428.295823] RBP: ff85aeafc3137c18 R08: 74726f702f303a33 R09: ff85aeafc3137bb8\n[83428.295826] R10: ff85aeafc3137b18 R11: ff4290f5bd60fe68 R12: ff4290ee81290000\n[83428.295830] R13: ff4290ee6e345de0 R14: ff4290ee81290000 R15: ff4290ee6e345e30\n[83428.295833] FS: 00007fd9472a6740(0000) GS:ff4290f5ce96b000(0000) knlGS:0000000000000000\n[83428.295837] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033\n[83428.295840] CR2: 00007f242b4db238 CR3: 00000002372b8006 CR4: 0000000000771ef0\n[83428.295844] PKRU: 55555554\n[83428.295846] Call Trace:\n[83428.295848] \u003cTASK\u003e\n[83428.295850] _dev_printk+0x5c/0x80\n[83428.295857] ? srso_alias_return_thunk+0x5/0xfbef5\n[83428.295863] mpt3sas_transport_port_remove+0x1c7/0x420 [mpt3sas]\n[83428.295882] _scsih_remove_device+0x21b/0x280 [mpt3sas]\n[83428.295894] ? _scsih_expander_node_remove+0x108/0x140 [mpt3sas]\n[83428.295906] ? srso_alias_return_thunk+0x5/0xfbef5\n[83428.295910] mpt3sas_device_remove_by_sas_address.part.0+0x8f/0x110 [mpt3sas]\n[83428.295921] _scsih_expander_node_remove+0x129/0x140 [mpt3sas]\n[83428.295933] _scsih_expander_node_remove+0x6a/0x140 [mpt3sas]\n[83428.295944] scsih_remove+0x3f0/0x4a0 [mpt3sas]\n[83428.295957] pci_device_remove+0x3b/0xb0\n[83428.295962] device_release_driver_internal+0x193/0x200\n[83428.295968] driver_detach+0x44/0x90\n[83428.295971] bus_remove_driver+0x69/0xf0\n[83428.295975] pci_unregister_driver+0x2a/0xb0\n[83428.295979] _mpt3sas_exit+0x1f/0x300 [mpt3sas]\n[83428.295991] __do_sys_delete_module.constprop.0+0x174/0x310\n[83428.295997] ? srso_alias_return_thunk+0x5/0xfbef5\n[83428.296000] ? __x64_sys_getdents64+0x9a/0x110\n[83428.296005] ? srso_alias_return_thunk+0x5/0xfbef5\n[83428.296009] ? syscall_trace_enter+0xf6/0x1b0\n[83428.296014] do_syscall_64+0x7b/0x2c0\n[83428.296019] ? srso_alias_return_thunk+0x5/0xfbef5\n[83428.296023] entry_SYSCALL_64_after_hwframe+0x76/0x7e",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.20.21.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.20.21.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.20.21.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.20.21.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-devel-azure-6.4.0-150700.20.21.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-source-azure-6.4.0-150700.20.21.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-syms-azure-6.4.0-150700.20.21.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-syms-azure-6.4.0-150700.20.21.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40115",
"url": "https://www.suse.com/security/cve/CVE-2025-40115"
},
{
"category": "external",
"summary": "SUSE Bug 1253318 for CVE-2025-40115",
"url": "https://bugzilla.suse.com/1253318"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.20.21.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.20.21.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.20.21.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.20.21.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-devel-azure-6.4.0-150700.20.21.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-source-azure-6.4.0-150700.20.21.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-syms-azure-6.4.0-150700.20.21.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-syms-azure-6.4.0-150700.20.21.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.20.21.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.20.21.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.20.21.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.20.21.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-devel-azure-6.4.0-150700.20.21.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-source-azure-6.4.0-150700.20.21.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-syms-azure-6.4.0-150700.20.21.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-syms-azure-6.4.0-150700.20.21.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-23T16:28:51Z",
"details": "moderate"
}
],
"title": "CVE-2025-40115"
},
{
"cve": "CVE-2025-40116",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40116"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nusb: host: max3421-hcd: Fix error pointer dereference in probe cleanup\n\nThe kthread_run() function returns error pointers so the\nmax3421_hcd-\u003espi_thread pointer can be either error pointers or NULL.\nCheck for both before dereferencing it.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.20.21.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.20.21.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.20.21.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.20.21.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-devel-azure-6.4.0-150700.20.21.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-source-azure-6.4.0-150700.20.21.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-syms-azure-6.4.0-150700.20.21.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-syms-azure-6.4.0-150700.20.21.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40116",
"url": "https://www.suse.com/security/cve/CVE-2025-40116"
},
{
"category": "external",
"summary": "SUSE Bug 1253324 for CVE-2025-40116",
"url": "https://bugzilla.suse.com/1253324"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.20.21.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.20.21.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.20.21.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.20.21.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-devel-azure-6.4.0-150700.20.21.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-source-azure-6.4.0-150700.20.21.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-syms-azure-6.4.0-150700.20.21.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-syms-azure-6.4.0-150700.20.21.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.20.21.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.20.21.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.20.21.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.20.21.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-devel-azure-6.4.0-150700.20.21.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-source-azure-6.4.0-150700.20.21.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-syms-azure-6.4.0-150700.20.21.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-syms-azure-6.4.0-150700.20.21.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-23T16:28:51Z",
"details": "moderate"
}
],
"title": "CVE-2025-40116"
},
{
"cve": "CVE-2025-40118",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40118"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nscsi: pm80xx: Fix array-index-out-of-of-bounds on rmmod\n\nSince commit f7b705c238d1 (\"scsi: pm80xx: Set phy_attached to zero when\ndevice is gone\") UBSAN reports:\n\n UBSAN: array-index-out-of-bounds in drivers/scsi/pm8001/pm8001_sas.c:786:17\n index 28 is out of range for type \u0027pm8001_phy [16]\u0027\n\non rmmod when using an expander.\n\nFor a direct attached device, attached_phy contains the local phy id.\nFor a device behind an expander, attached_phy contains the remote phy\nid, not the local phy id.\n\nI.e. while pm8001_ha will have pm8001_ha-\u003echip-\u003en_phy local phys, for a\ndevice behind an expander, attached_phy can be much larger than\npm8001_ha-\u003echip-\u003en_phy (depending on the amount of phys of the\nexpander).\n\nE.g. on my system pm8001_ha has 8 phys with phy ids 0-7. One of the\nports has an expander connected. The expander has 31 phys with phy ids\n0-30.\n\nThe pm8001_ha-\u003ephy array only contains the phys of the HBA. It does not\ncontain the phys of the expander. Thus, it is wrong to use attached_phy\nto index the pm8001_ha-\u003ephy array for a device behind an expander.\n\nThus, we can only clear phy_attached for devices that are directly\nattached.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.20.21.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.20.21.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.20.21.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.20.21.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-devel-azure-6.4.0-150700.20.21.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-source-azure-6.4.0-150700.20.21.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-syms-azure-6.4.0-150700.20.21.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-syms-azure-6.4.0-150700.20.21.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40118",
"url": "https://www.suse.com/security/cve/CVE-2025-40118"
},
{
"category": "external",
"summary": "SUSE Bug 1253363 for CVE-2025-40118",
"url": "https://bugzilla.suse.com/1253363"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.20.21.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.20.21.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.20.21.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.20.21.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-devel-azure-6.4.0-150700.20.21.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-source-azure-6.4.0-150700.20.21.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-syms-azure-6.4.0-150700.20.21.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-syms-azure-6.4.0-150700.20.21.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.1,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.20.21.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.20.21.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.20.21.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.20.21.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-devel-azure-6.4.0-150700.20.21.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-source-azure-6.4.0-150700.20.21.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-syms-azure-6.4.0-150700.20.21.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-syms-azure-6.4.0-150700.20.21.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-23T16:28:51Z",
"details": "moderate"
}
],
"title": "CVE-2025-40118"
},
{
"cve": "CVE-2025-40120",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40120"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnet: usb: asix: hold PM usage ref to avoid PM/MDIO + RTNL deadlock\n\nPrevent USB runtime PM (autosuspend) for AX88772* in bind.\n\nusbnet enables runtime PM (autosuspend) by default, so disabling it via\nthe usb_driver flag is ineffective. On AX88772B, autosuspend shows no\nmeasurable power saving with current driver (no link partner, admin\nup/down). The ~0.453 W -\u003e ~0.248 W drop on v6.1 comes from phylib powering\nthe PHY off on admin-down, not from USB autosuspend.\n\nThe real hazard is that with runtime PM enabled, ndo_open() (under RTNL)\nmay synchronously trigger autoresume (usb_autopm_get_interface()) into\nasix_resume() while the USB PM lock is held. Resume paths then invoke\nphylink/phylib and MDIO, which also expect RTNL, leading to possible\ndeadlocks or PM lock vs MDIO wake issues.\n\nTo avoid this, keep the device runtime-PM active by taking a usage\nreference in ax88772_bind() and dropping it in unbind(). A non-zero PM\nusage count blocks runtime suspend regardless of userspace policy\n(.../power/control - pm_runtime_allow/forbid), making this approach\nrobust against sysfs overrides.\n\nHolding a runtime-PM usage ref does not affect system-wide suspend;\nsystem sleep/resume callbacks continue to run as before.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.20.21.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.20.21.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.20.21.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.20.21.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-devel-azure-6.4.0-150700.20.21.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-source-azure-6.4.0-150700.20.21.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-syms-azure-6.4.0-150700.20.21.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-syms-azure-6.4.0-150700.20.21.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40120",
"url": "https://www.suse.com/security/cve/CVE-2025-40120"
},
{
"category": "external",
"summary": "SUSE Bug 1253360 for CVE-2025-40120",
"url": "https://bugzilla.suse.com/1253360"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.20.21.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.20.21.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.20.21.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.20.21.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-devel-azure-6.4.0-150700.20.21.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-source-azure-6.4.0-150700.20.21.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-syms-azure-6.4.0-150700.20.21.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-syms-azure-6.4.0-150700.20.21.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.20.21.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.20.21.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.20.21.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.20.21.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-devel-azure-6.4.0-150700.20.21.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-source-azure-6.4.0-150700.20.21.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-syms-azure-6.4.0-150700.20.21.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-syms-azure-6.4.0-150700.20.21.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-23T16:28:51Z",
"details": "moderate"
}
],
"title": "CVE-2025-40120"
},
{
"cve": "CVE-2025-40121",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40121"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nASoC: Intel: bytcr_rt5651: Fix invalid quirk input mapping\n\nWhen an invalid value is passed via quirk option, currently\nbytcr_rt5640 driver just ignores and leaves as is, which may lead to\nunepxected results like OOB access.\n\nThis patch adds the sanity check and corrects the input mapping to the\ncertain default value if an invalid value is passed.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.20.21.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.20.21.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.20.21.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.20.21.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-devel-azure-6.4.0-150700.20.21.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-source-azure-6.4.0-150700.20.21.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-syms-azure-6.4.0-150700.20.21.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-syms-azure-6.4.0-150700.20.21.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40121",
"url": "https://www.suse.com/security/cve/CVE-2025-40121"
},
{
"category": "external",
"summary": "SUSE Bug 1253367 for CVE-2025-40121",
"url": "https://bugzilla.suse.com/1253367"
},
{
"category": "external",
"summary": "SUSE Bug 1253430 for CVE-2025-40121",
"url": "https://bugzilla.suse.com/1253430"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.20.21.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.20.21.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.20.21.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.20.21.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-devel-azure-6.4.0-150700.20.21.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-source-azure-6.4.0-150700.20.21.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-syms-azure-6.4.0-150700.20.21.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-syms-azure-6.4.0-150700.20.21.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.20.21.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.20.21.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.20.21.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.20.21.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-devel-azure-6.4.0-150700.20.21.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-source-azure-6.4.0-150700.20.21.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-syms-azure-6.4.0-150700.20.21.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-syms-azure-6.4.0-150700.20.21.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-23T16:28:51Z",
"details": "moderate"
}
],
"title": "CVE-2025-40121"
},
{
"cve": "CVE-2025-40127",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40127"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nhwrng: ks-sa - fix division by zero in ks_sa_rng_init\n\nFix division by zero in ks_sa_rng_init caused by missing clock\npointer initialization. The clk_get_rate() call is performed on\nan uninitialized clk pointer, resulting in division by zero when\ncalculating delay values.\n\nAdd clock initialization code before using the clock.\n\n\n drivers/char/hw_random/ks-sa-rng.c | 7 +++++++\n 1 file changed, 7 insertions(+)",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.20.21.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.20.21.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.20.21.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.20.21.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-devel-azure-6.4.0-150700.20.21.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-source-azure-6.4.0-150700.20.21.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-syms-azure-6.4.0-150700.20.21.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-syms-azure-6.4.0-150700.20.21.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40127",
"url": "https://www.suse.com/security/cve/CVE-2025-40127"
},
{
"category": "external",
"summary": "SUSE Bug 1253369 for CVE-2025-40127",
"url": "https://bugzilla.suse.com/1253369"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.20.21.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.20.21.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.20.21.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.20.21.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-devel-azure-6.4.0-150700.20.21.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-source-azure-6.4.0-150700.20.21.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-syms-azure-6.4.0-150700.20.21.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-syms-azure-6.4.0-150700.20.21.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.20.21.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.20.21.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.20.21.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.20.21.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-devel-azure-6.4.0-150700.20.21.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-source-azure-6.4.0-150700.20.21.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-syms-azure-6.4.0-150700.20.21.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-syms-azure-6.4.0-150700.20.21.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-23T16:28:51Z",
"details": "moderate"
}
],
"title": "CVE-2025-40127"
},
{
"cve": "CVE-2025-40129",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40129"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nsunrpc: fix null pointer dereference on zero-length checksum\n\nIn xdr_stream_decode_opaque_auth(), zero-length checksum.len causes\nchecksum.data to be set to NULL. This triggers a NPD when accessing\nchecksum.data in gss_krb5_verify_mic_v2(). This patch ensures that\nthe value of checksum.len is not less than XDR_UNIT.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.20.21.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.20.21.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.20.21.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.20.21.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-devel-azure-6.4.0-150700.20.21.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-source-azure-6.4.0-150700.20.21.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-syms-azure-6.4.0-150700.20.21.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-syms-azure-6.4.0-150700.20.21.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40129",
"url": "https://www.suse.com/security/cve/CVE-2025-40129"
},
{
"category": "external",
"summary": "SUSE Bug 1253472 for CVE-2025-40129",
"url": "https://bugzilla.suse.com/1253472"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.20.21.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.20.21.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.20.21.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.20.21.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-devel-azure-6.4.0-150700.20.21.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-source-azure-6.4.0-150700.20.21.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-syms-azure-6.4.0-150700.20.21.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-syms-azure-6.4.0-150700.20.21.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.20.21.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.20.21.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.20.21.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.20.21.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-devel-azure-6.4.0-150700.20.21.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-source-azure-6.4.0-150700.20.21.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-syms-azure-6.4.0-150700.20.21.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-syms-azure-6.4.0-150700.20.21.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-23T16:28:51Z",
"details": "important"
}
],
"title": "CVE-2025-40129"
},
{
"cve": "CVE-2025-40139",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40139"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nsmc: Use __sk_dst_get() and dst_dev_rcu() in in smc_clc_prfx_set().\n\nsmc_clc_prfx_set() is called during connect() and not under RCU\nnor RTNL.\n\nUsing sk_dst_get(sk)-\u003edev could trigger UAF.\n\nLet\u0027s use __sk_dst_get() and dev_dst_rcu() under rcu_read_lock()\nafter kernel_getsockname().\n\nNote that the returned value of smc_clc_prfx_set() is not used\nin the caller.\n\nWhile at it, we change the 1st arg of smc_clc_prfx_set[46]_rcu()\nnot to touch dst there.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.20.21.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.20.21.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.20.21.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.20.21.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-devel-azure-6.4.0-150700.20.21.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-source-azure-6.4.0-150700.20.21.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-syms-azure-6.4.0-150700.20.21.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-syms-azure-6.4.0-150700.20.21.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40139",
"url": "https://www.suse.com/security/cve/CVE-2025-40139"
},
{
"category": "external",
"summary": "SUSE Bug 1253409 for CVE-2025-40139",
"url": "https://bugzilla.suse.com/1253409"
},
{
"category": "external",
"summary": "SUSE Bug 1253411 for CVE-2025-40139",
"url": "https://bugzilla.suse.com/1253411"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.20.21.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.20.21.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.20.21.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.20.21.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-devel-azure-6.4.0-150700.20.21.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-source-azure-6.4.0-150700.20.21.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-syms-azure-6.4.0-150700.20.21.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-syms-azure-6.4.0-150700.20.21.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.20.21.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.20.21.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.20.21.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.20.21.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-devel-azure-6.4.0-150700.20.21.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-source-azure-6.4.0-150700.20.21.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-syms-azure-6.4.0-150700.20.21.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-syms-azure-6.4.0-150700.20.21.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-23T16:28:51Z",
"details": "important"
}
],
"title": "CVE-2025-40139"
},
{
"cve": "CVE-2025-40140",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40140"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnet: usb: Remove disruptive netif_wake_queue in rtl8150_set_multicast\n\nsyzbot reported WARNING in rtl8150_start_xmit/usb_submit_urb.\nThis is the sequence of events that leads to the warning:\n\nrtl8150_start_xmit() {\n\tnetif_stop_queue();\n\tusb_submit_urb(dev-\u003etx_urb);\n}\n\nrtl8150_set_multicast() {\n\tnetif_stop_queue();\n\tnetif_wake_queue();\t\t\u003c-- wakes up TX queue before URB is done\n}\n\nrtl8150_start_xmit() {\n\tnetif_stop_queue();\n\tusb_submit_urb(dev-\u003etx_urb);\t\u003c-- double submission\n}\n\nrtl8150_set_multicast being the ndo_set_rx_mode callback should not be\ncalling netif_stop_queue and notif_start_queue as these handle\nTX queue synchronization.\n\nThe net core function dev_set_rx_mode handles the synchronization\nfor rtl8150_set_multicast making it safe to remove these locks.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.20.21.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.20.21.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.20.21.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.20.21.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-devel-azure-6.4.0-150700.20.21.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-source-azure-6.4.0-150700.20.21.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-syms-azure-6.4.0-150700.20.21.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-syms-azure-6.4.0-150700.20.21.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40140",
"url": "https://www.suse.com/security/cve/CVE-2025-40140"
},
{
"category": "external",
"summary": "SUSE Bug 1253349 for CVE-2025-40140",
"url": "https://bugzilla.suse.com/1253349"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.20.21.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.20.21.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.20.21.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.20.21.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-devel-azure-6.4.0-150700.20.21.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-source-azure-6.4.0-150700.20.21.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-syms-azure-6.4.0-150700.20.21.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-syms-azure-6.4.0-150700.20.21.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.3,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.20.21.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.20.21.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.20.21.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.20.21.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-devel-azure-6.4.0-150700.20.21.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-source-azure-6.4.0-150700.20.21.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-syms-azure-6.4.0-150700.20.21.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-syms-azure-6.4.0-150700.20.21.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-23T16:28:51Z",
"details": "low"
}
],
"title": "CVE-2025-40140"
},
{
"cve": "CVE-2025-40141",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40141"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nBluetooth: ISO: Fix possible UAF on iso_conn_free\n\nThis attempt to fix similar issue to sco_conn_free where if the\nconn-\u003esk is not set to NULL may lead to UAF on iso_conn_free.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.20.21.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.20.21.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.20.21.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.20.21.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-devel-azure-6.4.0-150700.20.21.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-source-azure-6.4.0-150700.20.21.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-syms-azure-6.4.0-150700.20.21.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-syms-azure-6.4.0-150700.20.21.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40141",
"url": "https://www.suse.com/security/cve/CVE-2025-40141"
},
{
"category": "external",
"summary": "SUSE Bug 1253352 for CVE-2025-40141",
"url": "https://bugzilla.suse.com/1253352"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.20.21.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.20.21.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.20.21.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.20.21.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-devel-azure-6.4.0-150700.20.21.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-source-azure-6.4.0-150700.20.21.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-syms-azure-6.4.0-150700.20.21.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-syms-azure-6.4.0-150700.20.21.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.20.21.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.20.21.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.20.21.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.20.21.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-devel-azure-6.4.0-150700.20.21.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-source-azure-6.4.0-150700.20.21.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-syms-azure-6.4.0-150700.20.21.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-syms-azure-6.4.0-150700.20.21.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-23T16:28:51Z",
"details": "moderate"
}
],
"title": "CVE-2025-40141"
},
{
"cve": "CVE-2025-40149",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40149"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\ntls: Use __sk_dst_get() and dst_dev_rcu() in get_netdev_for_sock().\n\nget_netdev_for_sock() is called during setsockopt(),\nso not under RCU.\n\nUsing sk_dst_get(sk)-\u003edev could trigger UAF.\n\nLet\u0027s use __sk_dst_get() and dst_dev_rcu().\n\nNote that the only -\u003endo_sk_get_lower_dev() user is\nbond_sk_get_lower_dev(), which uses RCU.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.20.21.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.20.21.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.20.21.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.20.21.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-devel-azure-6.4.0-150700.20.21.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-source-azure-6.4.0-150700.20.21.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-syms-azure-6.4.0-150700.20.21.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-syms-azure-6.4.0-150700.20.21.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40149",
"url": "https://www.suse.com/security/cve/CVE-2025-40149"
},
{
"category": "external",
"summary": "SUSE Bug 1253355 for CVE-2025-40149",
"url": "https://bugzilla.suse.com/1253355"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.20.21.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.20.21.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.20.21.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.20.21.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-devel-azure-6.4.0-150700.20.21.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-source-azure-6.4.0-150700.20.21.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-syms-azure-6.4.0-150700.20.21.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-syms-azure-6.4.0-150700.20.21.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.20.21.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.20.21.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.20.21.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.20.21.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-devel-azure-6.4.0-150700.20.21.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-source-azure-6.4.0-150700.20.21.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-syms-azure-6.4.0-150700.20.21.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-syms-azure-6.4.0-150700.20.21.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-23T16:28:51Z",
"details": "moderate"
}
],
"title": "CVE-2025-40149"
},
{
"cve": "CVE-2025-40154",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40154"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nASoC: Intel: bytcr_rt5640: Fix invalid quirk input mapping\n\nWhen an invalid value is passed via quirk option, currently\nbytcr_rt5640 driver only shows an error message but leaves as is.\nThis may lead to unepxected results like OOB access.\n\nThis patch corrects the input mapping to the certain default value if\nan invalid value is passed.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.20.21.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.20.21.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.20.21.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.20.21.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-devel-azure-6.4.0-150700.20.21.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-source-azure-6.4.0-150700.20.21.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-syms-azure-6.4.0-150700.20.21.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-syms-azure-6.4.0-150700.20.21.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40154",
"url": "https://www.suse.com/security/cve/CVE-2025-40154"
},
{
"category": "external",
"summary": "SUSE Bug 1253431 for CVE-2025-40154",
"url": "https://bugzilla.suse.com/1253431"
},
{
"category": "external",
"summary": "SUSE Bug 1253432 for CVE-2025-40154",
"url": "https://bugzilla.suse.com/1253432"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.20.21.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.20.21.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.20.21.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.20.21.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-devel-azure-6.4.0-150700.20.21.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-source-azure-6.4.0-150700.20.21.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-syms-azure-6.4.0-150700.20.21.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-syms-azure-6.4.0-150700.20.21.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.20.21.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.20.21.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.20.21.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.20.21.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-devel-azure-6.4.0-150700.20.21.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-source-azure-6.4.0-150700.20.21.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-syms-azure-6.4.0-150700.20.21.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-syms-azure-6.4.0-150700.20.21.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-23T16:28:51Z",
"details": "moderate"
}
],
"title": "CVE-2025-40154"
},
{
"cve": "CVE-2025-40156",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40156"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nPM / devfreq: mtk-cci: Fix potential error pointer dereference in probe()\n\nThe drv-\u003esram_reg pointer could be set to ERR_PTR(-EPROBE_DEFER) which\nwould lead to a error pointer dereference. Use IS_ERR_OR_NULL() to check\nthat the pointer is valid.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.20.21.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.20.21.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.20.21.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.20.21.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-devel-azure-6.4.0-150700.20.21.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-source-azure-6.4.0-150700.20.21.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-syms-azure-6.4.0-150700.20.21.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-syms-azure-6.4.0-150700.20.21.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40156",
"url": "https://www.suse.com/security/cve/CVE-2025-40156"
},
{
"category": "external",
"summary": "SUSE Bug 1253428 for CVE-2025-40156",
"url": "https://bugzilla.suse.com/1253428"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.20.21.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.20.21.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.20.21.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.20.21.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-devel-azure-6.4.0-150700.20.21.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-source-azure-6.4.0-150700.20.21.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-syms-azure-6.4.0-150700.20.21.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-syms-azure-6.4.0-150700.20.21.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.20.21.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.20.21.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.20.21.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.20.21.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-devel-azure-6.4.0-150700.20.21.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-source-azure-6.4.0-150700.20.21.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-syms-azure-6.4.0-150700.20.21.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-syms-azure-6.4.0-150700.20.21.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-23T16:28:51Z",
"details": "moderate"
}
],
"title": "CVE-2025-40156"
},
{
"cve": "CVE-2025-40157",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40157"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nEDAC/i10nm: Skip DIMM enumeration on a disabled memory controller\n\nWhen loading the i10nm_edac driver on some Intel Granite Rapids servers,\na call trace may appear as follows:\n\n UBSAN: shift-out-of-bounds in drivers/edac/skx_common.c:453:16\n shift exponent -66 is negative\n ...\n __ubsan_handle_shift_out_of_bounds+0x1e3/0x390\n skx_get_dimm_info.cold+0x47/0xd40 [skx_edac_common]\n i10nm_get_dimm_config+0x23e/0x390 [i10nm_edac]\n skx_register_mci+0x159/0x220 [skx_edac_common]\n i10nm_init+0xcb0/0x1ff0 [i10nm_edac]\n ...\n\nThis occurs because some BIOS may disable a memory controller if there\naren\u0027t any memory DIMMs populated on this memory controller. The DIMMMTR\nregister of this disabled memory controller contains the invalid value\n~0, resulting in the call trace above.\n\nFix this call trace by skipping DIMM enumeration on a disabled memory\ncontroller.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.20.21.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.20.21.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.20.21.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.20.21.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-devel-azure-6.4.0-150700.20.21.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-source-azure-6.4.0-150700.20.21.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-syms-azure-6.4.0-150700.20.21.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-syms-azure-6.4.0-150700.20.21.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40157",
"url": "https://www.suse.com/security/cve/CVE-2025-40157"
},
{
"category": "external",
"summary": "SUSE Bug 1253423 for CVE-2025-40157",
"url": "https://bugzilla.suse.com/1253423"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.20.21.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.20.21.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.20.21.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.20.21.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-devel-azure-6.4.0-150700.20.21.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-source-azure-6.4.0-150700.20.21.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-syms-azure-6.4.0-150700.20.21.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-syms-azure-6.4.0-150700.20.21.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.2,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:L/I:L/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.20.21.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.20.21.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.20.21.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.20.21.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-devel-azure-6.4.0-150700.20.21.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-source-azure-6.4.0-150700.20.21.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-syms-azure-6.4.0-150700.20.21.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-syms-azure-6.4.0-150700.20.21.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-23T16:28:51Z",
"details": "moderate"
}
],
"title": "CVE-2025-40157"
},
{
"cve": "CVE-2025-40159",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40159"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nxsk: Harden userspace-supplied xdp_desc validation\n\nTurned out certain clearly invalid values passed in xdp_desc from\nuserspace can pass xp_{,un}aligned_validate_desc() and then lead\nto UBs or just invalid frames to be queued for xmit.\n\ndesc-\u003elen close to ``U32_MAX`` with a non-zero pool-\u003etx_metadata_len\ncan cause positive integer overflow and wraparound, the same way low\nenough desc-\u003eaddr with a non-zero pool-\u003etx_metadata_len can cause\nnegative integer overflow. Both scenarios can then pass the\nvalidation successfully.\nThis doesn\u0027t happen with valid XSk applications, but can be used\nto perform attacks.\n\nAlways promote desc-\u003elen to ``u64`` first to exclude positive\noverflows of it. Use explicit check_{add,sub}_overflow() when\nvalidating desc-\u003eaddr (which is ``u64`` already).\n\nbloat-o-meter reports a little growth of the code size:\n\nadd/remove: 0/0 grow/shrink: 2/1 up/down: 60/-16 (44)\nFunction old new delta\nxskq_cons_peek_desc 299 330 +31\nxsk_tx_peek_release_desc_batch 973 1002 +29\nxsk_generic_xmit 3148 3132 -16\n\nbut hopefully this doesn\u0027t hurt the performance much.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.20.21.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.20.21.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.20.21.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.20.21.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-devel-azure-6.4.0-150700.20.21.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-source-azure-6.4.0-150700.20.21.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-syms-azure-6.4.0-150700.20.21.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-syms-azure-6.4.0-150700.20.21.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40159",
"url": "https://www.suse.com/security/cve/CVE-2025-40159"
},
{
"category": "external",
"summary": "SUSE Bug 1253403 for CVE-2025-40159",
"url": "https://bugzilla.suse.com/1253403"
},
{
"category": "external",
"summary": "SUSE Bug 1253404 for CVE-2025-40159",
"url": "https://bugzilla.suse.com/1253404"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.20.21.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.20.21.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.20.21.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.20.21.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-devel-azure-6.4.0-150700.20.21.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-source-azure-6.4.0-150700.20.21.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-syms-azure-6.4.0-150700.20.21.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-syms-azure-6.4.0-150700.20.21.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.20.21.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.20.21.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.20.21.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.20.21.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-devel-azure-6.4.0-150700.20.21.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-source-azure-6.4.0-150700.20.21.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-syms-azure-6.4.0-150700.20.21.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-syms-azure-6.4.0-150700.20.21.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-23T16:28:51Z",
"details": "important"
}
],
"title": "CVE-2025-40159"
},
{
"cve": "CVE-2025-40164",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40164"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nusbnet: Fix using smp_processor_id() in preemptible code warnings\n\nSyzbot reported the following warning:\n\nBUG: using smp_processor_id() in preemptible [00000000] code: dhcpcd/2879\ncaller is usbnet_skb_return+0x74/0x490 drivers/net/usb/usbnet.c:331\nCPU: 1 UID: 0 PID: 2879 Comm: dhcpcd Not tainted 6.15.0-rc4-syzkaller-00098-g615dca38c2ea #0 PREEMPT(voluntary)\nCall Trace:\n \u003cTASK\u003e\n __dump_stack lib/dump_stack.c:94 [inline]\n dump_stack_lvl+0x16c/0x1f0 lib/dump_stack.c:120\n check_preemption_disabled+0xd0/0xe0 lib/smp_processor_id.c:49\n usbnet_skb_return+0x74/0x490 drivers/net/usb/usbnet.c:331\n usbnet_resume_rx+0x4b/0x170 drivers/net/usb/usbnet.c:708\n usbnet_change_mtu+0x1be/0x220 drivers/net/usb/usbnet.c:417\n __dev_set_mtu net/core/dev.c:9443 [inline]\n netif_set_mtu_ext+0x369/0x5c0 net/core/dev.c:9496\n netif_set_mtu+0xb0/0x160 net/core/dev.c:9520\n dev_set_mtu+0xae/0x170 net/core/dev_api.c:247\n dev_ifsioc+0xa31/0x18d0 net/core/dev_ioctl.c:572\n dev_ioctl+0x223/0x10e0 net/core/dev_ioctl.c:821\n sock_do_ioctl+0x19d/0x280 net/socket.c:1204\n sock_ioctl+0x42f/0x6a0 net/socket.c:1311\n vfs_ioctl fs/ioctl.c:51 [inline]\n __do_sys_ioctl fs/ioctl.c:906 [inline]\n __se_sys_ioctl fs/ioctl.c:892 [inline]\n __x64_sys_ioctl+0x190/0x200 fs/ioctl.c:892\n do_syscall_x64 arch/x86/entry/syscall_64.c:63 [inline]\n do_syscall_64+0xcd/0x260 arch/x86/entry/syscall_64.c:94\n entry_SYSCALL_64_after_hwframe+0x77/0x7f\n\nFor historical and portability reasons, the netif_rx() is usually\nrun in the softirq or interrupt context, this commit therefore add\nlocal_bh_disable/enable() protection in the usbnet_resume_rx().",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.20.21.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.20.21.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.20.21.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.20.21.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-devel-azure-6.4.0-150700.20.21.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-source-azure-6.4.0-150700.20.21.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-syms-azure-6.4.0-150700.20.21.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-syms-azure-6.4.0-150700.20.21.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40164",
"url": "https://www.suse.com/security/cve/CVE-2025-40164"
},
{
"category": "external",
"summary": "SUSE Bug 1253407 for CVE-2025-40164",
"url": "https://bugzilla.suse.com/1253407"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.20.21.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.20.21.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.20.21.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.20.21.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-devel-azure-6.4.0-150700.20.21.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-source-azure-6.4.0-150700.20.21.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-syms-azure-6.4.0-150700.20.21.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-syms-azure-6.4.0-150700.20.21.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.7,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.20.21.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.20.21.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.20.21.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.20.21.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-devel-azure-6.4.0-150700.20.21.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-source-azure-6.4.0-150700.20.21.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-syms-azure-6.4.0-150700.20.21.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-syms-azure-6.4.0-150700.20.21.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-23T16:28:51Z",
"details": "moderate"
}
],
"title": "CVE-2025-40164"
},
{
"cve": "CVE-2025-40168",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40168"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nsmc: Use __sk_dst_get() and dst_dev_rcu() in smc_clc_prfx_match().\n\nsmc_clc_prfx_match() is called from smc_listen_work() and\nnot under RCU nor RTNL.\n\nUsing sk_dst_get(sk)-\u003edev could trigger UAF.\n\nLet\u0027s use __sk_dst_get() and dst_dev_rcu().\n\nNote that the returned value of smc_clc_prfx_match() is not\nused in the caller.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.20.21.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.20.21.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.20.21.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.20.21.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-devel-azure-6.4.0-150700.20.21.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-source-azure-6.4.0-150700.20.21.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-syms-azure-6.4.0-150700.20.21.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-syms-azure-6.4.0-150700.20.21.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40168",
"url": "https://www.suse.com/security/cve/CVE-2025-40168"
},
{
"category": "external",
"summary": "SUSE Bug 1253427 for CVE-2025-40168",
"url": "https://bugzilla.suse.com/1253427"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.20.21.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.20.21.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.20.21.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.20.21.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-devel-azure-6.4.0-150700.20.21.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-source-azure-6.4.0-150700.20.21.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-syms-azure-6.4.0-150700.20.21.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-syms-azure-6.4.0-150700.20.21.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.20.21.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.20.21.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.20.21.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.20.21.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-devel-azure-6.4.0-150700.20.21.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-source-azure-6.4.0-150700.20.21.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-syms-azure-6.4.0-150700.20.21.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-syms-azure-6.4.0-150700.20.21.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-23T16:28:51Z",
"details": "moderate"
}
],
"title": "CVE-2025-40168"
},
{
"cve": "CVE-2025-40169",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40169"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nbpf: Reject negative offsets for ALU ops\n\nWhen verifying BPF programs, the check_alu_op() function validates\ninstructions with ALU operations. The \u0027offset\u0027 field in these\ninstructions is a signed 16-bit integer.\n\nThe existing check \u0027insn-\u003eoff \u003e 1\u0027 was intended to ensure the offset is\neither 0, or 1 for BPF_MOD/BPF_DIV. However, because \u0027insn-\u003eoff\u0027 is\nsigned, this check incorrectly accepts all negative values (e.g., -1).\n\nThis commit tightens the validation by changing the condition to\n\u0027(insn-\u003eoff != 0 \u0026\u0026 insn-\u003eoff != 1)\u0027. This ensures that any value\nother than the explicitly permitted 0 and 1 is rejected, hardening the\nverifier against malformed BPF programs.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.20.21.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.20.21.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.20.21.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.20.21.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-devel-azure-6.4.0-150700.20.21.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-source-azure-6.4.0-150700.20.21.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-syms-azure-6.4.0-150700.20.21.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-syms-azure-6.4.0-150700.20.21.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40169",
"url": "https://www.suse.com/security/cve/CVE-2025-40169"
},
{
"category": "external",
"summary": "SUSE Bug 1253416 for CVE-2025-40169",
"url": "https://bugzilla.suse.com/1253416"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.20.21.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.20.21.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.20.21.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.20.21.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-devel-azure-6.4.0-150700.20.21.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-source-azure-6.4.0-150700.20.21.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-syms-azure-6.4.0-150700.20.21.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-syms-azure-6.4.0-150700.20.21.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.8,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.20.21.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.20.21.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.20.21.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.20.21.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-devel-azure-6.4.0-150700.20.21.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-source-azure-6.4.0-150700.20.21.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-syms-azure-6.4.0-150700.20.21.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-syms-azure-6.4.0-150700.20.21.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-23T16:28:51Z",
"details": "moderate"
}
],
"title": "CVE-2025-40169"
},
{
"cve": "CVE-2025-40171",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40171"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnvmet-fc: move lsop put work to nvmet_fc_ls_req_op\n\nIt\u0027s possible for more than one async command to be in flight from\n__nvmet_fc_send_ls_req. For each command, a tgtport reference is taken.\n\nIn the current code, only one put work item is queued at a time, which\nresults in a leaked reference.\n\nTo fix this, move the work item to the nvmet_fc_ls_req_op struct, which\nalready tracks all resources related to the command.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.20.21.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.20.21.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.20.21.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.20.21.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-devel-azure-6.4.0-150700.20.21.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-source-azure-6.4.0-150700.20.21.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-syms-azure-6.4.0-150700.20.21.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-syms-azure-6.4.0-150700.20.21.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40171",
"url": "https://www.suse.com/security/cve/CVE-2025-40171"
},
{
"category": "external",
"summary": "SUSE Bug 1253412 for CVE-2025-40171",
"url": "https://bugzilla.suse.com/1253412"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.20.21.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.20.21.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.20.21.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.20.21.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-devel-azure-6.4.0-150700.20.21.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-source-azure-6.4.0-150700.20.21.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-syms-azure-6.4.0-150700.20.21.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-syms-azure-6.4.0-150700.20.21.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.20.21.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.20.21.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.20.21.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.20.21.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-devel-azure-6.4.0-150700.20.21.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-source-azure-6.4.0-150700.20.21.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-syms-azure-6.4.0-150700.20.21.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-syms-azure-6.4.0-150700.20.21.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-23T16:28:51Z",
"details": "moderate"
}
],
"title": "CVE-2025-40171"
},
{
"cve": "CVE-2025-40172",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40172"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\naccel/qaic: Treat remaining == 0 as error in find_and_map_user_pages()\n\nCurrently, if find_and_map_user_pages() takes a DMA xfer request from the\nuser with a length field set to 0, or in a rare case, the host receives\nQAIC_TRANS_DMA_XFER_CONT from the device where resources-\u003exferred_dma_size\nis equal to the requested transaction size, the function will return 0\nbefore allocating an sgt or setting the fields of the dma_xfer struct.\nIn that case, encode_addr_size_pairs() will try to access the sgt which\nwill lead to a general protection fault.\n\nReturn an EINVAL in case the user provides a zero-sized ALP, or the device\nrequests continuation after all of the bytes have been transferred.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.20.21.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.20.21.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.20.21.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.20.21.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-devel-azure-6.4.0-150700.20.21.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-source-azure-6.4.0-150700.20.21.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-syms-azure-6.4.0-150700.20.21.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-syms-azure-6.4.0-150700.20.21.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40172",
"url": "https://www.suse.com/security/cve/CVE-2025-40172"
},
{
"category": "external",
"summary": "SUSE Bug 1253424 for CVE-2025-40172",
"url": "https://bugzilla.suse.com/1253424"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.20.21.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.20.21.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.20.21.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.20.21.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-devel-azure-6.4.0-150700.20.21.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-source-azure-6.4.0-150700.20.21.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-syms-azure-6.4.0-150700.20.21.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-syms-azure-6.4.0-150700.20.21.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.20.21.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.20.21.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.20.21.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.20.21.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-devel-azure-6.4.0-150700.20.21.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-source-azure-6.4.0-150700.20.21.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-syms-azure-6.4.0-150700.20.21.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-syms-azure-6.4.0-150700.20.21.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-23T16:28:51Z",
"details": "moderate"
}
],
"title": "CVE-2025-40172"
},
{
"cve": "CVE-2025-40173",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40173"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnet/ip6_tunnel: Prevent perpetual tunnel growth\n\nSimilarly to ipv4 tunnel, ipv6 version updates dev-\u003eneeded_headroom, too.\nWhile ipv4 tunnel headroom adjustment growth was limited in\ncommit 5ae1e9922bbd (\"net: ip_tunnel: prevent perpetual headroom growth\"),\nipv6 tunnel yet increases the headroom without any ceiling.\n\nReflect ipv4 tunnel headroom adjustment limit on ipv6 version.\n\nCredits to Francesco Ruggeri, who was originally debugging this issue\nand wrote local Arista-specific patch and a reproducer.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.20.21.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.20.21.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.20.21.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.20.21.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-devel-azure-6.4.0-150700.20.21.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-source-azure-6.4.0-150700.20.21.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-syms-azure-6.4.0-150700.20.21.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-syms-azure-6.4.0-150700.20.21.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40173",
"url": "https://www.suse.com/security/cve/CVE-2025-40173"
},
{
"category": "external",
"summary": "SUSE Bug 1253421 for CVE-2025-40173",
"url": "https://bugzilla.suse.com/1253421"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.20.21.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.20.21.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.20.21.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.20.21.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-devel-azure-6.4.0-150700.20.21.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-source-azure-6.4.0-150700.20.21.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-syms-azure-6.4.0-150700.20.21.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-syms-azure-6.4.0-150700.20.21.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.7,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.20.21.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.20.21.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.20.21.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.20.21.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-devel-azure-6.4.0-150700.20.21.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-source-azure-6.4.0-150700.20.21.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-syms-azure-6.4.0-150700.20.21.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-syms-azure-6.4.0-150700.20.21.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-23T16:28:51Z",
"details": "moderate"
}
],
"title": "CVE-2025-40173"
},
{
"cve": "CVE-2025-40176",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40176"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\ntls: wait for pending async decryptions if tls_strp_msg_hold fails\n\nAsync decryption calls tls_strp_msg_hold to create a clone of the\ninput skb to hold references to the memory it uses. If we fail to\nallocate that clone, proceeding with async decryption can lead to\nvarious issues (UAF on the skb, writing into userspace memory after\nthe recv() call has returned).\n\nIn this case, wait for all pending decryption requests.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.20.21.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.20.21.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.20.21.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.20.21.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-devel-azure-6.4.0-150700.20.21.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-source-azure-6.4.0-150700.20.21.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-syms-azure-6.4.0-150700.20.21.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-syms-azure-6.4.0-150700.20.21.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40176",
"url": "https://www.suse.com/security/cve/CVE-2025-40176"
},
{
"category": "external",
"summary": "SUSE Bug 1253425 for CVE-2025-40176",
"url": "https://bugzilla.suse.com/1253425"
},
{
"category": "external",
"summary": "SUSE Bug 1254100 for CVE-2025-40176",
"url": "https://bugzilla.suse.com/1254100"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.20.21.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.20.21.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.20.21.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.20.21.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-devel-azure-6.4.0-150700.20.21.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-source-azure-6.4.0-150700.20.21.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-syms-azure-6.4.0-150700.20.21.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-syms-azure-6.4.0-150700.20.21.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.20.21.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.20.21.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.20.21.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.20.21.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-devel-azure-6.4.0-150700.20.21.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-source-azure-6.4.0-150700.20.21.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-syms-azure-6.4.0-150700.20.21.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-syms-azure-6.4.0-150700.20.21.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-23T16:28:51Z",
"details": "important"
}
],
"title": "CVE-2025-40176"
},
{
"cve": "CVE-2025-40180",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40180"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nmailbox: zynqmp-ipi: Fix out-of-bounds access in mailbox cleanup loop\n\nThe cleanup loop was starting at the wrong array index, causing\nout-of-bounds access.\nStart the loop at the correct index for zero-indexed arrays to prevent\naccessing memory beyond the allocated array bounds.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.20.21.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.20.21.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.20.21.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.20.21.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-devel-azure-6.4.0-150700.20.21.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-source-azure-6.4.0-150700.20.21.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-syms-azure-6.4.0-150700.20.21.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-syms-azure-6.4.0-150700.20.21.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40180",
"url": "https://www.suse.com/security/cve/CVE-2025-40180"
},
{
"category": "external",
"summary": "SUSE Bug 1253440 for CVE-2025-40180",
"url": "https://bugzilla.suse.com/1253440"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.20.21.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.20.21.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.20.21.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.20.21.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-devel-azure-6.4.0-150700.20.21.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-source-azure-6.4.0-150700.20.21.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-syms-azure-6.4.0-150700.20.21.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-syms-azure-6.4.0-150700.20.21.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.20.21.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.20.21.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.20.21.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.20.21.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-devel-azure-6.4.0-150700.20.21.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-source-azure-6.4.0-150700.20.21.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-syms-azure-6.4.0-150700.20.21.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-syms-azure-6.4.0-150700.20.21.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-23T16:28:51Z",
"details": "moderate"
}
],
"title": "CVE-2025-40180"
},
{
"cve": "CVE-2025-40183",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40183"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nbpf: Fix metadata_dst leak __bpf_redirect_neigh_v{4,6}\n\nCilium has a BPF egress gateway feature which forces outgoing K8s Pod\ntraffic to pass through dedicated egress gateways which then SNAT the\ntraffic in order to interact with stable IPs outside the cluster.\n\nThe traffic is directed to the gateway via vxlan tunnel in collect md\nmode. A recent BPF change utilized the bpf_redirect_neigh() helper to\nforward packets after the arrival and decap on vxlan, which turned out\nover time that the kmalloc-256 slab usage in kernel was ever-increasing.\n\nThe issue was that vxlan allocates the metadata_dst object and attaches\nit through a fake dst entry to the skb. The latter was never released\nthough given bpf_redirect_neigh() was merely setting the new dst entry\nvia skb_dst_set() without dropping an existing one first.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.20.21.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.20.21.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.20.21.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.20.21.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-devel-azure-6.4.0-150700.20.21.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-source-azure-6.4.0-150700.20.21.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-syms-azure-6.4.0-150700.20.21.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-syms-azure-6.4.0-150700.20.21.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40183",
"url": "https://www.suse.com/security/cve/CVE-2025-40183"
},
{
"category": "external",
"summary": "SUSE Bug 1253441 for CVE-2025-40183",
"url": "https://bugzilla.suse.com/1253441"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.20.21.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.20.21.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.20.21.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.20.21.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-devel-azure-6.4.0-150700.20.21.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-source-azure-6.4.0-150700.20.21.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-syms-azure-6.4.0-150700.20.21.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-syms-azure-6.4.0-150700.20.21.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.20.21.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.20.21.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.20.21.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.20.21.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-devel-azure-6.4.0-150700.20.21.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-source-azure-6.4.0-150700.20.21.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-syms-azure-6.4.0-150700.20.21.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-syms-azure-6.4.0-150700.20.21.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-23T16:28:51Z",
"details": "moderate"
}
],
"title": "CVE-2025-40183"
},
{
"cve": "CVE-2025-40185",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40185"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nice: ice_adapter: release xa entry on adapter allocation failure\n\nWhen ice_adapter_new() fails, the reserved XArray entry created by\nxa_insert() is not released. This causes subsequent insertions at\nthe same index to return -EBUSY, potentially leading to\nNULL pointer dereferences.\n\nReorder the operations as suggested by Przemek Kitszel:\n1. Check if adapter already exists (xa_load)\n2. Reserve the XArray slot (xa_reserve)\n3. Allocate the adapter (ice_adapter_new)\n4. Store the adapter (xa_store)",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.20.21.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.20.21.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.20.21.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.20.21.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-devel-azure-6.4.0-150700.20.21.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-source-azure-6.4.0-150700.20.21.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-syms-azure-6.4.0-150700.20.21.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-syms-azure-6.4.0-150700.20.21.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40185",
"url": "https://www.suse.com/security/cve/CVE-2025-40185"
},
{
"category": "external",
"summary": "SUSE Bug 1253394 for CVE-2025-40185",
"url": "https://bugzilla.suse.com/1253394"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.20.21.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.20.21.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.20.21.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.20.21.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-devel-azure-6.4.0-150700.20.21.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-source-azure-6.4.0-150700.20.21.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-syms-azure-6.4.0-150700.20.21.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-syms-azure-6.4.0-150700.20.21.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.20.21.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.20.21.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.20.21.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.20.21.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-devel-azure-6.4.0-150700.20.21.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-source-azure-6.4.0-150700.20.21.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-syms-azure-6.4.0-150700.20.21.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-syms-azure-6.4.0-150700.20.21.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-23T16:28:51Z",
"details": "moderate"
}
],
"title": "CVE-2025-40185"
},
{
"cve": "CVE-2025-40186",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40186"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\ntcp: Don\u0027t call reqsk_fastopen_remove() in tcp_conn_request().\n\nsyzbot reported the splat below in tcp_conn_request(). [0]\n\nIf a listener is close()d while a TFO socket is being processed in\ntcp_conn_request(), inet_csk_reqsk_queue_add() does not set reqsk-\u003esk\nand calls inet_child_forget(), which calls tcp_disconnect() for the\nTFO socket.\n\nAfter the cited commit, tcp_disconnect() calls reqsk_fastopen_remove(),\nwhere reqsk_put() is called due to !reqsk-\u003esk.\n\nThen, reqsk_fastopen_remove() in tcp_conn_request() decrements the\nlast req-\u003ersk_refcnt and frees reqsk, and __reqsk_free() at the\ndrop_and_free label causes the refcount underflow for the listener\nand double-free of the reqsk.\n\nLet\u0027s remove reqsk_fastopen_remove() in tcp_conn_request().\n\nNote that other callers make sure tp-\u003efastopen_rsk is not NULL.\n\n[0]:\nrefcount_t: underflow; use-after-free.\nWARNING: CPU: 12 PID: 5563 at lib/refcount.c:28 refcount_warn_saturate (lib/refcount.c:28)\nModules linked in:\nCPU: 12 UID: 0 PID: 5563 Comm: syz-executor Not tainted syzkaller #0 PREEMPT(full)\nHardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025\nRIP: 0010:refcount_warn_saturate (lib/refcount.c:28)\nCode: ab e8 8e b4 98 ff 0f 0b c3 cc cc cc cc cc 80 3d a4 e4 d6 01 00 75 9c c6 05 9b e4 d6 01 01 48 c7 c7 e8 df fb ab e8 6a b4 98 ff \u003c0f\u003e 0b e9 03 5b 76 00 cc 80 3d 7d e4 d6 01 00 0f 85 74 ff ff ff c6\nRSP: 0018:ffffa79fc0304a98 EFLAGS: 00010246\nRAX: d83af4db1c6b3900 RBX: ffff9f65c7a69020 RCX: d83af4db1c6b3900\nRDX: 0000000000000000 RSI: 00000000ffff7fff RDI: ffffffffac78a280\nRBP: 000000009d781b60 R08: 0000000000007fff R09: ffffffffac6ca280\nR10: 0000000000017ffd R11: 0000000000000004 R12: ffff9f65c7b4f100\nR13: ffff9f65c7d23c00 R14: ffff9f65c7d26000 R15: ffff9f65c7a64ef8\nFS: 00007f9f962176c0(0000) GS:ffff9f65fcf00000(0000) knlGS:0000000000000000\nCS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033\nCR2: 0000200000000180 CR3: 000000000dbbe006 CR4: 0000000000372ef0\nCall Trace:\n \u003cIRQ\u003e\n tcp_conn_request (./include/linux/refcount.h:400 ./include/linux/refcount.h:432 ./include/linux/refcount.h:450 ./include/net/sock.h:1965 ./include/net/request_sock.h:131 net/ipv4/tcp_input.c:7301)\n tcp_rcv_state_process (net/ipv4/tcp_input.c:6708)\n tcp_v6_do_rcv (net/ipv6/tcp_ipv6.c:1670)\n tcp_v6_rcv (net/ipv6/tcp_ipv6.c:1906)\n ip6_protocol_deliver_rcu (net/ipv6/ip6_input.c:438)\n ip6_input (net/ipv6/ip6_input.c:500)\n ipv6_rcv (net/ipv6/ip6_input.c:311)\n __netif_receive_skb (net/core/dev.c:6104)\n process_backlog (net/core/dev.c:6456)\n __napi_poll (net/core/dev.c:7506)\n net_rx_action (net/core/dev.c:7569 net/core/dev.c:7696)\n handle_softirqs (kernel/softirq.c:579)\n do_softirq (kernel/softirq.c:480)\n \u003c/IRQ\u003e",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.20.21.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.20.21.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.20.21.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.20.21.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-devel-azure-6.4.0-150700.20.21.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-source-azure-6.4.0-150700.20.21.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-syms-azure-6.4.0-150700.20.21.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-syms-azure-6.4.0-150700.20.21.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40186",
"url": "https://www.suse.com/security/cve/CVE-2025-40186"
},
{
"category": "external",
"summary": "SUSE Bug 1253438 for CVE-2025-40186",
"url": "https://bugzilla.suse.com/1253438"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.20.21.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.20.21.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.20.21.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.20.21.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-devel-azure-6.4.0-150700.20.21.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-source-azure-6.4.0-150700.20.21.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-syms-azure-6.4.0-150700.20.21.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-syms-azure-6.4.0-150700.20.21.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.20.21.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.20.21.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.20.21.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.20.21.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-devel-azure-6.4.0-150700.20.21.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-source-azure-6.4.0-150700.20.21.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-syms-azure-6.4.0-150700.20.21.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-syms-azure-6.4.0-150700.20.21.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-23T16:28:51Z",
"details": "important"
}
],
"title": "CVE-2025-40186"
},
{
"cve": "CVE-2025-40188",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40188"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\npwm: berlin: Fix wrong register in suspend/resume\n\nThe \u0027enable\u0027 register should be BERLIN_PWM_EN rather than\nBERLIN_PWM_ENABLE, otherwise, the driver accesses wrong address, there\nwill be cpu exception then kernel panic during suspend/resume.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.20.21.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.20.21.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.20.21.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.20.21.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-devel-azure-6.4.0-150700.20.21.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-source-azure-6.4.0-150700.20.21.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-syms-azure-6.4.0-150700.20.21.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-syms-azure-6.4.0-150700.20.21.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40188",
"url": "https://www.suse.com/security/cve/CVE-2025-40188"
},
{
"category": "external",
"summary": "SUSE Bug 1253449 for CVE-2025-40188",
"url": "https://bugzilla.suse.com/1253449"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.20.21.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.20.21.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.20.21.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.20.21.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-devel-azure-6.4.0-150700.20.21.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-source-azure-6.4.0-150700.20.21.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-syms-azure-6.4.0-150700.20.21.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-syms-azure-6.4.0-150700.20.21.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.20.21.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.20.21.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.20.21.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.20.21.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-devel-azure-6.4.0-150700.20.21.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-source-azure-6.4.0-150700.20.21.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-syms-azure-6.4.0-150700.20.21.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-syms-azure-6.4.0-150700.20.21.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-23T16:28:51Z",
"details": "moderate"
}
],
"title": "CVE-2025-40188"
},
{
"cve": "CVE-2025-40194",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40194"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\ncpufreq: intel_pstate: Fix object lifecycle issue in update_qos_request()\n\nThe cpufreq_cpu_put() call in update_qos_request() takes place too early\nbecause the latter subsequently calls freq_qos_update_request() that\nindirectly accesses the policy object in question through the QoS request\nobject passed to it.\n\nFortunately, update_qos_request() is called under intel_pstate_driver_lock,\nso this issue does not matter for changing the intel_pstate operation\nmode, but it theoretically can cause a crash to occur on CPU device hot\nremoval (which currently can only happen in virt, but it is formally\nsupported nevertheless).\n\nAddress this issue by modifying update_qos_request() to drop the\nreference to the policy later.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.20.21.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.20.21.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.20.21.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.20.21.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-devel-azure-6.4.0-150700.20.21.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-source-azure-6.4.0-150700.20.21.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-syms-azure-6.4.0-150700.20.21.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-syms-azure-6.4.0-150700.20.21.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40194",
"url": "https://www.suse.com/security/cve/CVE-2025-40194"
},
{
"category": "external",
"summary": "SUSE Bug 1253445 for CVE-2025-40194",
"url": "https://bugzilla.suse.com/1253445"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.20.21.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.20.21.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.20.21.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.20.21.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-devel-azure-6.4.0-150700.20.21.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-source-azure-6.4.0-150700.20.21.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-syms-azure-6.4.0-150700.20.21.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-syms-azure-6.4.0-150700.20.21.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.7,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.20.21.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.20.21.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.20.21.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.20.21.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-devel-azure-6.4.0-150700.20.21.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-source-azure-6.4.0-150700.20.21.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-syms-azure-6.4.0-150700.20.21.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-syms-azure-6.4.0-150700.20.21.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-23T16:28:51Z",
"details": "moderate"
}
],
"title": "CVE-2025-40194"
},
{
"cve": "CVE-2025-40198",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40198"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\next4: avoid potential buffer over-read in parse_apply_sb_mount_options()\n\nUnlike other strings in the ext4 superblock, we rely on tune2fs to\nmake sure s_mount_opts is NUL terminated. Harden\nparse_apply_sb_mount_options() by treating s_mount_opts as a potential\n__nonstring.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.20.21.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.20.21.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.20.21.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.20.21.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-devel-azure-6.4.0-150700.20.21.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-source-azure-6.4.0-150700.20.21.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-syms-azure-6.4.0-150700.20.21.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-syms-azure-6.4.0-150700.20.21.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40198",
"url": "https://www.suse.com/security/cve/CVE-2025-40198"
},
{
"category": "external",
"summary": "SUSE Bug 1253453 for CVE-2025-40198",
"url": "https://bugzilla.suse.com/1253453"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.20.21.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.20.21.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.20.21.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.20.21.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-devel-azure-6.4.0-150700.20.21.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-source-azure-6.4.0-150700.20.21.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-syms-azure-6.4.0-150700.20.21.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-syms-azure-6.4.0-150700.20.21.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.20.21.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.20.21.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.20.21.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.20.21.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-devel-azure-6.4.0-150700.20.21.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-source-azure-6.4.0-150700.20.21.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-syms-azure-6.4.0-150700.20.21.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-syms-azure-6.4.0-150700.20.21.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-23T16:28:51Z",
"details": "moderate"
}
],
"title": "CVE-2025-40198"
},
{
"cve": "CVE-2025-40200",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40200"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nSquashfs: reject negative file sizes in squashfs_read_inode()\n\nSyskaller reports a \"WARNING in ovl_copy_up_file\" in overlayfs.\n\nThis warning is ultimately caused because the underlying Squashfs file\nsystem returns a file with a negative file size.\n\nThis commit checks for a negative file size and returns EINVAL.\n\n[phillip@squashfs.org.uk: only need to check 64 bit quantity]",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.20.21.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.20.21.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.20.21.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.20.21.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-devel-azure-6.4.0-150700.20.21.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-source-azure-6.4.0-150700.20.21.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-syms-azure-6.4.0-150700.20.21.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-syms-azure-6.4.0-150700.20.21.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40200",
"url": "https://www.suse.com/security/cve/CVE-2025-40200"
},
{
"category": "external",
"summary": "SUSE Bug 1253448 for CVE-2025-40200",
"url": "https://bugzilla.suse.com/1253448"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.20.21.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.20.21.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.20.21.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.20.21.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-devel-azure-6.4.0-150700.20.21.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-source-azure-6.4.0-150700.20.21.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-syms-azure-6.4.0-150700.20.21.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-syms-azure-6.4.0-150700.20.21.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.20.21.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.20.21.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.20.21.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.20.21.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-devel-azure-6.4.0-150700.20.21.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-source-azure-6.4.0-150700.20.21.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-syms-azure-6.4.0-150700.20.21.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-syms-azure-6.4.0-150700.20.21.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-23T16:28:51Z",
"details": "moderate"
}
],
"title": "CVE-2025-40200"
},
{
"cve": "CVE-2025-40204",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40204"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nsctp: Fix MAC comparison to be constant-time\n\nTo prevent timing attacks, MACs need to be compared in constant time.\nUse the appropriate helper function for this.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.20.21.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.20.21.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.20.21.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.20.21.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-devel-azure-6.4.0-150700.20.21.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-source-azure-6.4.0-150700.20.21.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-syms-azure-6.4.0-150700.20.21.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-syms-azure-6.4.0-150700.20.21.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40204",
"url": "https://www.suse.com/security/cve/CVE-2025-40204"
},
{
"category": "external",
"summary": "SUSE Bug 1253436 for CVE-2025-40204",
"url": "https://bugzilla.suse.com/1253436"
},
{
"category": "external",
"summary": "SUSE Bug 1253437 for CVE-2025-40204",
"url": "https://bugzilla.suse.com/1253437"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.20.21.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.20.21.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.20.21.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.20.21.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-devel-azure-6.4.0-150700.20.21.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-source-azure-6.4.0-150700.20.21.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-syms-azure-6.4.0-150700.20.21.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-syms-azure-6.4.0-150700.20.21.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.20.21.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.20.21.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.20.21.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.20.21.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-devel-azure-6.4.0-150700.20.21.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-source-azure-6.4.0-150700.20.21.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-syms-azure-6.4.0-150700.20.21.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-syms-azure-6.4.0-150700.20.21.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-23T16:28:51Z",
"details": "important"
}
],
"title": "CVE-2025-40204"
},
{
"cve": "CVE-2025-40205",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40205"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nbtrfs: avoid potential out-of-bounds in btrfs_encode_fh()\n\nThe function btrfs_encode_fh() does not properly account for the three\ncases it handles.\n\nBefore writing to the file handle (fh), the function only returns to the\nuser BTRFS_FID_SIZE_NON_CONNECTABLE (5 dwords, 20 bytes) or\nBTRFS_FID_SIZE_CONNECTABLE (8 dwords, 32 bytes).\n\nHowever, when a parent exists and the root ID of the parent and the\ninode are different, the function writes BTRFS_FID_SIZE_CONNECTABLE_ROOT\n(10 dwords, 40 bytes).\n\nIf *max_len is not large enough, this write goes out of bounds because\nBTRFS_FID_SIZE_CONNECTABLE_ROOT is greater than\nBTRFS_FID_SIZE_CONNECTABLE originally returned.\n\nThis results in an 8-byte out-of-bounds write at\nfid-\u003eparent_root_objectid = parent_root_id.\n\nA previous attempt to fix this issue was made but was lost.\n\nhttps://lore.kernel.org/all/4CADAEEC020000780001B32C@vpn.id2.novell.com/\n\nAlthough this issue does not seem to be easily triggerable, it is a\npotential memory corruption bug that should be fixed. This patch\nresolves the issue by ensuring the function returns the appropriate size\nfor all three cases and validates that *max_len is large enough before\nwriting any data.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.20.21.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.20.21.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.20.21.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.20.21.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-devel-azure-6.4.0-150700.20.21.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-source-azure-6.4.0-150700.20.21.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-syms-azure-6.4.0-150700.20.21.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-syms-azure-6.4.0-150700.20.21.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40205",
"url": "https://www.suse.com/security/cve/CVE-2025-40205"
},
{
"category": "external",
"summary": "SUSE Bug 1253456 for CVE-2025-40205",
"url": "https://bugzilla.suse.com/1253456"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.20.21.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.20.21.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.20.21.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.20.21.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-devel-azure-6.4.0-150700.20.21.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-source-azure-6.4.0-150700.20.21.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-syms-azure-6.4.0-150700.20.21.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-syms-azure-6.4.0-150700.20.21.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.20.21.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.20.21.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.20.21.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.20.21.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-devel-azure-6.4.0-150700.20.21.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-source-azure-6.4.0-150700.20.21.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-syms-azure-6.4.0-150700.20.21.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-syms-azure-6.4.0-150700.20.21.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-23T16:28:51Z",
"details": "moderate"
}
],
"title": "CVE-2025-40205"
},
{
"cve": "CVE-2025-40206",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40206"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnetfilter: nft_objref: validate objref and objrefmap expressions\n\nReferencing a synproxy stateful object from OUTPUT hook causes kernel\ncrash due to infinite recursive calls:\n\nBUG: TASK stack guard page was hit at 000000008bda5b8c (stack is 000000003ab1c4a5..00000000494d8b12)\n[...]\nCall Trace:\n __find_rr_leaf+0x99/0x230\n fib6_table_lookup+0x13b/0x2d0\n ip6_pol_route+0xa4/0x400\n fib6_rule_lookup+0x156/0x240\n ip6_route_output_flags+0xc6/0x150\n __nf_ip6_route+0x23/0x50\n synproxy_send_tcp_ipv6+0x106/0x200\n synproxy_send_client_synack_ipv6+0x1aa/0x1f0\n nft_synproxy_do_eval+0x263/0x310\n nft_do_chain+0x5a8/0x5f0 [nf_tables\n nft_do_chain_inet+0x98/0x110\n nf_hook_slow+0x43/0xc0\n __ip6_local_out+0xf0/0x170\n ip6_local_out+0x17/0x70\n synproxy_send_tcp_ipv6+0x1a2/0x200\n synproxy_send_client_synack_ipv6+0x1aa/0x1f0\n[...]\n\nImplement objref and objrefmap expression validate functions.\n\nCurrently, only NFT_OBJECT_SYNPROXY object type requires validation.\nThis will also handle a jump to a chain using a synproxy object from the\nOUTPUT hook.\n\nNow when trying to reference a synproxy object in the OUTPUT hook, nft\nwill produce the following error:\n\nsynproxy_crash.nft: Error: Could not process rule: Operation not supported\n synproxy name mysynproxy\n ^^^^^^^^^^^^^^^^^^^^^^^^",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.20.21.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.20.21.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.20.21.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.20.21.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-devel-azure-6.4.0-150700.20.21.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-source-azure-6.4.0-150700.20.21.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-syms-azure-6.4.0-150700.20.21.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-syms-azure-6.4.0-150700.20.21.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40206",
"url": "https://www.suse.com/security/cve/CVE-2025-40206"
},
{
"category": "external",
"summary": "SUSE Bug 1253393 for CVE-2025-40206",
"url": "https://bugzilla.suse.com/1253393"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.20.21.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.20.21.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.20.21.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.20.21.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-devel-azure-6.4.0-150700.20.21.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-source-azure-6.4.0-150700.20.21.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-syms-azure-6.4.0-150700.20.21.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-syms-azure-6.4.0-150700.20.21.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.1,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.20.21.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.20.21.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.20.21.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.20.21.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-devel-azure-6.4.0-150700.20.21.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-source-azure-6.4.0-150700.20.21.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-syms-azure-6.4.0-150700.20.21.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-syms-azure-6.4.0-150700.20.21.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-23T16:28:51Z",
"details": "moderate"
}
],
"title": "CVE-2025-40206"
},
{
"cve": "CVE-2025-40207",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40207"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nmedia: v4l2-subdev: Fix alloc failure check in v4l2_subdev_call_state_try()\n\nv4l2_subdev_call_state_try() macro allocates a subdev state with\n__v4l2_subdev_state_alloc(), but does not check the returned value. If\n__v4l2_subdev_state_alloc fails, it returns an ERR_PTR, and that would\ncause v4l2_subdev_call_state_try() to crash.\n\nAdd proper error handling to v4l2_subdev_call_state_try().",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.20.21.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.20.21.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.20.21.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.20.21.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-devel-azure-6.4.0-150700.20.21.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-source-azure-6.4.0-150700.20.21.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-syms-azure-6.4.0-150700.20.21.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-syms-azure-6.4.0-150700.20.21.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40207",
"url": "https://www.suse.com/security/cve/CVE-2025-40207"
},
{
"category": "external",
"summary": "SUSE Bug 1253395 for CVE-2025-40207",
"url": "https://bugzilla.suse.com/1253395"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.20.21.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.20.21.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.20.21.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.20.21.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-devel-azure-6.4.0-150700.20.21.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-source-azure-6.4.0-150700.20.21.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-syms-azure-6.4.0-150700.20.21.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-syms-azure-6.4.0-150700.20.21.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.20.21.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.20.21.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.20.21.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.20.21.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-devel-azure-6.4.0-150700.20.21.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-source-azure-6.4.0-150700.20.21.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-syms-azure-6.4.0-150700.20.21.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-syms-azure-6.4.0-150700.20.21.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-23T16:28:51Z",
"details": "moderate"
}
],
"title": "CVE-2025-40207"
}
]
}
SUSE-SU-2026:20021-1
Vulnerability from csaf_suse - Published: 2025-12-19 16:19 - Updated: 2025-12-19 16:19Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Security update for the Linux Kernel",
"title": "Title of the patch"
},
{
"category": "description",
"text": "\nThe SUSE Linux Enterprise 16.0 kernel was updated to fix various security issues\n\nThe following security issues were fixed:\n\n- CVE-2022-50253: bpf: make sure skb-\u003elen != 0 when redirecting to a tunneling device (bsc#1249912).\n- CVE-2025-37916: pds_core: remove write-after-free of client_id (bsc#1243474).\n- CVE-2025-38084: mm/hugetlb: unshare page tables during VMA split, not before (bsc#1245431 bsc#1245498).\n- CVE-2025-38085: mm/hugetlb: fix huge_pmd_unshare() vs GUP-fast race (bsc#1245431 bsc#1245499).\n- CVE-2025-38321: smb: Log an error when close_all_cached_dirs fails (bsc#1246328).\n- CVE-2025-38728: smb3: fix for slab out of bounds on mount to ksmbd (bsc#1249256).\n- CVE-2025-39805: net: macb: fix unregister_netdev call order in macb_remove() (bsc#1249982).\n- CVE-2025-39819: fs/smb: Fix inconsistent refcnt update (bsc#1250176).\n- CVE-2025-39822: io_uring/kbuf: fix signedness in this_len calculation (bsc#1250034).\n- CVE-2025-39831: fbnic: Move phylink resume out of service_task and into open/close (bsc#1249977).\n- CVE-2025-39859: ptp: ocp: fix use-after-free bugs causing by ptp_ocp_watchdog (bsc#1250252).\n- CVE-2025-39897: net: xilinx: axienet: Add error handling for RX metadata pointer retrieval (bsc#1250746).\n- CVE-2025-39917: bpf: Fix out-of-bounds dynptr write in bpf_crypto_crypt (bsc#1250723).\n- CVE-2025-39944: octeontx2-pf: Fix use-after-free bugs in otx2_sync_tstamp() (bsc#1251120).\n- CVE-2025-39961: iommu/amd/pgtbl: Fix possible race while increase page table level (bsc#1251817).\n- CVE-2025-39980: nexthop: Forbid FDB status change while nexthop is in a group (bsc#1252063).\n- CVE-2025-39990: bpf: Check the helper function is valid in get_helper_proto (bsc#1252054).\n- CVE-2025-40001: scsi: mvsas: Fix use-after-free bugs in mvs_work_queue (bsc#1252303).\n- CVE-2025-40003: net: mscc: ocelot: Fix use-after-free caused by cyclic delayed work (bsc#1252301).\n- CVE-2025-40006: mm/hugetlb: fix folio is still mapped when deleted (bsc#1252342).\n- CVE-2025-40021: tracing: dynevent: Add a missing lockdown check on dynevent (bsc#1252681).\n- CVE-2025-40024: vhost: Take a reference on the task in struct vhost_task (bsc#1252686).\n- CVE-2025-40027: net/9p: fix double req put in p9_fd_cancelled (bsc#1252763).\n- CVE-2025-40031: tee: fix register_shm_helper() (bsc#1252779).\n- CVE-2025-40033: remoteproc: pru: Fix potential NULL pointer dereference in pru_rproc_set_ctable() (bsc#1252824).\n- CVE-2025-40038: KVM: SVM: Skip fastpath emulation on VM-Exit if next RIP isn\u0027t valid (bsc#1252817).\n- CVE-2025-40047: io_uring/waitid: always prune wait queue entry in io_waitid_wait() (bsc#1252790).\n- CVE-2025-40053: net: dlink: handle copy_thresh allocation failure (bsc#1252808).\n- CVE-2025-40055: ocfs2: fix double free in user_cluster_connect() (bsc#1252821).\n- CVE-2025-40059: coresight: Fix incorrect handling for return value of devm_kzalloc (bsc#1252809).\n- CVE-2025-40064: smc: Fix use-after-free in __pnet_find_base_ndev() (bsc#1252845).\n- CVE-2025-40070: pps: fix warning in pps_register_cdev when register device fail (bsc#1252836).\n- CVE-2025-40074: tcp: convert to dev_net_rcu() (bsc#1252794).\n- CVE-2025-40075: tcp_metrics: use dst_dev_net_rcu() (bsc#1252795).\n- CVE-2025-40081: perf: arm_spe: Prevent overflow in PERF_IDX2OFF() (bsc#1252776).\n- CVE-2025-40083: net/sched: sch_qfq: Fix null-deref in agg_dequeue (bsc#1252912).\n- CVE-2025-40086: drm/xe: Don\u0027t allow evicting of BOs in same VM in array of VM binds (bsc#1252923).\n- CVE-2025-40098: ALSA: hda: cs35l41: Fix NULL pointer dereference in cs35l41_get_acpi_mute_state() (bsc#1252917).\n- CVE-2025-40101: btrfs: fix memory leaks when rejecting a non SINGLE data profile without an RST (bsc#1252901).\n- CVE-2025-40102: KVM: arm64: Prevent access to vCPU events before init (bsc#1252919).\n- CVE-2025-40105: vfs: Don\u0027t leak disconnected dentries on umount (bsc#1252928).\n- CVE-2025-40133: mptcp: Call dst_release() in mptcp_active_enable() (bsc#1253328).\n- CVE-2025-40134: dm: fix NULL pointer dereference in __dm_suspend() (bsc#1253386).\n- CVE-2025-40135: ipv6: use RCU in ip6_xmit() (bsc#1253342).\n- CVE-2025-40139: smc: Use __sk_dst_get() and dst_dev_rcu() in in smc_clc_prfx_set() (bsc#1253409).\n- CVE-2025-40149: tls: Use __sk_dst_get() and dst_dev_rcu() in get_netdev_for_sock() (bsc#1253355).\n- CVE-2025-40153: mm: hugetlb: avoid soft lockup when mprotect to large memory area (bsc#1253408).\n- CVE-2025-40157: EDAC/i10nm: Skip DIMM enumeration on a disabled memory controller (bsc#1253423).\n- CVE-2025-40158: ipv6: use RCU in ip6_output() (bsc#1253402).\n- CVE-2025-40159: xsk: Harden userspace-supplied xdp_desc validation (bsc#1253403).\n- CVE-2025-40168: smc: Use __sk_dst_get() and dst_dev_rcu() in smc_clc_prfx_match() (bsc#1253427).\n- CVE-2025-40169: bpf: Reject negative offsets for ALU ops (bsc#1253416).\n- CVE-2025-40173: net/ip6_tunnel: Prevent perpetual tunnel growth (bsc#1253421).\n- CVE-2025-40175: idpf: cleanup remaining SKBs in PTP flows (bsc#1253426).\n- CVE-2025-40176: tls: wait for pending async decryptions if tls_strp_msg_hold fails (bsc#1253425).\n- CVE-2025-40178: pid: Add a judgment for ns null in pid_nr_ns (bsc#1253463).\n- CVE-2025-40185: ice: ice_adapter: release xa entry on adapter allocation failure (bsc#1253394).\n- CVE-2025-40201: kernel/sys.c: fix the racy usage of task_lock(tsk-\u003egroup_leader) in sys_prlimit64() paths (bsc#1253455).\n- CVE-2025-40203: listmount: don\u0027t call path_put() under namespace semaphore (bsc#1253457).\n\nThe following non security issues were fixed:\n\n- ACPI: scan: Update honor list for RPMI System MSI (stable-fixes).\n- ACPICA: Update dsmethod.c to get rid of unused variable warning (stable-fixes).\n- Disable CONFIG_CPU5_WDT The cpu5wdt driver doesn\u0027t implement a\n proper watchdog interface and has many code issues. It only handles\n obscure and obsolete hardware. Stop building and supporting this driver\n (jsc#PED-14062).\n- Fix \"drm/xe: Don\u0027t allow evicting of BOs in same VM in array of VM binds\" (bsc#1252923)\n- KVM: SVM: Delete IRTE link from previous vCPU before setting new IRTE (git-fixes).\n- KVM: SVM: Delete IRTE link from previous vCPU irrespective of new routing (git-fixes).\n- KVM: SVM: Mark VMCB_LBR dirty when MSR_IA32_DEBUGCTLMSR is updated (git-fixes).\n- KVM: s390: improve interrupt cpu for wakeup (bsc#1235463).\n- KVM: s390: kABI backport for \u0027last_sleep_cpu\u0027 (bsc#1252352).\n- KVM: x86/mmu: Return -EAGAIN if userspace deletes/moves memslot during prefault (git-fixes).\n- PCI/ERR: Update device error_state already after reset (stable-fixes).\n- PM: EM: Slightly reduce em_check_capacity_update() overhead (stable-fixes).\n- Revert \"net/mlx5e: Update and set Xon/Xoff upon MTU set\" (git-fixes).\n- Revert \"net/mlx5e: Update and set Xon/Xoff upon port speed set\" (git-fixes).\n- Update config files: enable zstd module decompression (jsc#PED-14115).\n- bpf/selftests: Fix test_tcpnotify_user (bsc#1253635).\n- btrfs: do not clear read-only when adding sprout device (bsc#1253238).\n- btrfs: do not update last_log_commit when logging inode due to a new name (git-fixes).\n- dm: fix queue start/stop imbalance under suspend/load/resume races (bsc#1253386)\n- drm/amd/display: Add AVI infoframe copy in copy_stream_update_to_stream (stable-fixes).\n- drm/amd/display: update color on atomic commit time (stable-fixes).\n- drm/amd/display: update dpp/disp clock from smu clock table (stable-fixes).\n- drm/radeon: delete radeon_fence_process in is_signaled, no deadlock (stable-fixes).\n- hwmon: (lenovo-ec-sensors) Update P8 supprt (stable-fixes).\n- media: amphion: Delete v4l2_fh synchronously in .release() (stable-fixes).\n- mount: handle NULL values in mnt_ns_release() (bsc#1254308)\n- net/smc: Remove validation of reserved bits in CLC Decline (bsc#1252357).\n- net: phy: move realtek PHY driver to its own subdirectory (jsc#PED-14353).\n- net: phy: realtek: add defines for shadowed c45 standard registers (jsc#PED-14353).\n- net: phy: realtek: add helper RTL822X_VND2_C22_REG (jsc#PED-14353).\n- net: phy: realtek: change order of calls in C22 read_status() (jsc#PED-14353).\n- net: phy: realtek: clear 1000Base-T link partner advertisement (jsc#PED-14353).\n- net: phy: realtek: improve mmd register access for internal PHY\u0027s (jsc#PED-14353).\n- net: phy: realtek: read duplex and gbit master from PHYSR register (jsc#PED-14353).\n- net: phy: realtek: switch from paged to MMD ops in rtl822x functions (jsc#PED-14353).\n- net: phy: realtek: use string choices helpers (jsc#PED-14353).\n- net: xilinx: axienet: Fix IRQ coalescing packet count overflow (bsc#1250746)\n- net: xilinx: axienet: Fix RX skb ring management in DMAengine mode (bsc#1250746)\n- net: xilinx: axienet: Fix Tx skb circular buffer occupancy check in dmaengine xmit (bsc#1250746)\n- nvmet-auth: update sc_c in host response (git-fixes bsc#1249397).\n- nvmet-auth: update sc_c in target host hash calculation (git-fixes).\n- perf list: Add IBM z17 event descriptions (jsc#PED-13611).\n- platform/x86:intel/pmc: Update Arrow Lake telemetry GUID (git-fixes).\n- powercap: intel_rapl: Add support for Panther Lake platform (jsc#PED-13949).\n- pwm: pca9685: Use bulk write to atomicially update registers (stable-fixes).\n- r8169: add PHY c45 ops for MDIO_MMD_VENDOR2 registers (jsc#PED-14353).\n- r8169: add support for Intel Killer E5000 (jsc#PED-14353).\n- r8169: add support for RTL8125BP rev.b (jsc#PED-14353).\n- r8169: add support for RTL8125D rev.b (jsc#PED-14353).\n- r8169: adjust version numbering for RTL8126 (jsc#PED-14353).\n- r8169: align RTL8125 EEE config with vendor driver (jsc#PED-14353).\n- r8169: align RTL8125/RTL8126 PHY config with vendor driver (jsc#PED-14353).\n- r8169: align RTL8126 EEE config with vendor driver (jsc#PED-14353).\n- r8169: align WAKE_PHY handling with r8125/r8126 vendor drivers (jsc#PED-14353).\n- r8169: avoid duplicated messages if loading firmware fails and switch to warn level (jsc#PED-14353).\n- r8169: don\u0027t take RTNL lock in rtl_task() (jsc#PED-14353).\n- r8169: enable EEE at 2.5G per default on RTL8125B (jsc#PED-14353).\n- r8169: enable RTL8168H/RTL8168EP/RTL8168FP ASPM support (jsc#PED-14353).\n- r8169: fix inconsistent indenting in rtl8169_get_eth_mac_stats (jsc#PED-14353).\n- r8169: implement additional ethtool stats ops (jsc#PED-14353).\n- r8169: improve __rtl8169_set_wol (jsc#PED-14353).\n- r8169: improve initialization of RSS registers on RTL8125/RTL8126 (jsc#PED-14353).\n- r8169: improve rtl_set_d3_pll_down (jsc#PED-14353).\n- r8169: increase max jumbo packet size on RTL8125/RTL8126 (jsc#PED-14353).\n- r8169: remove leftover locks after reverted change (jsc#PED-14353).\n- r8169: remove original workaround for RTL8125 broken rx issue (jsc#PED-14353).\n- r8169: remove rtl_dash_loop_wait_high/low (jsc#PED-14353).\n- r8169: remove support for chip version 11 (jsc#PED-14353).\n- r8169: remove unused flag RTL_FLAG_TASK_RESET_NO_QUEUE_WAKE (jsc#PED-14353).\n- r8169: replace custom flag with disable_work() et al (jsc#PED-14353).\n- r8169: switch away from deprecated pcim_iomap_table (jsc#PED-14353).\n- r8169: use helper r8169_mod_reg8_cond to simplify rtl_jumbo_config (jsc#PED-14353).\n- ring-buffer: Update pages_touched to reflect persistent buffer content (git-fixes).\n- s390/mm: Fix __ptep_rdp() inline assembly (bsc#1253643).\n- sched/fair: Get rid of sched_domains_curr_level hack for tl-\u003ecpumask() (bsc#1246843).\n- sched/fair: Have SD_SERIALIZE affect newidle balancing (bsc#1248792).\n- sched/fair: Proportional newidle balance (bsc#1248792).\n- sched/fair: Proportional newidle balance -KABI (bsc#1248792).\n- sched/fair: Revert max_newidle_lb_cost bump (bsc#1248792).\n- sched/fair: Skip sched_balance_running cmpxchg when balance is not due (bsc#1248792).\n- sched/fair: Small cleanup to sched_balance_newidle() (bsc#1248792).\n- sched/fair: Small cleanup to update_newidle_cost() (bsc#1248792).\n- scsi: lpfc: Add capability to register Platform Name ID to fabric (bsc#1254119).\n- scsi: lpfc: Allow support for BB credit recovery in point-to-point topology (bsc#1254119).\n- scsi: lpfc: Ensure unregistration of rpis for received PLOGIs (bsc#1254119).\n- scsi: lpfc: Fix leaked ndlp krefs when in point-to-point topology (bsc#1254119).\n- scsi: lpfc: Fix reusing an ndlp that is marked NLP_DROPPED during FLOGI (bsc#1254119).\n- scsi: lpfc: Modify kref handling for Fabric Controller ndlps (bsc#1254119).\n- scsi: lpfc: Remove redundant NULL ptr assignment in lpfc_els_free_iocb() (bsc#1254119).\n- scsi: lpfc: Revise discovery related function headers and comments (bsc#1254119).\n- scsi: lpfc: Update lpfc version to 14.4.0.12 (bsc#1254119).\n- scsi: lpfc: Update various NPIV diagnostic log messaging (bsc#1254119).\n- selftests/run_kselftest.sh: Add `--skip` argument option (bsc#1254221).\n- smpboot: introduce SDTL_INIT() helper to tidy sched topology setup (bsc#1246843).\n- soc/tegra: fuse: speedo-tegra210: Update speedo IDs (git-fixes).\n- spi: tegra210-quad: Check hardware status on timeout (bsc#1253155)\n- spi: tegra210-quad: Fix timeout handling (bsc#1253155)\n- spi: tegra210-quad: Refactor error handling into helper functions (bsc#1253155)\n- spi: tegra210-quad: Update dummy sequence configuration (git-fixes)\n- tcp_bpf: Call sk_msg_free() when tcp_bpf_send_verdict() fails to allocate psock-\u003ecork (bsc#1250705).\n- wifi: ath11k: Add quirk entries for Thinkpad T14s Gen3 AMD (bsc#1254181).\n- wifi: mt76: do not add wcid entries to sta poll list during MCU reset (bsc#1254315).\n- wifi: mt76: introduce mt792x_config_mac_addr_list routine (bsc#1254315).\n- wifi: mt76: mt7925: Fix logical vs bitwise typo (bsc#1254315).\n- wifi: mt76: mt7925: Remove unnecessary if-check (bsc#1254315).\n- wifi: mt76: mt7925: Simplify HIF suspend handling to avoid suspend fail (bsc#1254315).\n- wifi: mt76: mt7925: add EHT control support based on the CLC data (bsc#1254315).\n- wifi: mt76: mt7925: add handler to hif suspend/resume event (bsc#1254315).\n- wifi: mt76: mt7925: add pci restore for hibernate (bsc#1254315).\n- wifi: mt76: mt7925: config the dwell time by firmware (bsc#1254315).\n- wifi: mt76: mt7925: extend MCU support for testmode (bsc#1254315).\n- wifi: mt76: mt7925: fix CLC command timeout when suspend/resume (bsc#1254315).\n- wifi: mt76: mt7925: fix missing hdr_trans_tlv command for broadcast wtbl (bsc#1254315).\n- wifi: mt76: mt7925: fix the unfinished command of regd_notifier before suspend (bsc#1254315).\n- wifi: mt76: mt7925: refine the txpower initialization flow (bsc#1254315).\n- wifi: mt76: mt7925: replace zero-length array with flexible-array member (bsc#1254315).\n- wifi: mt76: mt7925: update the channel usage when the regd domain changed (bsc#1254315).\n- wifi: mt76: mt7925e: fix too long of wifi resume time (bsc#1254315).\n- x86/smpboot: avoid SMT domain attach/destroy if SMT is not enabled (bsc#1246843).\n- x86/smpboot: moves x86_topology to static initialize and truncate (bsc#1246843).\n- x86/smpboot: remove redundant CONFIG_SCHED_SMT (bsc#1246843).\n",
"title": "Description of the patch"
},
{
"category": "details",
"text": "SUSE-SLES-HA-16.0-113",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2026_20021-1.json"
},
{
"category": "self",
"summary": "URL for SUSE-SU-2026:20021-1",
"url": "https://www.suse.com/support/update/announcement/2026/suse-su-202620021-1/"
},
{
"category": "self",
"summary": "E-Mail link for SUSE-SU-2026:20021-1",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-January/023723.html"
},
{
"category": "self",
"summary": "SUSE Bug 1235463",
"url": "https://bugzilla.suse.com/1235463"
},
{
"category": "self",
"summary": "SUSE Bug 1243474",
"url": "https://bugzilla.suse.com/1243474"
},
{
"category": "self",
"summary": "SUSE Bug 1245193",
"url": "https://bugzilla.suse.com/1245193"
},
{
"category": "self",
"summary": "SUSE Bug 1245431",
"url": "https://bugzilla.suse.com/1245431"
},
{
"category": "self",
"summary": "SUSE Bug 1245498",
"url": "https://bugzilla.suse.com/1245498"
},
{
"category": "self",
"summary": "SUSE Bug 1245499",
"url": "https://bugzilla.suse.com/1245499"
},
{
"category": "self",
"summary": "SUSE Bug 1246328",
"url": "https://bugzilla.suse.com/1246328"
},
{
"category": "self",
"summary": "SUSE Bug 1246843",
"url": "https://bugzilla.suse.com/1246843"
},
{
"category": "self",
"summary": "SUSE Bug 1247500",
"url": "https://bugzilla.suse.com/1247500"
},
{
"category": "self",
"summary": "SUSE Bug 1248792",
"url": "https://bugzilla.suse.com/1248792"
},
{
"category": "self",
"summary": "SUSE Bug 1249256",
"url": "https://bugzilla.suse.com/1249256"
},
{
"category": "self",
"summary": "SUSE Bug 1249397",
"url": "https://bugzilla.suse.com/1249397"
},
{
"category": "self",
"summary": "SUSE Bug 1249912",
"url": "https://bugzilla.suse.com/1249912"
},
{
"category": "self",
"summary": "SUSE Bug 1249977",
"url": "https://bugzilla.suse.com/1249977"
},
{
"category": "self",
"summary": "SUSE Bug 1249982",
"url": "https://bugzilla.suse.com/1249982"
},
{
"category": "self",
"summary": "SUSE Bug 1250034",
"url": "https://bugzilla.suse.com/1250034"
},
{
"category": "self",
"summary": "SUSE Bug 1250176",
"url": "https://bugzilla.suse.com/1250176"
},
{
"category": "self",
"summary": "SUSE Bug 1250237",
"url": "https://bugzilla.suse.com/1250237"
},
{
"category": "self",
"summary": "SUSE Bug 1250252",
"url": "https://bugzilla.suse.com/1250252"
},
{
"category": "self",
"summary": "SUSE Bug 1250705",
"url": "https://bugzilla.suse.com/1250705"
},
{
"category": "self",
"summary": "SUSE Bug 1250723",
"url": "https://bugzilla.suse.com/1250723"
},
{
"category": "self",
"summary": "SUSE Bug 1250746",
"url": "https://bugzilla.suse.com/1250746"
},
{
"category": "self",
"summary": "SUSE Bug 1251120",
"url": "https://bugzilla.suse.com/1251120"
},
{
"category": "self",
"summary": "SUSE Bug 1251817",
"url": "https://bugzilla.suse.com/1251817"
},
{
"category": "self",
"summary": "SUSE Bug 1252054",
"url": "https://bugzilla.suse.com/1252054"
},
{
"category": "self",
"summary": "SUSE Bug 1252063",
"url": "https://bugzilla.suse.com/1252063"
},
{
"category": "self",
"summary": "SUSE Bug 1252301",
"url": "https://bugzilla.suse.com/1252301"
},
{
"category": "self",
"summary": "SUSE Bug 1252303",
"url": "https://bugzilla.suse.com/1252303"
},
{
"category": "self",
"summary": "SUSE Bug 1252342",
"url": "https://bugzilla.suse.com/1252342"
},
{
"category": "self",
"summary": "SUSE Bug 1252352",
"url": "https://bugzilla.suse.com/1252352"
},
{
"category": "self",
"summary": "SUSE Bug 1252357",
"url": "https://bugzilla.suse.com/1252357"
},
{
"category": "self",
"summary": "SUSE Bug 1252681",
"url": "https://bugzilla.suse.com/1252681"
},
{
"category": "self",
"summary": "SUSE Bug 1252686",
"url": "https://bugzilla.suse.com/1252686"
},
{
"category": "self",
"summary": "SUSE Bug 1252763",
"url": "https://bugzilla.suse.com/1252763"
},
{
"category": "self",
"summary": "SUSE Bug 1252776",
"url": "https://bugzilla.suse.com/1252776"
},
{
"category": "self",
"summary": "SUSE Bug 1252779",
"url": "https://bugzilla.suse.com/1252779"
},
{
"category": "self",
"summary": "SUSE Bug 1252790",
"url": "https://bugzilla.suse.com/1252790"
},
{
"category": "self",
"summary": "SUSE Bug 1252794",
"url": "https://bugzilla.suse.com/1252794"
},
{
"category": "self",
"summary": "SUSE Bug 1252795",
"url": "https://bugzilla.suse.com/1252795"
},
{
"category": "self",
"summary": "SUSE Bug 1252808",
"url": "https://bugzilla.suse.com/1252808"
},
{
"category": "self",
"summary": "SUSE Bug 1252809",
"url": "https://bugzilla.suse.com/1252809"
},
{
"category": "self",
"summary": "SUSE Bug 1252817",
"url": "https://bugzilla.suse.com/1252817"
},
{
"category": "self",
"summary": "SUSE Bug 1252821",
"url": "https://bugzilla.suse.com/1252821"
},
{
"category": "self",
"summary": "SUSE Bug 1252824",
"url": "https://bugzilla.suse.com/1252824"
},
{
"category": "self",
"summary": "SUSE Bug 1252836",
"url": "https://bugzilla.suse.com/1252836"
},
{
"category": "self",
"summary": "SUSE Bug 1252845",
"url": "https://bugzilla.suse.com/1252845"
},
{
"category": "self",
"summary": "SUSE Bug 1252901",
"url": "https://bugzilla.suse.com/1252901"
},
{
"category": "self",
"summary": "SUSE Bug 1252912",
"url": "https://bugzilla.suse.com/1252912"
},
{
"category": "self",
"summary": "SUSE Bug 1252917",
"url": "https://bugzilla.suse.com/1252917"
},
{
"category": "self",
"summary": "SUSE Bug 1252919",
"url": "https://bugzilla.suse.com/1252919"
},
{
"category": "self",
"summary": "SUSE Bug 1252923",
"url": "https://bugzilla.suse.com/1252923"
},
{
"category": "self",
"summary": "SUSE Bug 1252928",
"url": "https://bugzilla.suse.com/1252928"
},
{
"category": "self",
"summary": "SUSE Bug 1253018",
"url": "https://bugzilla.suse.com/1253018"
},
{
"category": "self",
"summary": "SUSE Bug 1253155",
"url": "https://bugzilla.suse.com/1253155"
},
{
"category": "self",
"summary": "SUSE Bug 1253176",
"url": "https://bugzilla.suse.com/1253176"
},
{
"category": "self",
"summary": "SUSE Bug 1253238",
"url": "https://bugzilla.suse.com/1253238"
},
{
"category": "self",
"summary": "SUSE Bug 1253275",
"url": "https://bugzilla.suse.com/1253275"
},
{
"category": "self",
"summary": "SUSE Bug 1253318",
"url": "https://bugzilla.suse.com/1253318"
},
{
"category": "self",
"summary": "SUSE Bug 1253324",
"url": "https://bugzilla.suse.com/1253324"
},
{
"category": "self",
"summary": "SUSE Bug 1253328",
"url": "https://bugzilla.suse.com/1253328"
},
{
"category": "self",
"summary": "SUSE Bug 1253330",
"url": "https://bugzilla.suse.com/1253330"
},
{
"category": "self",
"summary": "SUSE Bug 1253342",
"url": "https://bugzilla.suse.com/1253342"
},
{
"category": "self",
"summary": "SUSE Bug 1253348",
"url": "https://bugzilla.suse.com/1253348"
},
{
"category": "self",
"summary": "SUSE Bug 1253349",
"url": "https://bugzilla.suse.com/1253349"
},
{
"category": "self",
"summary": "SUSE Bug 1253352",
"url": "https://bugzilla.suse.com/1253352"
},
{
"category": "self",
"summary": "SUSE Bug 1253355",
"url": "https://bugzilla.suse.com/1253355"
},
{
"category": "self",
"summary": "SUSE Bug 1253360",
"url": "https://bugzilla.suse.com/1253360"
},
{
"category": "self",
"summary": "SUSE Bug 1253362",
"url": "https://bugzilla.suse.com/1253362"
},
{
"category": "self",
"summary": "SUSE Bug 1253363",
"url": "https://bugzilla.suse.com/1253363"
},
{
"category": "self",
"summary": "SUSE Bug 1253367",
"url": "https://bugzilla.suse.com/1253367"
},
{
"category": "self",
"summary": "SUSE Bug 1253369",
"url": "https://bugzilla.suse.com/1253369"
},
{
"category": "self",
"summary": "SUSE Bug 1253386",
"url": "https://bugzilla.suse.com/1253386"
},
{
"category": "self",
"summary": "SUSE Bug 1253394",
"url": "https://bugzilla.suse.com/1253394"
},
{
"category": "self",
"summary": "SUSE Bug 1253395",
"url": "https://bugzilla.suse.com/1253395"
},
{
"category": "self",
"summary": "SUSE Bug 1253402",
"url": "https://bugzilla.suse.com/1253402"
},
{
"category": "self",
"summary": "SUSE Bug 1253403",
"url": "https://bugzilla.suse.com/1253403"
},
{
"category": "self",
"summary": "SUSE Bug 1253405",
"url": "https://bugzilla.suse.com/1253405"
},
{
"category": "self",
"summary": "SUSE Bug 1253407",
"url": "https://bugzilla.suse.com/1253407"
},
{
"category": "self",
"summary": "SUSE Bug 1253408",
"url": "https://bugzilla.suse.com/1253408"
},
{
"category": "self",
"summary": "SUSE Bug 1253409",
"url": "https://bugzilla.suse.com/1253409"
},
{
"category": "self",
"summary": "SUSE Bug 1253410",
"url": "https://bugzilla.suse.com/1253410"
},
{
"category": "self",
"summary": "SUSE Bug 1253412",
"url": "https://bugzilla.suse.com/1253412"
},
{
"category": "self",
"summary": "SUSE Bug 1253416",
"url": "https://bugzilla.suse.com/1253416"
},
{
"category": "self",
"summary": "SUSE Bug 1253421",
"url": "https://bugzilla.suse.com/1253421"
},
{
"category": "self",
"summary": "SUSE Bug 1253422",
"url": "https://bugzilla.suse.com/1253422"
},
{
"category": "self",
"summary": "SUSE Bug 1253423",
"url": "https://bugzilla.suse.com/1253423"
},
{
"category": "self",
"summary": "SUSE Bug 1253424",
"url": "https://bugzilla.suse.com/1253424"
},
{
"category": "self",
"summary": "SUSE Bug 1253425",
"url": "https://bugzilla.suse.com/1253425"
},
{
"category": "self",
"summary": "SUSE Bug 1253426",
"url": "https://bugzilla.suse.com/1253426"
},
{
"category": "self",
"summary": "SUSE Bug 1253427",
"url": "https://bugzilla.suse.com/1253427"
},
{
"category": "self",
"summary": "SUSE Bug 1253428",
"url": "https://bugzilla.suse.com/1253428"
},
{
"category": "self",
"summary": "SUSE Bug 1253431",
"url": "https://bugzilla.suse.com/1253431"
},
{
"category": "self",
"summary": "SUSE Bug 1253433",
"url": "https://bugzilla.suse.com/1253433"
},
{
"category": "self",
"summary": "SUSE Bug 1253436",
"url": "https://bugzilla.suse.com/1253436"
},
{
"category": "self",
"summary": "SUSE Bug 1253438",
"url": "https://bugzilla.suse.com/1253438"
},
{
"category": "self",
"summary": "SUSE Bug 1253440",
"url": "https://bugzilla.suse.com/1253440"
},
{
"category": "self",
"summary": "SUSE Bug 1253441",
"url": "https://bugzilla.suse.com/1253441"
},
{
"category": "self",
"summary": "SUSE Bug 1253443",
"url": "https://bugzilla.suse.com/1253443"
},
{
"category": "self",
"summary": "SUSE Bug 1253445",
"url": "https://bugzilla.suse.com/1253445"
},
{
"category": "self",
"summary": "SUSE Bug 1253448",
"url": "https://bugzilla.suse.com/1253448"
},
{
"category": "self",
"summary": "SUSE Bug 1253449",
"url": "https://bugzilla.suse.com/1253449"
},
{
"category": "self",
"summary": "SUSE Bug 1253450",
"url": "https://bugzilla.suse.com/1253450"
},
{
"category": "self",
"summary": "SUSE Bug 1253451",
"url": "https://bugzilla.suse.com/1253451"
},
{
"category": "self",
"summary": "SUSE Bug 1253453",
"url": "https://bugzilla.suse.com/1253453"
},
{
"category": "self",
"summary": "SUSE Bug 1253455",
"url": "https://bugzilla.suse.com/1253455"
},
{
"category": "self",
"summary": "SUSE Bug 1253456",
"url": "https://bugzilla.suse.com/1253456"
},
{
"category": "self",
"summary": "SUSE Bug 1253457",
"url": "https://bugzilla.suse.com/1253457"
},
{
"category": "self",
"summary": "SUSE Bug 1253463",
"url": "https://bugzilla.suse.com/1253463"
},
{
"category": "self",
"summary": "SUSE Bug 1253472",
"url": "https://bugzilla.suse.com/1253472"
},
{
"category": "self",
"summary": "SUSE Bug 1253622",
"url": "https://bugzilla.suse.com/1253622"
},
{
"category": "self",
"summary": "SUSE Bug 1253624",
"url": "https://bugzilla.suse.com/1253624"
},
{
"category": "self",
"summary": "SUSE Bug 1253635",
"url": "https://bugzilla.suse.com/1253635"
},
{
"category": "self",
"summary": "SUSE Bug 1253643",
"url": "https://bugzilla.suse.com/1253643"
},
{
"category": "self",
"summary": "SUSE Bug 1253647",
"url": "https://bugzilla.suse.com/1253647"
},
{
"category": "self",
"summary": "SUSE Bug 1254119",
"url": "https://bugzilla.suse.com/1254119"
},
{
"category": "self",
"summary": "SUSE Bug 1254181",
"url": "https://bugzilla.suse.com/1254181"
},
{
"category": "self",
"summary": "SUSE Bug 1254221",
"url": "https://bugzilla.suse.com/1254221"
},
{
"category": "self",
"summary": "SUSE Bug 1254308",
"url": "https://bugzilla.suse.com/1254308"
},
{
"category": "self",
"summary": "SUSE Bug 1254315",
"url": "https://bugzilla.suse.com/1254315"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-50253 page",
"url": "https://www.suse.com/security/cve/CVE-2022-50253/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-37916 page",
"url": "https://www.suse.com/security/cve/CVE-2025-37916/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-38084 page",
"url": "https://www.suse.com/security/cve/CVE-2025-38084/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-38085 page",
"url": "https://www.suse.com/security/cve/CVE-2025-38085/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-38321 page",
"url": "https://www.suse.com/security/cve/CVE-2025-38321/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-38728 page",
"url": "https://www.suse.com/security/cve/CVE-2025-38728/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-39805 page",
"url": "https://www.suse.com/security/cve/CVE-2025-39805/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-39819 page",
"url": "https://www.suse.com/security/cve/CVE-2025-39819/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-39822 page",
"url": "https://www.suse.com/security/cve/CVE-2025-39822/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-39831 page",
"url": "https://www.suse.com/security/cve/CVE-2025-39831/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-39859 page",
"url": "https://www.suse.com/security/cve/CVE-2025-39859/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-39897 page",
"url": "https://www.suse.com/security/cve/CVE-2025-39897/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-39917 page",
"url": "https://www.suse.com/security/cve/CVE-2025-39917/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-39944 page",
"url": "https://www.suse.com/security/cve/CVE-2025-39944/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-39961 page",
"url": "https://www.suse.com/security/cve/CVE-2025-39961/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-39980 page",
"url": "https://www.suse.com/security/cve/CVE-2025-39980/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-39990 page",
"url": "https://www.suse.com/security/cve/CVE-2025-39990/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40001 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40001/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40003 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40003/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40006 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40006/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40021 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40021/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40024 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40024/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40027 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40027/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40031 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40031/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40033 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40033/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40038 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40038/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40047 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40047/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40053 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40053/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40055 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40055/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40059 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40059/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40064 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40064/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40070 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40070/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40074 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40074/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40075 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40075/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40081 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40081/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40083 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40083/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40086 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40086/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40098 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40098/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40101 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40101/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40102 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40102/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40105 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40105/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40107 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40107/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40109 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40109/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40110 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40110/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40111 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40111/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40115 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40115/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40116 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40116/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40118 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40118/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40120 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40120/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40121 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40121/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40127 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40127/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40129 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40129/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40132 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40132/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40133 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40133/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40134 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40134/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40135 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40135/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40139 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40139/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40140 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40140/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40141 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40141/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40142 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40142/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40149 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40149/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40153 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40153/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40154 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40154/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40156 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40156/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40157 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40157/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40158 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40158/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40159 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40159/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40161 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40161/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40162 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40162/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40164 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40164/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40165 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40165/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40166 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40166/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40168 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40168/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40169 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40169/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40171 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40171/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40172 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40172/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40173 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40173/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40175 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40175/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40176 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40176/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40177 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40177/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40178 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40178/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40180 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40180/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40183 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40183/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40185 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40185/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40186 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40186/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40187 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40187/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40188 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40188/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40192 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40192/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40194 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40194/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40196 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40196/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40197 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40197/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40198 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40198/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40200 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40200/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40201 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40201/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40202 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40202/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40203 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40203/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40204 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40204/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40205 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40205/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40206 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40206/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40207 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40207/"
}
],
"title": "Security update for the Linux Kernel",
"tracking": {
"current_release_date": "2025-12-19T16:19:41Z",
"generator": {
"date": "2025-12-19T16:19:41Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "SUSE-SU-2026:20021-1",
"initial_release_date": "2025-12-19T16:19:41Z",
"revision_history": [
{
"date": "2025-12-19T16:19:41Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"product": {
"name": "cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"product_id": "cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le"
}
},
{
"category": "product_version",
"name": "dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"product": {
"name": "dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"product_id": "dlm-kmp-default-6.12.0-160000.8.1.ppc64le"
}
},
{
"category": "product_version",
"name": "gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"product": {
"name": "gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"product_id": "gfs2-kmp-default-6.12.0-160000.8.1.ppc64le"
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"product": {
"name": "cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"product_id": "cluster-md-kmp-default-6.12.0-160000.8.1.s390x"
}
},
{
"category": "product_version",
"name": "dlm-kmp-default-6.12.0-160000.8.1.s390x",
"product": {
"name": "dlm-kmp-default-6.12.0-160000.8.1.s390x",
"product_id": "dlm-kmp-default-6.12.0-160000.8.1.s390x"
}
},
{
"category": "product_version",
"name": "gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"product": {
"name": "gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"product_id": "gfs2-kmp-default-6.12.0-160000.8.1.s390x"
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"product": {
"name": "cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"product_id": "cluster-md-kmp-default-6.12.0-160000.8.1.x86_64"
}
},
{
"category": "product_version",
"name": "dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"product": {
"name": "dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"product_id": "dlm-kmp-default-6.12.0-160000.8.1.x86_64"
}
},
{
"category": "product_version",
"name": "gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"product": {
"name": "gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"product_id": "gfs2-kmp-default-6.12.0-160000.8.1.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "SUSE Linux Enterprise High Availability Extension 16.0",
"product": {
"name": "SUSE Linux Enterprise High Availability Extension 16.0",
"product_id": "SUSE Linux Enterprise High Availability Extension 16.0",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-ha:16.0"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le as component of SUSE Linux Enterprise High Availability Extension 16.0",
"product_id": "SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le"
},
"product_reference": "cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cluster-md-kmp-default-6.12.0-160000.8.1.s390x as component of SUSE Linux Enterprise High Availability Extension 16.0",
"product_id": "SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x"
},
"product_reference": "cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cluster-md-kmp-default-6.12.0-160000.8.1.x86_64 as component of SUSE Linux Enterprise High Availability Extension 16.0",
"product_id": "SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64"
},
"product_reference": "cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dlm-kmp-default-6.12.0-160000.8.1.ppc64le as component of SUSE Linux Enterprise High Availability Extension 16.0",
"product_id": "SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le"
},
"product_reference": "dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dlm-kmp-default-6.12.0-160000.8.1.s390x as component of SUSE Linux Enterprise High Availability Extension 16.0",
"product_id": "SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x"
},
"product_reference": "dlm-kmp-default-6.12.0-160000.8.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dlm-kmp-default-6.12.0-160000.8.1.x86_64 as component of SUSE Linux Enterprise High Availability Extension 16.0",
"product_id": "SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64"
},
"product_reference": "dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gfs2-kmp-default-6.12.0-160000.8.1.ppc64le as component of SUSE Linux Enterprise High Availability Extension 16.0",
"product_id": "SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le"
},
"product_reference": "gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gfs2-kmp-default-6.12.0-160000.8.1.s390x as component of SUSE Linux Enterprise High Availability Extension 16.0",
"product_id": "SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x"
},
"product_reference": "gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gfs2-kmp-default-6.12.0-160000.8.1.x86_64 as component of SUSE Linux Enterprise High Availability Extension 16.0",
"product_id": "SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64"
},
"product_reference": "gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 16.0"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2022-50253",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-50253"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nbpf: make sure skb-\u003elen != 0 when redirecting to a tunneling device\n\nsyzkaller managed to trigger another case where skb-\u003elen == 0\nwhen we enter __dev_queue_xmit:\n\nWARNING: CPU: 0 PID: 2470 at include/linux/skbuff.h:2576 skb_assert_len include/linux/skbuff.h:2576 [inline]\nWARNING: CPU: 0 PID: 2470 at include/linux/skbuff.h:2576 __dev_queue_xmit+0x2069/0x35e0 net/core/dev.c:4295\n\nCall Trace:\n dev_queue_xmit+0x17/0x20 net/core/dev.c:4406\n __bpf_tx_skb net/core/filter.c:2115 [inline]\n __bpf_redirect_no_mac net/core/filter.c:2140 [inline]\n __bpf_redirect+0x5fb/0xda0 net/core/filter.c:2163\n ____bpf_clone_redirect net/core/filter.c:2447 [inline]\n bpf_clone_redirect+0x247/0x390 net/core/filter.c:2419\n bpf_prog_48159a89cb4a9a16+0x59/0x5e\n bpf_dispatcher_nop_func include/linux/bpf.h:897 [inline]\n __bpf_prog_run include/linux/filter.h:596 [inline]\n bpf_prog_run include/linux/filter.h:603 [inline]\n bpf_test_run+0x46c/0x890 net/bpf/test_run.c:402\n bpf_prog_test_run_skb+0xbdc/0x14c0 net/bpf/test_run.c:1170\n bpf_prog_test_run+0x345/0x3c0 kernel/bpf/syscall.c:3648\n __sys_bpf+0x43a/0x6c0 kernel/bpf/syscall.c:5005\n __do_sys_bpf kernel/bpf/syscall.c:5091 [inline]\n __se_sys_bpf kernel/bpf/syscall.c:5089 [inline]\n __x64_sys_bpf+0x7c/0x90 kernel/bpf/syscall.c:5089\n do_syscall_64+0x54/0x70 arch/x86/entry/common.c:48\n entry_SYSCALL_64_after_hwframe+0x61/0xc6\n\nThe reproducer doesn\u0027t really reproduce outside of syzkaller\nenvironment, so I\u0027m taking a guess here. It looks like we\ndo generate correct ETH_HLEN-sized packet, but we redirect\nthe packet to the tunneling device. Before we do so, we\n__skb_pull l2 header and arrive again at skb-\u003elen == 0.\nDoesn\u0027t seem like we can do anything better than having\nan explicit check after __skb_pull?",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-50253",
"url": "https://www.suse.com/security/cve/CVE-2022-50253"
},
{
"category": "external",
"summary": "SUSE Bug 1249912 for CVE-2022-50253",
"url": "https://bugzilla.suse.com/1249912"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-19T16:19:41Z",
"details": "moderate"
}
],
"title": "CVE-2022-50253"
},
{
"cve": "CVE-2025-37916",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-37916"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\npds_core: remove write-after-free of client_id\n\nA use-after-free error popped up in stress testing:\n\n[Mon Apr 21 21:21:33 2025] BUG: KFENCE: use-after-free write in pdsc_auxbus_dev_del+0xef/0x160 [pds_core]\n[Mon Apr 21 21:21:33 2025] Use-after-free write at 0x000000007013ecd1 (in kfence-#47):\n[Mon Apr 21 21:21:33 2025] pdsc_auxbus_dev_del+0xef/0x160 [pds_core]\n[Mon Apr 21 21:21:33 2025] pdsc_remove+0xc0/0x1b0 [pds_core]\n[Mon Apr 21 21:21:33 2025] pci_device_remove+0x24/0x70\n[Mon Apr 21 21:21:33 2025] device_release_driver_internal+0x11f/0x180\n[Mon Apr 21 21:21:33 2025] driver_detach+0x45/0x80\n[Mon Apr 21 21:21:33 2025] bus_remove_driver+0x83/0xe0\n[Mon Apr 21 21:21:33 2025] pci_unregister_driver+0x1a/0x80\n\nThe actual device uninit usually happens on a separate thread\nscheduled after this code runs, but there is no guarantee of order\nof thread execution, so this could be a problem. There\u0027s no\nactual need to clear the client_id at this point, so simply\nremove the offending code.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-37916",
"url": "https://www.suse.com/security/cve/CVE-2025-37916"
},
{
"category": "external",
"summary": "SUSE Bug 1243474 for CVE-2025-37916",
"url": "https://bugzilla.suse.com/1243474"
},
{
"category": "external",
"summary": "SUSE Bug 1243535 for CVE-2025-37916",
"url": "https://bugzilla.suse.com/1243535"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-19T16:19:41Z",
"details": "moderate"
}
],
"title": "CVE-2025-37916"
},
{
"cve": "CVE-2025-38084",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-38084"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nmm/hugetlb: unshare page tables during VMA split, not before\n\nCurrently, __split_vma() triggers hugetlb page table unsharing through\nvm_ops-\u003emay_split(). This happens before the VMA lock and rmap locks are\ntaken - which is too early, it allows racing VMA-locked page faults in our\nprocess and racing rmap walks from other processes to cause page tables to\nbe shared again before we actually perform the split.\n\nFix it by explicitly calling into the hugetlb unshare logic from\n__split_vma() in the same place where THP splitting also happens. At that\npoint, both the VMA and the rmap(s) are write-locked.\n\nAn annoying detail is that we can now call into the helper\nhugetlb_unshare_pmds() from two different locking contexts:\n\n1. from hugetlb_split(), holding:\n - mmap lock (exclusively)\n - VMA lock\n - file rmap lock (exclusively)\n2. hugetlb_unshare_all_pmds(), which I think is designed to be able to\n call us with only the mmap lock held (in shared mode), but currently\n only runs while holding mmap lock (exclusively) and VMA lock\n\nBackporting note:\nThis commit fixes a racy protection that was introduced in commit\nb30c14cd6102 (\"hugetlb: unshare some PMDs when splitting VMAs\"); that\ncommit claimed to fix an issue introduced in 5.13, but it should actually\nalso go all the way back.\n\n[jannh@google.com: v2]",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-38084",
"url": "https://www.suse.com/security/cve/CVE-2025-38084"
},
{
"category": "external",
"summary": "SUSE Bug 1245498 for CVE-2025-38084",
"url": "https://bugzilla.suse.com/1245498"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.8,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-19T16:19:41Z",
"details": "moderate"
}
],
"title": "CVE-2025-38084"
},
{
"cve": "CVE-2025-38085",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-38085"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nmm/hugetlb: fix huge_pmd_unshare() vs GUP-fast race\n\nhuge_pmd_unshare() drops a reference on a page table that may have\npreviously been shared across processes, potentially turning it into a\nnormal page table used in another process in which unrelated VMAs can\nafterwards be installed.\n\nIf this happens in the middle of a concurrent gup_fast(), gup_fast() could\nend up walking the page tables of another process. While I don\u0027t see any\nway in which that immediately leads to kernel memory corruption, it is\nreally weird and unexpected.\n\nFix it with an explicit broadcast IPI through tlb_remove_table_sync_one(),\njust like we do in khugepaged when removing page tables for a THP\ncollapse.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-38085",
"url": "https://www.suse.com/security/cve/CVE-2025-38085"
},
{
"category": "external",
"summary": "SUSE Bug 1245499 for CVE-2025-38085",
"url": "https://bugzilla.suse.com/1245499"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.6,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-19T16:19:41Z",
"details": "moderate"
}
],
"title": "CVE-2025-38085"
},
{
"cve": "CVE-2025-38321",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-38321"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nsmb: Log an error when close_all_cached_dirs fails\n\nUnder low-memory conditions, close_all_cached_dirs() can\u0027t move the\ndentries to a separate list to dput() them once the locks are dropped.\nThis will result in a \"Dentry still in use\" error, so add an error\nmessage that makes it clear this is what happened:\n\n[ 495.281119] CIFS: VFS: \\\\otters.example.com\\share Out of memory while dropping dentries\n[ 495.281595] ------------[ cut here ]------------\n[ 495.281887] BUG: Dentry ffff888115531138{i=78,n=/} still in use (2) [unmount of cifs cifs]\n[ 495.282391] WARNING: CPU: 1 PID: 2329 at fs/dcache.c:1536 umount_check+0xc8/0xf0\n\nAlso, bail out of looping through all tcons as soon as a single\nallocation fails, since we\u0027re already in trouble, and kmalloc() attempts\nfor subseqeuent tcons are likely to fail just like the first one did.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-38321",
"url": "https://www.suse.com/security/cve/CVE-2025-38321"
},
{
"category": "external",
"summary": "SUSE Bug 1246328 for CVE-2025-38321",
"url": "https://bugzilla.suse.com/1246328"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-19T16:19:41Z",
"details": "moderate"
}
],
"title": "CVE-2025-38321"
},
{
"cve": "CVE-2025-38728",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-38728"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nsmb3: fix for slab out of bounds on mount to ksmbd\n\nWith KASAN enabled, it is possible to get a slab out of bounds\nduring mount to ksmbd due to missing check in parse_server_interfaces()\n(see below):\n\n BUG: KASAN: slab-out-of-bounds in\n parse_server_interfaces+0x14ee/0x1880 [cifs]\n Read of size 4 at addr ffff8881433dba98 by task mount/9827\n\n CPU: 5 UID: 0 PID: 9827 Comm: mount Tainted: G\n OE 6.16.0-rc2-kasan #2 PREEMPT(voluntary)\n Tainted: [O]=OOT_MODULE, [E]=UNSIGNED_MODULE\n Hardware name: Dell Inc. Precision Tower 3620/0MWYPT,\n BIOS 2.13.1 06/14/2019\n Call Trace:\n \u003cTASK\u003e\n dump_stack_lvl+0x9f/0xf0\n print_report+0xd1/0x670\n __virt_addr_valid+0x22c/0x430\n ? parse_server_interfaces+0x14ee/0x1880 [cifs]\n ? kasan_complete_mode_report_info+0x2a/0x1f0\n ? parse_server_interfaces+0x14ee/0x1880 [cifs]\n kasan_report+0xd6/0x110\n parse_server_interfaces+0x14ee/0x1880 [cifs]\n __asan_report_load_n_noabort+0x13/0x20\n parse_server_interfaces+0x14ee/0x1880 [cifs]\n ? __pfx_parse_server_interfaces+0x10/0x10 [cifs]\n ? trace_hardirqs_on+0x51/0x60\n SMB3_request_interfaces+0x1ad/0x3f0 [cifs]\n ? __pfx_SMB3_request_interfaces+0x10/0x10 [cifs]\n ? SMB2_tcon+0x23c/0x15d0 [cifs]\n smb3_qfs_tcon+0x173/0x2b0 [cifs]\n ? __pfx_smb3_qfs_tcon+0x10/0x10 [cifs]\n ? cifs_get_tcon+0x105d/0x2120 [cifs]\n ? do_raw_spin_unlock+0x5d/0x200\n ? cifs_get_tcon+0x105d/0x2120 [cifs]\n ? __pfx_smb3_qfs_tcon+0x10/0x10 [cifs]\n cifs_mount_get_tcon+0x369/0xb90 [cifs]\n ? dfs_cache_find+0xe7/0x150 [cifs]\n dfs_mount_share+0x985/0x2970 [cifs]\n ? check_path.constprop.0+0x28/0x50\n ? save_trace+0x54/0x370\n ? __pfx_dfs_mount_share+0x10/0x10 [cifs]\n ? __lock_acquire+0xb82/0x2ba0\n ? __kasan_check_write+0x18/0x20\n cifs_mount+0xbc/0x9e0 [cifs]\n ? __pfx_cifs_mount+0x10/0x10 [cifs]\n ? do_raw_spin_unlock+0x5d/0x200\n ? cifs_setup_cifs_sb+0x29d/0x810 [cifs]\n cifs_smb3_do_mount+0x263/0x1990 [cifs]",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-38728",
"url": "https://www.suse.com/security/cve/CVE-2025-38728"
},
{
"category": "external",
"summary": "SUSE Bug 1249256 for CVE-2025-38728",
"url": "https://bugzilla.suse.com/1249256"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-19T16:19:41Z",
"details": "moderate"
}
],
"title": "CVE-2025-38728"
},
{
"cve": "CVE-2025-39805",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-39805"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnet: macb: fix unregister_netdev call order in macb_remove()\n\nWhen removing a macb device, the driver calls phy_exit() before\nunregister_netdev(). This leads to a WARN from kernfs:\n\n ------------[ cut here ]------------\n kernfs: can not remove \u0027attached_dev\u0027, no directory\n WARNING: CPU: 1 PID: 27146 at fs/kernfs/dir.c:1683\n Call trace:\n kernfs_remove_by_name_ns+0xd8/0xf0\n sysfs_remove_link+0x24/0x58\n phy_detach+0x5c/0x168\n phy_disconnect+0x4c/0x70\n phylink_disconnect_phy+0x6c/0xc0 [phylink]\n macb_close+0x6c/0x170 [macb]\n ...\n macb_remove+0x60/0x168 [macb]\n platform_remove+0x5c/0x80\n ...\n\nThe warning happens because the PHY is being exited while the netdev\nis still registered. The correct order is to unregister the netdev\nbefore shutting down the PHY and cleaning up the MDIO bus.\n\nFix this by moving unregister_netdev() ahead of phy_exit() in\nmacb_remove().",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-39805",
"url": "https://www.suse.com/security/cve/CVE-2025-39805"
},
{
"category": "external",
"summary": "SUSE Bug 1249982 for CVE-2025-39805",
"url": "https://bugzilla.suse.com/1249982"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-19T16:19:41Z",
"details": "moderate"
}
],
"title": "CVE-2025-39805"
},
{
"cve": "CVE-2025-39819",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-39819"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nfs/smb: Fix inconsistent refcnt update\n\nA possible inconsistent update of refcount was identified in `smb2_compound_op`.\nSuch inconsistent update could lead to possible resource leaks.\n\nWhy it is a possible bug:\n1. In the comment section of the function, it clearly states that the\nreference to `cfile` should be dropped after calling this function.\n2. Every control flow path would check and drop the reference to\n`cfile`, except the patched one.\n3. Existing callers would not handle refcount update of `cfile` if\n-ENOMEM is returned.\n\nTo fix the bug, an extra goto label \"out\" is added, to make sure that the\ncleanup logic would always be respected. As the problem is caused by the\nallocation failure of `vars`, the cleanup logic between label \"finished\"\nand \"out\" can be safely ignored. According to the definition of function\n`is_replayable_error`, the error code of \"-ENOMEM\" is not recoverable.\nTherefore, the replay logic also gets ignored.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-39819",
"url": "https://www.suse.com/security/cve/CVE-2025-39819"
},
{
"category": "external",
"summary": "SUSE Bug 1250176 for CVE-2025-39819",
"url": "https://bugzilla.suse.com/1250176"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-19T16:19:41Z",
"details": "moderate"
}
],
"title": "CVE-2025-39819"
},
{
"cve": "CVE-2025-39822",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-39822"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nio_uring/kbuf: fix signedness in this_len calculation\n\nWhen importing and using buffers, buf-\u003elen is considered unsigned.\nHowever, buf-\u003elen is converted to signed int when committing. This can\nlead to unexpected behavior if the buffer is large enough to be\ninterpreted as a negative value. Make min_t calculation unsigned.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-39822",
"url": "https://www.suse.com/security/cve/CVE-2025-39822"
},
{
"category": "external",
"summary": "SUSE Bug 1250034 for CVE-2025-39822",
"url": "https://bugzilla.suse.com/1250034"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-19T16:19:41Z",
"details": "moderate"
}
],
"title": "CVE-2025-39822"
},
{
"cve": "CVE-2025-39831",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-39831"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nfbnic: Move phylink resume out of service_task and into open/close\n\nThe fbnic driver was presenting with the following locking assert coming\nout of a PM resume:\n[ 42.208116][ T164] RTNL: assertion failed at drivers/net/phy/phylink.c (2611)\n[ 42.208492][ T164] WARNING: CPU: 1 PID: 164 at drivers/net/phy/phylink.c:2611 phylink_resume+0x190/0x1e0\n[ 42.208872][ T164] Modules linked in:\n[ 42.209140][ T164] CPU: 1 UID: 0 PID: 164 Comm: bash Not tainted 6.17.0-rc2-virtme #134 PREEMPT(full)\n[ 42.209496][ T164] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.17.0-5.fc42 04/01/2014\n[ 42.209861][ T164] RIP: 0010:phylink_resume+0x190/0x1e0\n[ 42.210057][ T164] Code: 83 e5 01 0f 85 b0 fe ff ff c6 05 1c cd 3e 02 01 90 ba 33 0a 00 00 48 c7 c6 20 3a 1d a5 48 c7 c7 e0 3e 1d a5 e8 21 b8 90 fe 90 \u003c0f\u003e 0b 90 90 e9 86 fe ff ff e8 42 ea 1f ff e9 e2 fe ff ff 48 89 ef\n[ 42.210708][ T164] RSP: 0018:ffffc90000affbd8 EFLAGS: 00010296\n[ 42.210983][ T164] RAX: 0000000000000000 RBX: ffff8880078d8400 RCX: 0000000000000000\n[ 42.211235][ T164] RDX: 0000000000000000 RSI: 1ffffffff4f10938 RDI: 0000000000000001\n[ 42.211466][ T164] RBP: 0000000000000000 R08: ffffffffa2ae79ea R09: fffffbfff4b3eb84\n[ 42.211707][ T164] R10: 0000000000000003 R11: 0000000000000000 R12: ffff888007ad8000\n[ 42.211997][ T164] R13: 0000000000000002 R14: ffff888006a18800 R15: ffffffffa34c59e0\n[ 42.212234][ T164] FS: 00007f0dc8e39740(0000) GS:ffff88808f51f000(0000) knlGS:0000000000000000\n[ 42.212505][ T164] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033\n[ 42.212704][ T164] CR2: 00007f0dc8e9fe10 CR3: 000000000b56d003 CR4: 0000000000772ef0\n[ 42.213227][ T164] PKRU: 55555554\n[ 42.213366][ T164] Call Trace:\n[ 42.213483][ T164] \u003cTASK\u003e\n[ 42.213565][ T164] __fbnic_pm_attach.isra.0+0x8e/0xa0\n[ 42.213725][ T164] pci_reset_function+0x116/0x1d0\n[ 42.213895][ T164] reset_store+0xa0/0x100\n[ 42.214025][ T164] ? pci_dev_reset_attr_is_visible+0x50/0x50\n[ 42.214221][ T164] ? sysfs_file_kobj+0xc1/0x1e0\n[ 42.214374][ T164] ? sysfs_kf_write+0x65/0x160\n[ 42.214526][ T164] kernfs_fop_write_iter+0x2f8/0x4c0\n[ 42.214677][ T164] ? kernfs_vma_page_mkwrite+0x1f0/0x1f0\n[ 42.214836][ T164] new_sync_write+0x308/0x6f0\n[ 42.214987][ T164] ? __lock_acquire+0x34c/0x740\n[ 42.215135][ T164] ? new_sync_read+0x6f0/0x6f0\n[ 42.215288][ T164] ? lock_acquire.part.0+0xbc/0x260\n[ 42.215440][ T164] ? ksys_write+0xff/0x200\n[ 42.215590][ T164] ? perf_trace_sched_switch+0x6d0/0x6d0\n[ 42.215742][ T164] vfs_write+0x65e/0xbb0\n[ 42.215876][ T164] ksys_write+0xff/0x200\n[ 42.215994][ T164] ? __ia32_sys_read+0xc0/0xc0\n[ 42.216141][ T164] ? do_user_addr_fault+0x269/0x9f0\n[ 42.216292][ T164] ? rcu_is_watching+0x15/0xd0\n[ 42.216442][ T164] do_syscall_64+0xbb/0x360\n[ 42.216591][ T164] entry_SYSCALL_64_after_hwframe+0x4b/0x53\n[ 42.216784][ T164] RIP: 0033:0x7f0dc8ea9986\n\nA bit of digging showed that we were invoking the phylink_resume as a part\nof the fbnic_up path when we were enabling the service task while not\nholding the RTNL lock. We should be enabling this sooner as a part of the\nndo_open path and then just letting the service task come online later.\nThis will help to enforce the correct locking and brings the phylink\ninterface online at the same time as the network interface, instead of at a\nlater time.\n\nI tested this on QEMU to verify this was working by putting the system to\nsleep using \"echo mem \u003e /sys/power/state\" to put the system to sleep in the\nguest and then using the command \"system_wakeup\" in the QEMU monitor.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-39831",
"url": "https://www.suse.com/security/cve/CVE-2025-39831"
},
{
"category": "external",
"summary": "SUSE Bug 1249977 for CVE-2025-39831",
"url": "https://bugzilla.suse.com/1249977"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-19T16:19:41Z",
"details": "moderate"
}
],
"title": "CVE-2025-39831"
},
{
"cve": "CVE-2025-39859",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-39859"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nptp: ocp: fix use-after-free bugs causing by ptp_ocp_watchdog\n\nThe ptp_ocp_detach() only shuts down the watchdog timer if it is\npending. However, if the timer handler is already running, the\ntimer_delete_sync() is not called. This leads to race conditions\nwhere the devlink that contains the ptp_ocp is deallocated while\nthe timer handler is still accessing it, resulting in use-after-free\nbugs. The following details one of the race scenarios.\n\n(thread 1) | (thread 2)\nptp_ocp_remove() |\n ptp_ocp_detach() | ptp_ocp_watchdog()\n if (timer_pending(\u0026bp-\u003ewatchdog))| bp = timer_container_of()\n timer_delete_sync() |\n |\n devlink_free(devlink) //free |\n | bp-\u003e //use\n\nResolve this by unconditionally calling timer_delete_sync() to ensure\nthe timer is reliably deactivated, preventing any access after free.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-39859",
"url": "https://www.suse.com/security/cve/CVE-2025-39859"
},
{
"category": "external",
"summary": "SUSE Bug 1250252 for CVE-2025-39859",
"url": "https://bugzilla.suse.com/1250252"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-19T16:19:41Z",
"details": "moderate"
}
],
"title": "CVE-2025-39859"
},
{
"cve": "CVE-2025-39897",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-39897"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnet: xilinx: axienet: Add error handling for RX metadata pointer retrieval\n\nAdd proper error checking for dmaengine_desc_get_metadata_ptr() which\ncan return an error pointer and lead to potential crashes or undefined\nbehaviour if the pointer retrieval fails.\n\nProperly handle the error by unmapping DMA buffer, freeing the skb and\nreturning early to prevent further processing with invalid data.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-39897",
"url": "https://www.suse.com/security/cve/CVE-2025-39897"
},
{
"category": "external",
"summary": "SUSE Bug 1250746 for CVE-2025-39897",
"url": "https://bugzilla.suse.com/1250746"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.6,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-19T16:19:41Z",
"details": "moderate"
}
],
"title": "CVE-2025-39897"
},
{
"cve": "CVE-2025-39917",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-39917"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nbpf: Fix out-of-bounds dynptr write in bpf_crypto_crypt\n\nStanislav reported that in bpf_crypto_crypt() the destination dynptr\u0027s\nsize is not validated to be at least as large as the source dynptr\u0027s\nsize before calling into the crypto backend with \u0027len = src_len\u0027. This\ncan result in an OOB write when the destination is smaller than the\nsource.\n\nConcretely, in mentioned function, psrc and pdst are both linear\nbuffers fetched from each dynptr:\n\n psrc = __bpf_dynptr_data(src, src_len);\n [...]\n pdst = __bpf_dynptr_data_rw(dst, dst_len);\n [...]\n err = decrypt ?\n ctx-\u003etype-\u003edecrypt(ctx-\u003etfm, psrc, pdst, src_len, piv) :\n ctx-\u003etype-\u003eencrypt(ctx-\u003etfm, psrc, pdst, src_len, piv);\n\nThe crypto backend expects pdst to be large enough with a src_len length\nthat can be written. Add an additional src_len \u003e dst_len check and bail\nout if it\u0027s the case. Note that these kfuncs are accessible under root\nprivileges only.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-39917",
"url": "https://www.suse.com/security/cve/CVE-2025-39917"
},
{
"category": "external",
"summary": "SUSE Bug 1250723 for CVE-2025-39917",
"url": "https://bugzilla.suse.com/1250723"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-19T16:19:41Z",
"details": "moderate"
}
],
"title": "CVE-2025-39917"
},
{
"cve": "CVE-2025-39944",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-39944"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nocteontx2-pf: Fix use-after-free bugs in otx2_sync_tstamp()\n\nThe original code relies on cancel_delayed_work() in otx2_ptp_destroy(),\nwhich does not ensure that the delayed work item synctstamp_work has fully\ncompleted if it was already running. This leads to use-after-free scenarios\nwhere otx2_ptp is deallocated by otx2_ptp_destroy(), while synctstamp_work\nremains active and attempts to dereference otx2_ptp in otx2_sync_tstamp().\nFurthermore, the synctstamp_work is cyclic, the likelihood of triggering\nthe bug is nonnegligible.\n\nA typical race condition is illustrated below:\n\nCPU 0 (cleanup) | CPU 1 (delayed work callback)\notx2_remove() |\n otx2_ptp_destroy() | otx2_sync_tstamp()\n cancel_delayed_work() |\n kfree(ptp) |\n | ptp = container_of(...); //UAF\n | ptp-\u003e //UAF\n\nThis is confirmed by a KASAN report:\n\nBUG: KASAN: slab-use-after-free in __run_timer_base.part.0+0x7d7/0x8c0\nWrite of size 8 at addr ffff88800aa09a18 by task bash/136\n...\nCall Trace:\n \u003cIRQ\u003e\n dump_stack_lvl+0x55/0x70\n print_report+0xcf/0x610\n ? __run_timer_base.part.0+0x7d7/0x8c0\n kasan_report+0xb8/0xf0\n ? __run_timer_base.part.0+0x7d7/0x8c0\n __run_timer_base.part.0+0x7d7/0x8c0\n ? __pfx___run_timer_base.part.0+0x10/0x10\n ? __pfx_read_tsc+0x10/0x10\n ? ktime_get+0x60/0x140\n ? lapic_next_event+0x11/0x20\n ? clockevents_program_event+0x1d4/0x2a0\n run_timer_softirq+0xd1/0x190\n handle_softirqs+0x16a/0x550\n irq_exit_rcu+0xaf/0xe0\n sysvec_apic_timer_interrupt+0x70/0x80\n \u003c/IRQ\u003e\n...\nAllocated by task 1:\n kasan_save_stack+0x24/0x50\n kasan_save_track+0x14/0x30\n __kasan_kmalloc+0x7f/0x90\n otx2_ptp_init+0xb1/0x860\n otx2_probe+0x4eb/0xc30\n local_pci_probe+0xdc/0x190\n pci_device_probe+0x2fe/0x470\n really_probe+0x1ca/0x5c0\n __driver_probe_device+0x248/0x310\n driver_probe_device+0x44/0x120\n __driver_attach+0xd2/0x310\n bus_for_each_dev+0xed/0x170\n bus_add_driver+0x208/0x500\n driver_register+0x132/0x460\n do_one_initcall+0x89/0x300\n kernel_init_freeable+0x40d/0x720\n kernel_init+0x1a/0x150\n ret_from_fork+0x10c/0x1a0\n ret_from_fork_asm+0x1a/0x30\n\nFreed by task 136:\n kasan_save_stack+0x24/0x50\n kasan_save_track+0x14/0x30\n kasan_save_free_info+0x3a/0x60\n __kasan_slab_free+0x3f/0x50\n kfree+0x137/0x370\n otx2_ptp_destroy+0x38/0x80\n otx2_remove+0x10d/0x4c0\n pci_device_remove+0xa6/0x1d0\n device_release_driver_internal+0xf8/0x210\n pci_stop_bus_device+0x105/0x150\n pci_stop_and_remove_bus_device_locked+0x15/0x30\n remove_store+0xcc/0xe0\n kernfs_fop_write_iter+0x2c3/0x440\n vfs_write+0x871/0xd70\n ksys_write+0xee/0x1c0\n do_syscall_64+0xac/0x280\n entry_SYSCALL_64_after_hwframe+0x77/0x7f\n...\n\nReplace cancel_delayed_work() with cancel_delayed_work_sync() to ensure\nthat the delayed work item is properly canceled before the otx2_ptp is\ndeallocated.\n\nThis bug was initially identified through static analysis. To reproduce\nand test it, I simulated the OcteonTX2 PCI device in QEMU and introduced\nartificial delays within the otx2_sync_tstamp() function to increase the\nlikelihood of triggering the bug.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-39944",
"url": "https://www.suse.com/security/cve/CVE-2025-39944"
},
{
"category": "external",
"summary": "SUSE Bug 1251120 for CVE-2025-39944",
"url": "https://bugzilla.suse.com/1251120"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-19T16:19:41Z",
"details": "moderate"
}
],
"title": "CVE-2025-39944"
},
{
"cve": "CVE-2025-39961",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-39961"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\niommu/amd/pgtbl: Fix possible race while increase page table level\n\nThe AMD IOMMU host page table implementation supports dynamic page table levels\n(up to 6 levels), starting with a 3-level configuration that expands based on\nIOVA address. The kernel maintains a root pointer and current page table level\nto enable proper page table walks in alloc_pte()/fetch_pte() operations.\n\nThe IOMMU IOVA allocator initially starts with 32-bit address and onces its\nexhuasted it switches to 64-bit address (max address is determined based\non IOMMU and device DMA capability). To support larger IOVA, AMD IOMMU\ndriver increases page table level.\n\nBut in unmap path (iommu_v1_unmap_pages()), fetch_pte() reads\npgtable-\u003e[root/mode] without lock. So its possible that in exteme corner case,\nwhen increase_address_space() is updating pgtable-\u003e[root/mode], fetch_pte()\nreads wrong page table level (pgtable-\u003emode). It does compare the value with\nlevel encoded in page table and returns NULL. This will result is\niommu_unmap ops to fail and upper layer may retry/log WARN_ON.\n\nCPU 0 CPU 1\n------ ------\nmap pages unmap pages\nalloc_pte() -\u003e increase_address_space() iommu_v1_unmap_pages() -\u003e fetch_pte()\n pgtable-\u003eroot = pte (new root value)\n READ pgtable-\u003e[mode/root]\n\t\t\t\t\t Reads new root, old mode\n Updates mode (pgtable-\u003emode += 1)\n\nSince Page table level updates are infrequent and already synchronized with a\nspinlock, implement seqcount to enable lock-free read operations on the read path.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-39961",
"url": "https://www.suse.com/security/cve/CVE-2025-39961"
},
{
"category": "external",
"summary": "SUSE Bug 1251817 for CVE-2025-39961",
"url": "https://bugzilla.suse.com/1251817"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.8,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-19T16:19:41Z",
"details": "moderate"
}
],
"title": "CVE-2025-39961"
},
{
"cve": "CVE-2025-39980",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-39980"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnexthop: Forbid FDB status change while nexthop is in a group\n\nThe kernel forbids the creation of non-FDB nexthop groups with FDB\nnexthops:\n\n # ip nexthop add id 1 via 192.0.2.1 fdb\n # ip nexthop add id 2 group 1\n Error: Non FDB nexthop group cannot have fdb nexthops.\n\nAnd vice versa:\n\n # ip nexthop add id 3 via 192.0.2.2 dev dummy1\n # ip nexthop add id 4 group 3 fdb\n Error: FDB nexthop group can only have fdb nexthops.\n\nHowever, as long as no routes are pointing to a non-FDB nexthop group,\nthe kernel allows changing the type of a nexthop from FDB to non-FDB and\nvice versa:\n\n # ip nexthop add id 5 via 192.0.2.2 dev dummy1\n # ip nexthop add id 6 group 5\n # ip nexthop replace id 5 via 192.0.2.2 fdb\n # echo $?\n 0\n\nThis configuration is invalid and can result in a NPD [1] since FDB\nnexthops are not associated with a nexthop device:\n\n # ip route add 198.51.100.1/32 nhid 6\n # ping 198.51.100.1\n\nFix by preventing nexthop FDB status change while the nexthop is in a\ngroup:\n\n # ip nexthop add id 7 via 192.0.2.2 dev dummy1\n # ip nexthop add id 8 group 7\n # ip nexthop replace id 7 via 192.0.2.2 fdb\n Error: Cannot change nexthop FDB status while in a group.\n\n[1]\nBUG: kernel NULL pointer dereference, address: 00000000000003c0\n[...]\nOops: Oops: 0000 [#1] SMP\nCPU: 6 UID: 0 PID: 367 Comm: ping Not tainted 6.17.0-rc6-virtme-gb65678cacc03 #1 PREEMPT(voluntary)\nHardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.17.0-4.fc41 04/01/2014\nRIP: 0010:fib_lookup_good_nhc+0x1e/0x80\n[...]\nCall Trace:\n \u003cTASK\u003e\n fib_table_lookup+0x541/0x650\n ip_route_output_key_hash_rcu+0x2ea/0x970\n ip_route_output_key_hash+0x55/0x80\n __ip4_datagram_connect+0x250/0x330\n udp_connect+0x2b/0x60\n __sys_connect+0x9c/0xd0\n __x64_sys_connect+0x18/0x20\n do_syscall_64+0xa4/0x2a0\n entry_SYSCALL_64_after_hwframe+0x4b/0x53",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-39980",
"url": "https://www.suse.com/security/cve/CVE-2025-39980"
},
{
"category": "external",
"summary": "SUSE Bug 1252063 for CVE-2025-39980",
"url": "https://bugzilla.suse.com/1252063"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-19T16:19:41Z",
"details": "moderate"
}
],
"title": "CVE-2025-39980"
},
{
"cve": "CVE-2025-39990",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-39990"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nbpf: Check the helper function is valid in get_helper_proto\n\nkernel test robot reported verifier bug [1] where the helper func\npointer could be NULL due to disabled config option.\n\nAs Alexei suggested we could check on that in get_helper_proto\ndirectly. Marking tail_call helper func with BPF_PTR_POISON,\nbecause it is unused by design.\n\n [1] https://lore.kernel.org/oe-lkp/202507160818.68358831-lkp@intel.com",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-39990",
"url": "https://www.suse.com/security/cve/CVE-2025-39990"
},
{
"category": "external",
"summary": "SUSE Bug 1252054 for CVE-2025-39990",
"url": "https://bugzilla.suse.com/1252054"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-19T16:19:41Z",
"details": "moderate"
}
],
"title": "CVE-2025-39990"
},
{
"cve": "CVE-2025-40001",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40001"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nscsi: mvsas: Fix use-after-free bugs in mvs_work_queue\n\nDuring the detaching of Marvell\u0027s SAS/SATA controller, the original code\ncalls cancel_delayed_work() in mvs_free() to cancel the delayed work\nitem mwq-\u003ework_q. However, if mwq-\u003ework_q is already running, the\ncancel_delayed_work() may fail to cancel it. This can lead to\nuse-after-free scenarios where mvs_free() frees the mvs_info while\nmvs_work_queue() is still executing and attempts to access the\nalready-freed mvs_info.\n\nA typical race condition is illustrated below:\n\nCPU 0 (remove) | CPU 1 (delayed work callback)\nmvs_pci_remove() |\n mvs_free() | mvs_work_queue()\n cancel_delayed_work() |\n kfree(mvi) |\n | mvi-\u003e // UAF\n\nReplace cancel_delayed_work() with cancel_delayed_work_sync() to ensure\nthat the delayed work item is properly canceled and any executing\ndelayed work item completes before the mvs_info is deallocated.\n\nThis bug was found by static analysis.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40001",
"url": "https://www.suse.com/security/cve/CVE-2025-40001"
},
{
"category": "external",
"summary": "SUSE Bug 1252303 for CVE-2025-40001",
"url": "https://bugzilla.suse.com/1252303"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.8,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-19T16:19:41Z",
"details": "moderate"
}
],
"title": "CVE-2025-40001"
},
{
"cve": "CVE-2025-40003",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40003"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnet: mscc: ocelot: Fix use-after-free caused by cyclic delayed work\n\nThe origin code calls cancel_delayed_work() in ocelot_stats_deinit()\nto cancel the cyclic delayed work item ocelot-\u003estats_work. However,\ncancel_delayed_work() may fail to cancel the work item if it is already\nexecuting. While destroy_workqueue() does wait for all pending work items\nin the work queue to complete before destroying the work queue, it cannot\nprevent the delayed work item from being rescheduled within the\nocelot_check_stats_work() function. This limitation exists because the\ndelayed work item is only enqueued into the work queue after its timer\nexpires. Before the timer expiration, destroy_workqueue() has no visibility\nof this pending work item. Once the work queue appears empty,\ndestroy_workqueue() proceeds with destruction. When the timer eventually\nexpires, the delayed work item gets queued again, leading to the following\nwarning:\n\nworkqueue: cannot queue ocelot_check_stats_work on wq ocelot-switch-stats\nWARNING: CPU: 2 PID: 0 at kernel/workqueue.c:2255 __queue_work+0x875/0xaf0\n...\nRIP: 0010:__queue_work+0x875/0xaf0\n...\nRSP: 0018:ffff88806d108b10 EFLAGS: 00010086\nRAX: 0000000000000000 RBX: 0000000000000101 RCX: 0000000000000027\nRDX: 0000000000000027 RSI: 0000000000000004 RDI: ffff88806d123e88\nRBP: ffffffff813c3170 R08: 0000000000000000 R09: ffffed100da247d2\nR10: ffffed100da247d1 R11: ffff88806d123e8b R12: ffff88800c00f000\nR13: ffff88800d7285c0 R14: ffff88806d0a5580 R15: ffff88800d7285a0\nFS: 0000000000000000(0000) GS:ffff8880e5725000(0000) knlGS:0000000000000000\nCS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033\nCR2: 00007fe18e45ea10 CR3: 0000000005e6c000 CR4: 00000000000006f0\nCall Trace:\n \u003cIRQ\u003e\n ? kasan_report+0xc6/0xf0\n ? __pfx_delayed_work_timer_fn+0x10/0x10\n ? __pfx_delayed_work_timer_fn+0x10/0x10\n call_timer_fn+0x25/0x1c0\n __run_timer_base.part.0+0x3be/0x8c0\n ? __pfx_delayed_work_timer_fn+0x10/0x10\n ? rcu_sched_clock_irq+0xb06/0x27d0\n ? __pfx___run_timer_base.part.0+0x10/0x10\n ? try_to_wake_up+0xb15/0x1960\n ? _raw_spin_lock_irq+0x80/0xe0\n ? __pfx__raw_spin_lock_irq+0x10/0x10\n tmigr_handle_remote_up+0x603/0x7e0\n ? __pfx_tmigr_handle_remote_up+0x10/0x10\n ? sched_balance_trigger+0x1c0/0x9f0\n ? sched_tick+0x221/0x5a0\n ? _raw_spin_lock_irq+0x80/0xe0\n ? __pfx__raw_spin_lock_irq+0x10/0x10\n ? tick_nohz_handler+0x339/0x440\n ? __pfx_tmigr_handle_remote_up+0x10/0x10\n __walk_groups.isra.0+0x42/0x150\n tmigr_handle_remote+0x1f4/0x2e0\n ? __pfx_tmigr_handle_remote+0x10/0x10\n ? ktime_get+0x60/0x140\n ? lapic_next_event+0x11/0x20\n ? clockevents_program_event+0x1d4/0x2a0\n ? hrtimer_interrupt+0x322/0x780\n handle_softirqs+0x16a/0x550\n irq_exit_rcu+0xaf/0xe0\n sysvec_apic_timer_interrupt+0x70/0x80\n \u003c/IRQ\u003e\n...\n\nThe following diagram reveals the cause of the above warning:\n\nCPU 0 (remove) | CPU 1 (delayed work callback)\nmscc_ocelot_remove() |\n ocelot_deinit() | ocelot_check_stats_work()\n ocelot_stats_deinit() |\n cancel_delayed_work()| ...\n | queue_delayed_work()\n destroy_workqueue() | (wait a time)\n | __queue_work() //UAF\n\nThe above scenario actually constitutes a UAF vulnerability.\n\nThe ocelot_stats_deinit() is only invoked when initialization\nfailure or resource destruction, so we must ensure that any\ndelayed work items cannot be rescheduled.\n\nReplace cancel_delayed_work() with disable_delayed_work_sync()\nto guarantee proper cancellation of the delayed work item and\nensure completion of any currently executing work before the\nworkqueue is deallocated.\n\nA deadlock concern was considered: ocelot_stats_deinit() is called\nin a process context and is not holding any locks that the delayed\nwork item might also need. Therefore, the use of the _sync() variant\nis safe here.\n\nThis bug was identified through static analysis. To reproduce the\nissue and validate the fix, I simulated ocelot-swit\n---truncated---",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40003",
"url": "https://www.suse.com/security/cve/CVE-2025-40003"
},
{
"category": "external",
"summary": "SUSE Bug 1252301 for CVE-2025-40003",
"url": "https://bugzilla.suse.com/1252301"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-19T16:19:41Z",
"details": "moderate"
}
],
"title": "CVE-2025-40003"
},
{
"cve": "CVE-2025-40006",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40006"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nmm/hugetlb: fix folio is still mapped when deleted\n\nMigration may be raced with fallocating hole. remove_inode_single_folio\nwill unmap the folio if the folio is still mapped. However, it\u0027s called\nwithout folio lock. If the folio is migrated and the mapped pte has been\nconverted to migration entry, folio_mapped() returns false, and won\u0027t\nunmap it. Due to extra refcount held by remove_inode_single_folio,\nmigration fails, restores migration entry to normal pte, and the folio is\nmapped again. As a result, we triggered BUG in filemap_unaccount_folio.\n\nThe log is as follows:\n BUG: Bad page cache in process hugetlb pfn:156c00\n page: refcount:515 mapcount:0 mapping:0000000099fef6e1 index:0x0 pfn:0x156c00\n head: order:9 mapcount:1 entire_mapcount:1 nr_pages_mapped:0 pincount:0\n aops:hugetlbfs_aops ino:dcc dentry name(?):\"my_hugepage_file\"\n flags: 0x17ffffc00000c1(locked|waiters|head|node=0|zone=2|lastcpupid=0x1fffff)\n page_type: f4(hugetlb)\n page dumped because: still mapped when deleted\n CPU: 1 UID: 0 PID: 395 Comm: hugetlb Not tainted 6.17.0-rc5-00044-g7aac71907bde-dirty #484 NONE\n Hardware name: QEMU Ubuntu 24.04 PC (i440FX + PIIX, 1996), BIOS 0.0.0 02/06/2015\n Call Trace:\n \u003cTASK\u003e\n dump_stack_lvl+0x4f/0x70\n filemap_unaccount_folio+0xc4/0x1c0\n __filemap_remove_folio+0x38/0x1c0\n filemap_remove_folio+0x41/0xd0\n remove_inode_hugepages+0x142/0x250\n hugetlbfs_fallocate+0x471/0x5a0\n vfs_fallocate+0x149/0x380\n\nHold folio lock before checking if the folio is mapped to avold race with\nmigration.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40006",
"url": "https://www.suse.com/security/cve/CVE-2025-40006"
},
{
"category": "external",
"summary": "SUSE Bug 1252342 for CVE-2025-40006",
"url": "https://bugzilla.suse.com/1252342"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.7,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-19T16:19:41Z",
"details": "moderate"
}
],
"title": "CVE-2025-40006"
},
{
"cve": "CVE-2025-40021",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40021"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\ntracing: dynevent: Add a missing lockdown check on dynevent\n\nSince dynamic_events interface on tracefs is compatible with\nkprobe_events and uprobe_events, it should also check the lockdown\nstatus and reject if it is set.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40021",
"url": "https://www.suse.com/security/cve/CVE-2025-40021"
},
{
"category": "external",
"summary": "SUSE Bug 1252681 for CVE-2025-40021",
"url": "https://bugzilla.suse.com/1252681"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-19T16:19:41Z",
"details": "moderate"
}
],
"title": "CVE-2025-40021"
},
{
"cve": "CVE-2025-40024",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40024"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nvhost: Take a reference on the task in struct vhost_task.\n\nvhost_task_create() creates a task and keeps a reference to its\ntask_struct. That task may exit early via a signal and its task_struct\nwill be released.\nA pending vhost_task_wake() will then attempt to wake the task and\naccess a task_struct which is no longer there.\n\nAcquire a reference on the task_struct while creating the thread and\nrelease the reference while the struct vhost_task itself is removed.\nIf the task exits early due to a signal, then the vhost_task_wake() will\nstill access a valid task_struct. The wake is safe and will be skipped\nin this case.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40024",
"url": "https://www.suse.com/security/cve/CVE-2025-40024"
},
{
"category": "external",
"summary": "SUSE Bug 1252686 for CVE-2025-40024",
"url": "https://bugzilla.suse.com/1252686"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-19T16:19:41Z",
"details": "moderate"
}
],
"title": "CVE-2025-40024"
},
{
"cve": "CVE-2025-40027",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40027"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnet/9p: fix double req put in p9_fd_cancelled\n\nSyzkaller reports a KASAN issue as below:\n\ngeneral protection fault, probably for non-canonical address 0xfbd59c0000000021: 0000 [#1] PREEMPT SMP KASAN NOPTI\nKASAN: maybe wild-memory-access in range [0xdead000000000108-0xdead00000000010f]\nCPU: 0 PID: 5083 Comm: syz-executor.2 Not tainted 6.1.134-syzkaller-00037-g855bd1d7d838 #0\nHardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014\nRIP: 0010:__list_del include/linux/list.h:114 [inline]\nRIP: 0010:__list_del_entry include/linux/list.h:137 [inline]\nRIP: 0010:list_del include/linux/list.h:148 [inline]\nRIP: 0010:p9_fd_cancelled+0xe9/0x200 net/9p/trans_fd.c:734\n\nCall Trace:\n \u003cTASK\u003e\n p9_client_flush+0x351/0x440 net/9p/client.c:614\n p9_client_rpc+0xb6b/0xc70 net/9p/client.c:734\n p9_client_version net/9p/client.c:920 [inline]\n p9_client_create+0xb51/0x1240 net/9p/client.c:1027\n v9fs_session_init+0x1f0/0x18f0 fs/9p/v9fs.c:408\n v9fs_mount+0xba/0xcb0 fs/9p/vfs_super.c:126\n legacy_get_tree+0x108/0x220 fs/fs_context.c:632\n vfs_get_tree+0x8e/0x300 fs/super.c:1573\n do_new_mount fs/namespace.c:3056 [inline]\n path_mount+0x6a6/0x1e90 fs/namespace.c:3386\n do_mount fs/namespace.c:3399 [inline]\n __do_sys_mount fs/namespace.c:3607 [inline]\n __se_sys_mount fs/namespace.c:3584 [inline]\n __x64_sys_mount+0x283/0x300 fs/namespace.c:3584\n do_syscall_x64 arch/x86/entry/common.c:51 [inline]\n do_syscall_64+0x35/0x80 arch/x86/entry/common.c:81\n entry_SYSCALL_64_after_hwframe+0x6e/0xd8\n\nThis happens because of a race condition between:\n\n- The 9p client sending an invalid flush request and later cleaning it up;\n- The 9p client in p9_read_work() canceled all pending requests.\n\n Thread 1 Thread 2\n ...\n p9_client_create()\n ...\n p9_fd_create()\n ...\n p9_conn_create()\n ...\n // start Thread 2\n INIT_WORK(\u0026m-\u003erq, p9_read_work);\n p9_read_work()\n ...\n p9_client_rpc()\n ...\n ...\n p9_conn_cancel()\n ...\n spin_lock(\u0026m-\u003ereq_lock);\n ...\n p9_fd_cancelled()\n ...\n ...\n spin_unlock(\u0026m-\u003ereq_lock);\n // status rewrite\n p9_client_cb(m-\u003eclient, req, REQ_STATUS_ERROR)\n // first remove\n list_del(\u0026req-\u003ereq_list);\n ...\n\n spin_lock(\u0026m-\u003ereq_lock)\n ...\n // second remove\n list_del(\u0026req-\u003ereq_list);\n spin_unlock(\u0026m-\u003ereq_lock)\n ...\n\nCommit 74d6a5d56629 (\"9p/trans_fd: Fix concurrency del of req_list in\np9_fd_cancelled/p9_read_work\") fixes a concurrency issue in the 9p filesystem\nclient where the req_list could be deleted simultaneously by both\np9_read_work and p9_fd_cancelled functions, but for the case where req-\u003estatus\nequals REQ_STATUS_RCVD.\n\nUpdate the check for req-\u003estatus in p9_fd_cancelled to skip processing not\njust received requests, but anything that is not SENT, as whatever\nchanged the state from SENT also removed the request from its list.\n\nFound by Linux Verification Center (linuxtesting.org) with Syzkaller.\n\n[updated the check from status == RECV || status == ERROR to status != SENT]",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40027",
"url": "https://www.suse.com/security/cve/CVE-2025-40027"
},
{
"category": "external",
"summary": "SUSE Bug 1252763 for CVE-2025-40027",
"url": "https://bugzilla.suse.com/1252763"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-19T16:19:41Z",
"details": "moderate"
}
],
"title": "CVE-2025-40027"
},
{
"cve": "CVE-2025-40031",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40031"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\ntee: fix register_shm_helper()\n\nIn register_shm_helper(), fix incorrect error handling for a call to\niov_iter_extract_pages(). A case is missing for when\niov_iter_extract_pages() only got some pages and return a number larger\nthan 0, but not the requested amount.\n\nThis fixes a possible NULL pointer dereference following a bad input from\nioctl(TEE_IOC_SHM_REGISTER) where parts of the buffer isn\u0027t mapped.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40031",
"url": "https://www.suse.com/security/cve/CVE-2025-40031"
},
{
"category": "external",
"summary": "SUSE Bug 1252779 for CVE-2025-40031",
"url": "https://bugzilla.suse.com/1252779"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-19T16:19:41Z",
"details": "moderate"
}
],
"title": "CVE-2025-40031"
},
{
"cve": "CVE-2025-40033",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40033"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nremoteproc: pru: Fix potential NULL pointer dereference in pru_rproc_set_ctable()\n\npru_rproc_set_ctable() accessed rproc-\u003epriv before the IS_ERR_OR_NULL\ncheck, which could lead to a null pointer dereference. Move the pru\nassignment, ensuring we never dereference a NULL rproc pointer.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40033",
"url": "https://www.suse.com/security/cve/CVE-2025-40033"
},
{
"category": "external",
"summary": "SUSE Bug 1252824 for CVE-2025-40033",
"url": "https://bugzilla.suse.com/1252824"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-19T16:19:41Z",
"details": "moderate"
}
],
"title": "CVE-2025-40033"
},
{
"cve": "CVE-2025-40038",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40038"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nKVM: SVM: Skip fastpath emulation on VM-Exit if next RIP isn\u0027t valid\n\nSkip the WRMSR and HLT fastpaths in SVM\u0027s VM-Exit handler if the next RIP\nisn\u0027t valid, e.g. because KVM is running with nrips=false. SVM must\ndecode and emulate to skip the instruction if the CPU doesn\u0027t provide the\nnext RIP, and getting the instruction bytes to decode requires reading\nguest memory. Reading guest memory through the emulator can fault, i.e.\ncan sleep, which is disallowed since the fastpath handlers run with IRQs\ndisabled.\n\n BUG: sleeping function called from invalid context at ./include/linux/uaccess.h:106\n in_atomic(): 1, irqs_disabled(): 1, non_block: 0, pid: 32611, name: qemu\n preempt_count: 1, expected: 0\n INFO: lockdep is turned off.\n irq event stamp: 30580\n hardirqs last enabled at (30579): [\u003cffffffffc08b2527\u003e] vcpu_run+0x1787/0x1db0 [kvm]\n hardirqs last disabled at (30580): [\u003cffffffffb4f62e32\u003e] __schedule+0x1e2/0xed0\n softirqs last enabled at (30570): [\u003cffffffffb4247a64\u003e] fpu_swap_kvm_fpstate+0x44/0x210\n softirqs last disabled at (30568): [\u003cffffffffb4247a64\u003e] fpu_swap_kvm_fpstate+0x44/0x210\n CPU: 298 UID: 0 PID: 32611 Comm: qemu Tainted: G U 6.16.0-smp--e6c618b51cfe-sleep #782 NONE\n Tainted: [U]=USER\n Hardware name: Google Astoria-Turin/astoria, BIOS 0.20241223.2-0 01/17/2025\n Call Trace:\n \u003cTASK\u003e\n dump_stack_lvl+0x7d/0xb0\n __might_resched+0x271/0x290\n __might_fault+0x28/0x80\n kvm_vcpu_read_guest_page+0x8d/0xc0 [kvm]\n kvm_fetch_guest_virt+0x92/0xc0 [kvm]\n __do_insn_fetch_bytes+0xf3/0x1e0 [kvm]\n x86_decode_insn+0xd1/0x1010 [kvm]\n x86_emulate_instruction+0x105/0x810 [kvm]\n __svm_skip_emulated_instruction+0xc4/0x140 [kvm_amd]\n handle_fastpath_invd+0xc4/0x1a0 [kvm]\n vcpu_run+0x11a1/0x1db0 [kvm]\n kvm_arch_vcpu_ioctl_run+0x5cc/0x730 [kvm]\n kvm_vcpu_ioctl+0x578/0x6a0 [kvm]\n __se_sys_ioctl+0x6d/0xb0\n do_syscall_64+0x8a/0x2c0\n entry_SYSCALL_64_after_hwframe+0x4b/0x53\n RIP: 0033:0x7f479d57a94b\n \u003c/TASK\u003e\n\nNote, this is essentially a reapply of commit 5c30e8101e8d (\"KVM: SVM:\nSkip WRMSR fastpath on VM-Exit if next RIP isn\u0027t valid\"), but with\ndifferent justification (KVM now grabs SRCU when skipping the instruction\nfor other reasons).",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40038",
"url": "https://www.suse.com/security/cve/CVE-2025-40038"
},
{
"category": "external",
"summary": "SUSE Bug 1252817 for CVE-2025-40038",
"url": "https://bugzilla.suse.com/1252817"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-19T16:19:41Z",
"details": "moderate"
}
],
"title": "CVE-2025-40038"
},
{
"cve": "CVE-2025-40047",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40047"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nio_uring/waitid: always prune wait queue entry in io_waitid_wait()\n\nFor a successful return, always remove our entry from the wait queue\nentry list. Previously this was skipped if a cancelation was in\nprogress, but this can race with another invocation of the wait queue\nentry callback.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40047",
"url": "https://www.suse.com/security/cve/CVE-2025-40047"
},
{
"category": "external",
"summary": "SUSE Bug 1252790 for CVE-2025-40047",
"url": "https://bugzilla.suse.com/1252790"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.7,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-19T16:19:41Z",
"details": "moderate"
}
],
"title": "CVE-2025-40047"
},
{
"cve": "CVE-2025-40053",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40053"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnet: dlink: handle copy_thresh allocation failure\n\nThe driver did not handle failure of `netdev_alloc_skb_ip_align()`.\nIf the allocation failed, dereferencing `skb-\u003eprotocol` could lead to\na NULL pointer dereference.\n\nThis patch tries to allocate `skb`. If the allocation fails, it falls\nback to the normal path.\n\nTested-on: D-Link DGE-550T Rev-A3",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40053",
"url": "https://www.suse.com/security/cve/CVE-2025-40053"
},
{
"category": "external",
"summary": "SUSE Bug 1252808 for CVE-2025-40053",
"url": "https://bugzilla.suse.com/1252808"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-19T16:19:41Z",
"details": "moderate"
}
],
"title": "CVE-2025-40053"
},
{
"cve": "CVE-2025-40055",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40055"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nocfs2: fix double free in user_cluster_connect()\n\nuser_cluster_disconnect() frees \"conn-\u003ecc_private\" which is \"lc\" but then\nthe error handling frees \"lc\" a second time. Set \"lc\" to NULL on this\npath to avoid a double free.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40055",
"url": "https://www.suse.com/security/cve/CVE-2025-40055"
},
{
"category": "external",
"summary": "SUSE Bug 1252821 for CVE-2025-40055",
"url": "https://bugzilla.suse.com/1252821"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-19T16:19:41Z",
"details": "moderate"
}
],
"title": "CVE-2025-40055"
},
{
"cve": "CVE-2025-40059",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40059"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\ncoresight: Fix incorrect handling for return value of devm_kzalloc\n\nThe return value of devm_kzalloc could be an null pointer,\nuse \"!desc.pdata\" to fix incorrect handling return value\nof devm_kzalloc.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40059",
"url": "https://www.suse.com/security/cve/CVE-2025-40059"
},
{
"category": "external",
"summary": "SUSE Bug 1252809 for CVE-2025-40059",
"url": "https://bugzilla.suse.com/1252809"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-19T16:19:41Z",
"details": "moderate"
}
],
"title": "CVE-2025-40059"
},
{
"cve": "CVE-2025-40064",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40064"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nsmc: Fix use-after-free in __pnet_find_base_ndev().\n\nsyzbot reported use-after-free of net_device in __pnet_find_base_ndev(),\nwhich was called during connect(). [0]\n\nsmc_pnet_find_ism_resource() fetches sk_dst_get(sk)-\u003edev and passes\ndown to pnet_find_base_ndev(), where RTNL is held. Then, UAF happened\nat __pnet_find_base_ndev() when the dev is first used.\n\nThis means dev had already been freed before acquiring RTNL in\npnet_find_base_ndev().\n\nWhile dev is going away, dst-\u003edev could be swapped with blackhole_netdev,\nand the dev\u0027s refcnt by dst will be released.\n\nWe must hold dev\u0027s refcnt before calling smc_pnet_find_ism_resource().\n\nAlso, smc_pnet_find_roce_resource() has the same problem.\n\nLet\u0027s use __sk_dst_get() and dst_dev_rcu() in the two functions.\n\n[0]:\nBUG: KASAN: use-after-free in __pnet_find_base_ndev+0x1b1/0x1c0 net/smc/smc_pnet.c:926\nRead of size 1 at addr ffff888036bac33a by task syz.0.3632/18609\n\nCPU: 1 UID: 0 PID: 18609 Comm: syz.0.3632 Not tainted syzkaller #0 PREEMPT(full)\nHardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/18/2025\nCall Trace:\n \u003cTASK\u003e\n dump_stack_lvl+0x189/0x250 lib/dump_stack.c:120\n print_address_description mm/kasan/report.c:378 [inline]\n print_report+0xca/0x240 mm/kasan/report.c:482\n kasan_report+0x118/0x150 mm/kasan/report.c:595\n __pnet_find_base_ndev+0x1b1/0x1c0 net/smc/smc_pnet.c:926\n pnet_find_base_ndev net/smc/smc_pnet.c:946 [inline]\n smc_pnet_find_ism_by_pnetid net/smc/smc_pnet.c:1103 [inline]\n smc_pnet_find_ism_resource+0xef/0x390 net/smc/smc_pnet.c:1154\n smc_find_ism_device net/smc/af_smc.c:1030 [inline]\n smc_find_proposal_devices net/smc/af_smc.c:1115 [inline]\n __smc_connect+0x372/0x1890 net/smc/af_smc.c:1545\n smc_connect+0x877/0xd90 net/smc/af_smc.c:1715\n __sys_connect_file net/socket.c:2086 [inline]\n __sys_connect+0x313/0x440 net/socket.c:2105\n __do_sys_connect net/socket.c:2111 [inline]\n __se_sys_connect net/socket.c:2108 [inline]\n __x64_sys_connect+0x7a/0x90 net/socket.c:2108\n do_syscall_x64 arch/x86/entry/syscall_64.c:63 [inline]\n do_syscall_64+0xfa/0x3b0 arch/x86/entry/syscall_64.c:94\n entry_SYSCALL_64_after_hwframe+0x77/0x7f\nRIP: 0033:0x7f47cbf8eba9\nCode: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 \u003c48\u003e 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48\nRSP: 002b:00007f47ccdb1038 EFLAGS: 00000246 ORIG_RAX: 000000000000002a\nRAX: ffffffffffffffda RBX: 00007f47cc1d5fa0 RCX: 00007f47cbf8eba9\nRDX: 0000000000000010 RSI: 0000200000000280 RDI: 000000000000000b\nRBP: 00007f47cc011e19 R08: 0000000000000000 R09: 0000000000000000\nR10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000\nR13: 00007f47cc1d6038 R14: 00007f47cc1d5fa0 R15: 00007ffc512f8aa8\n \u003c/TASK\u003e\n\nThe buggy address belongs to the physical page:\npage: refcount:0 mapcount:0 mapping:0000000000000000 index:0xffff888036bacd00 pfn:0x36bac\nflags: 0xfff00000000000(node=0|zone=1|lastcpupid=0x7ff)\nraw: 00fff00000000000 ffffea0001243d08 ffff8880b863fdc0 0000000000000000\nraw: ffff888036bacd00 0000000000000000 00000000ffffffff 0000000000000000\npage dumped because: kasan: bad access detected\npage_owner tracks the page as freed\npage last allocated via order 2, migratetype Unmovable, gfp_mask 0x446dc0(GFP_KERNEL_ACCOUNT|__GFP_ZERO|__GFP_NOWARN|__GFP_RETRY_MAYFAIL|__GFP_COMP), pid 16741, tgid 16741 (syz-executor), ts 343313197788, free_ts 380670750466\n set_page_owner include/linux/page_owner.h:32 [inline]\n post_alloc_hook+0x240/0x2a0 mm/page_alloc.c:1851\n prep_new_page mm/page_alloc.c:1859 [inline]\n get_page_from_freelist+0x21e4/0x22c0 mm/page_alloc.c:3858\n __alloc_frozen_pages_noprof+0x181/0x370 mm/page_alloc.c:5148\n alloc_pages_mpol+0x232/0x4a0 mm/mempolicy.c:2416\n ___kmalloc_large_node+0x5f/0x1b0 mm/slub.c:4317\n __kmalloc_large_node_noprof+0x18/0x90 mm/slub.c:4348\n __do_kmalloc_node mm/slub.c:4364 [inline]\n __kvmalloc_node\n---truncated---",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40064",
"url": "https://www.suse.com/security/cve/CVE-2025-40064"
},
{
"category": "external",
"summary": "SUSE Bug 1252845 for CVE-2025-40064",
"url": "https://bugzilla.suse.com/1252845"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-19T16:19:41Z",
"details": "moderate"
}
],
"title": "CVE-2025-40064"
},
{
"cve": "CVE-2025-40070",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40070"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\npps: fix warning in pps_register_cdev when register device fail\n\nSimilar to previous commit 2a934fdb01db (\"media: v4l2-dev: fix error\nhandling in __video_register_device()\"), the release hook should be set\nbefore device_register(). Otherwise, when device_register() return error\nand put_device() try to callback the release function, the below warning\nmay happen.\n\n ------------[ cut here ]------------\n WARNING: CPU: 1 PID: 4760 at drivers/base/core.c:2567 device_release+0x1bd/0x240 drivers/base/core.c:2567\n Modules linked in:\n CPU: 1 UID: 0 PID: 4760 Comm: syz.4.914 Not tainted 6.17.0-rc3+ #1 NONE\n RIP: 0010:device_release+0x1bd/0x240 drivers/base/core.c:2567\n Call Trace:\n \u003cTASK\u003e\n kobject_cleanup+0x136/0x410 lib/kobject.c:689\n kobject_release lib/kobject.c:720 [inline]\n kref_put include/linux/kref.h:65 [inline]\n kobject_put+0xe9/0x130 lib/kobject.c:737\n put_device+0x24/0x30 drivers/base/core.c:3797\n pps_register_cdev+0x2da/0x370 drivers/pps/pps.c:402\n pps_register_source+0x2f6/0x480 drivers/pps/kapi.c:108\n pps_tty_open+0x190/0x310 drivers/pps/clients/pps-ldisc.c:57\n tty_ldisc_open+0xa7/0x120 drivers/tty/tty_ldisc.c:432\n tty_set_ldisc+0x333/0x780 drivers/tty/tty_ldisc.c:563\n tiocsetd drivers/tty/tty_io.c:2429 [inline]\n tty_ioctl+0x5d1/0x1700 drivers/tty/tty_io.c:2728\n vfs_ioctl fs/ioctl.c:51 [inline]\n __do_sys_ioctl fs/ioctl.c:598 [inline]\n __se_sys_ioctl fs/ioctl.c:584 [inline]\n __x64_sys_ioctl+0x194/0x210 fs/ioctl.c:584\n do_syscall_x64 arch/x86/entry/syscall_64.c:63 [inline]\n do_syscall_64+0x5f/0x2a0 arch/x86/entry/syscall_64.c:94\n entry_SYSCALL_64_after_hwframe+0x76/0x7e\n \u003c/TASK\u003e\n\nBefore commit c79a39dc8d06 (\"pps: Fix a use-after-free\"),\npps_register_cdev() call device_create() to create pps-\u003edev, which will\ninit dev-\u003erelease to device_create_release(). Now the comment is outdated,\njust remove it.\n\nThanks for the reminder from Calvin Owens, \u0027kfree_pps\u0027 should be removed\nin pps_register_source() to avoid a double free in the failure case.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40070",
"url": "https://www.suse.com/security/cve/CVE-2025-40070"
},
{
"category": "external",
"summary": "SUSE Bug 1252836 for CVE-2025-40070",
"url": "https://bugzilla.suse.com/1252836"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-19T16:19:41Z",
"details": "moderate"
}
],
"title": "CVE-2025-40070"
},
{
"cve": "CVE-2025-40074",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40074"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nipv4: start using dst_dev_rcu()\n\nChange icmpv4_xrlim_allow(), ip_defrag() to prevent possible UAF.\n\nChange ipmr_prepare_xmit(), ipmr_queue_fwd_xmit(), ip_mr_output(),\nipv4_neigh_lookup() to use lockdep enabled dst_dev_rcu().",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40074",
"url": "https://www.suse.com/security/cve/CVE-2025-40074"
},
{
"category": "external",
"summary": "SUSE Bug 1252794 for CVE-2025-40074",
"url": "https://bugzilla.suse.com/1252794"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-19T16:19:41Z",
"details": "moderate"
}
],
"title": "CVE-2025-40074"
},
{
"cve": "CVE-2025-40075",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40075"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\ntcp_metrics: use dst_dev_net_rcu()\n\nReplace three dst_dev() with a lockdep enabled helper.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40075",
"url": "https://www.suse.com/security/cve/CVE-2025-40075"
},
{
"category": "external",
"summary": "SUSE Bug 1252795 for CVE-2025-40075",
"url": "https://bugzilla.suse.com/1252795"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-19T16:19:41Z",
"details": "moderate"
}
],
"title": "CVE-2025-40075"
},
{
"cve": "CVE-2025-40081",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40081"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nperf: arm_spe: Prevent overflow in PERF_IDX2OFF()\n\nCast nr_pages to unsigned long to avoid overflow when handling large\nAUX buffer sizes (\u003e= 2 GiB).",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40081",
"url": "https://www.suse.com/security/cve/CVE-2025-40081"
},
{
"category": "external",
"summary": "SUSE Bug 1252776 for CVE-2025-40081",
"url": "https://bugzilla.suse.com/1252776"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-19T16:19:41Z",
"details": "moderate"
}
],
"title": "CVE-2025-40081"
},
{
"cve": "CVE-2025-40083",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40083"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnet/sched: sch_qfq: Fix null-deref in agg_dequeue\n\nTo prevent a potential crash in agg_dequeue (net/sched/sch_qfq.c)\nwhen cl-\u003eqdisc-\u003eops-\u003epeek(cl-\u003eqdisc) returns NULL, we check the return\nvalue before using it, similar to the existing approach in sch_hfsc.c.\n\nTo avoid code duplication, the following changes are made:\n\n1. Changed qdisc_warn_nonwc(include/net/pkt_sched.h) into a static\ninline function.\n\n2. Moved qdisc_peek_len from net/sched/sch_hfsc.c to\ninclude/net/pkt_sched.h so that sch_qfq can reuse it.\n\n3. Applied qdisc_peek_len in agg_dequeue to avoid crashing.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40083",
"url": "https://www.suse.com/security/cve/CVE-2025-40083"
},
{
"category": "external",
"summary": "SUSE Bug 1252912 for CVE-2025-40083",
"url": "https://bugzilla.suse.com/1252912"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-19T16:19:41Z",
"details": "moderate"
}
],
"title": "CVE-2025-40083"
},
{
"cve": "CVE-2025-40086",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40086"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\ndrm/xe: Don\u0027t allow evicting of BOs in same VM in array of VM binds\n\nAn array of VM binds can potentially evict other buffer objects (BOs)\nwithin the same VM under certain conditions, which may lead to NULL\npointer dereferences later in the bind pipeline. To prevent this, clear\nthe allow_res_evict flag in the xe_bo_validate call.\n\nv2:\n - Invert polarity of no_res_evict (Thomas)\n - Add comment in code explaining issue (Thomas)\n\n(cherry picked from commit 8b9ba8d6d95fe75fed6b0480bb03da4b321bea08)",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40086",
"url": "https://www.suse.com/security/cve/CVE-2025-40086"
},
{
"category": "external",
"summary": "SUSE Bug 1252923 for CVE-2025-40086",
"url": "https://bugzilla.suse.com/1252923"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.1,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-19T16:19:41Z",
"details": "moderate"
}
],
"title": "CVE-2025-40086"
},
{
"cve": "CVE-2025-40098",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40098"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nALSA: hda: cs35l41: Fix NULL pointer dereference in cs35l41_get_acpi_mute_state()\n\nReturn value of a function acpi_evaluate_dsm() is dereferenced without\nchecking for NULL, but it is usually checked for this function.\n\nacpi_evaluate_dsm() may return NULL, when acpi_evaluate_object() returns\nacpi_status other than ACPI_SUCCESS, so add a check to prevent the crach.\n\nFound by Linux Verification Center (linuxtesting.org) with SVACE.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40098",
"url": "https://www.suse.com/security/cve/CVE-2025-40098"
},
{
"category": "external",
"summary": "SUSE Bug 1252917 for CVE-2025-40098",
"url": "https://bugzilla.suse.com/1252917"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-19T16:19:41Z",
"details": "moderate"
}
],
"title": "CVE-2025-40098"
},
{
"cve": "CVE-2025-40101",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40101"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nbtrfs: fix memory leaks when rejecting a non SINGLE data profile without an RST\n\nAt the end of btrfs_load_block_group_zone_info() the first thing we do\nis to ensure that if the mapping type is not a SINGLE one and there is\nno RAID stripe tree, then we return early with an error.\n\nDoing that, though, prevents the code from running the last calls from\nthis function which are about freeing memory allocated during its\nrun. Hence, in this case, instead of returning early, we set the ret\nvalue and fall through the rest of the cleanup code.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40101",
"url": "https://www.suse.com/security/cve/CVE-2025-40101"
},
{
"category": "external",
"summary": "SUSE Bug 1252901 for CVE-2025-40101",
"url": "https://bugzilla.suse.com/1252901"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.3,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-19T16:19:41Z",
"details": "low"
}
],
"title": "CVE-2025-40101"
},
{
"cve": "CVE-2025-40102",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40102"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nKVM: arm64: Prevent access to vCPU events before init\n\nAnother day, another syzkaller bug. KVM erroneously allows userspace to\npend vCPU events for a vCPU that hasn\u0027t been initialized yet, leading to\nKVM interpreting a bunch of uninitialized garbage for routing /\ninjecting the exception.\n\nIn one case the injection code and the hyp disagree on whether the vCPU\nhas a 32bit EL1 and put the vCPU into an illegal mode for AArch64,\ntripping the BUG() in exception_target_el() during the next injection:\n\n kernel BUG at arch/arm64/kvm/inject_fault.c:40!\n Internal error: Oops - BUG: 00000000f2000800 [#1] SMP\n CPU: 3 UID: 0 PID: 318 Comm: repro Not tainted 6.17.0-rc4-00104-g10fd0285305d #6 PREEMPT\n Hardware name: linux,dummy-virt (DT)\n pstate: 21402009 (nzCv daif +PAN -UAO -TCO +DIT -SSBS BTYPE=--)\n pc : exception_target_el+0x88/0x8c\n lr : pend_serror_exception+0x18/0x13c\n sp : ffff800082f03a10\n x29: ffff800082f03a10 x28: ffff0000cb132280 x27: 0000000000000000\n x26: 0000000000000000 x25: ffff0000c2a99c20 x24: 0000000000000000\n x23: 0000000000008000 x22: 0000000000000002 x21: 0000000000000004\n x20: 0000000000008000 x19: ffff0000c2a99c20 x18: 0000000000000000\n x17: 0000000000000000 x16: 0000000000000000 x15: 00000000200000c0\n x14: 0000000000000000 x13: 0000000000000000 x12: 0000000000000000\n x11: 0000000000000000 x10: 0000000000000000 x9 : 0000000000000000\n x8 : ffff800082f03af8 x7 : 0000000000000000 x6 : 0000000000000000\n x5 : ffff800080f621f0 x4 : 0000000000000000 x3 : 0000000000000000\n x2 : 000000000040009b x1 : 0000000000000003 x0 : ffff0000c2a99c20\n Call trace:\n exception_target_el+0x88/0x8c (P)\n kvm_inject_serror_esr+0x40/0x3b4\n __kvm_arm_vcpu_set_events+0xf0/0x100\n kvm_arch_vcpu_ioctl+0x180/0x9d4\n kvm_vcpu_ioctl+0x60c/0x9f4\n __arm64_sys_ioctl+0xac/0x104\n invoke_syscall+0x48/0x110\n el0_svc_common.constprop.0+0x40/0xe0\n do_el0_svc+0x1c/0x28\n el0_svc+0x34/0xf0\n el0t_64_sync_handler+0xa0/0xe4\n el0t_64_sync+0x198/0x19c\n Code: f946bc01 b4fffe61 9101e020 17fffff2 (d4210000)\n\nReject the ioctls outright as no sane VMM would call these before\nKVM_ARM_VCPU_INIT anyway. Even if it did the exception would\u0027ve been\nthrown away by the eventual reset of the vCPU\u0027s state.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40102",
"url": "https://www.suse.com/security/cve/CVE-2025-40102"
},
{
"category": "external",
"summary": "SUSE Bug 1252919 for CVE-2025-40102",
"url": "https://bugzilla.suse.com/1252919"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 0,
"baseSeverity": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-19T16:19:41Z",
"details": "moderate"
}
],
"title": "CVE-2025-40102"
},
{
"cve": "CVE-2025-40105",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40105"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nvfs: Don\u0027t leak disconnected dentries on umount\n\nWhen user calls open_by_handle_at() on some inode that is not cached, we\nwill create disconnected dentry for it. If such dentry is a directory,\nexportfs_decode_fh_raw() will then try to connect this dentry to the\ndentry tree through reconnect_path(). It may happen for various reasons\n(such as corrupted fs or race with rename) that the call to\nlookup_one_unlocked() in reconnect_one() will fail to find the dentry we\nare trying to reconnect and instead create a new dentry under the\nparent. Now this dentry will not be marked as disconnected although the\nparent still may well be disconnected (at least in case this\ninconsistency happened because the fs is corrupted and .. doesn\u0027t point\nto the real parent directory). This creates inconsistency in\ndisconnected flags but AFAICS it was mostly harmless. At least until\ncommit f1ee616214cb (\"VFS: don\u0027t keep disconnected dentries on d_anon\")\nwhich removed adding of most disconnected dentries to sb-\u003es_anon list.\nThus after this commit cleanup of disconnected dentries implicitely\nrelies on the fact that dput() will immediately reclaim such dentries.\nHowever when some leaf dentry isn\u0027t marked as disconnected, as in the\nscenario described above, the reclaim doesn\u0027t happen and the dentries\nare \"leaked\". Memory reclaim can eventually reclaim them but otherwise\nthey stay in memory and if umount comes first, we hit infamous \"Busy\ninodes after unmount\" bug. Make sure all dentries created under a\ndisconnected parent are marked as disconnected as well.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40105",
"url": "https://www.suse.com/security/cve/CVE-2025-40105"
},
{
"category": "external",
"summary": "SUSE Bug 1252928 for CVE-2025-40105",
"url": "https://bugzilla.suse.com/1252928"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.3,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-19T16:19:41Z",
"details": "low"
}
],
"title": "CVE-2025-40105"
},
{
"cve": "CVE-2025-40107",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40107"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\ncan: hi311x: fix null pointer dereference when resuming from sleep before interface was enabled\n\nThis issue is similar to the vulnerability in the `mcp251x` driver,\nwhich was fixed in commit 03c427147b2d (\"can: mcp251x: fix resume from\nsleep before interface was brought up\").\n\nIn the `hi311x` driver, when the device resumes from sleep, the driver\nschedules `priv-\u003erestart_work`. However, if the network interface was\nnot previously enabled, the `priv-\u003ewq` (workqueue) is not allocated and\ninitialized, leading to a null pointer dereference.\n\nTo fix this, we move the allocation and initialization of the workqueue\nfrom the `hi3110_open` function to the `hi3110_can_probe` function.\nThis ensures that the workqueue is properly initialized before it is\nused during device resume. And added logic to destroy the workqueue\nin the error handling paths of `hi3110_can_probe` and in the\n`hi3110_can_remove` function to prevent resource leaks.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40107",
"url": "https://www.suse.com/security/cve/CVE-2025-40107"
},
{
"category": "external",
"summary": "SUSE Bug 1253018 for CVE-2025-40107",
"url": "https://bugzilla.suse.com/1253018"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-19T16:19:41Z",
"details": "moderate"
}
],
"title": "CVE-2025-40107"
},
{
"cve": "CVE-2025-40109",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40109"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\ncrypto: rng - Ensure set_ent is always present\n\nEnsure that set_ent is always set since only drbg provides it.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40109",
"url": "https://www.suse.com/security/cve/CVE-2025-40109"
},
{
"category": "external",
"summary": "SUSE Bug 1253176 for CVE-2025-40109",
"url": "https://bugzilla.suse.com/1253176"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-19T16:19:41Z",
"details": "moderate"
}
],
"title": "CVE-2025-40109"
},
{
"cve": "CVE-2025-40110",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40110"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\ndrm/vmwgfx: Fix a null-ptr access in the cursor snooper\n\nCheck that the resource which is converted to a surface exists before\ntrying to use the cursor snooper on it.\n\nvmw_cmd_res_check allows explicit invalid (SVGA3D_INVALID_ID) identifiers\nbecause some svga commands accept SVGA3D_INVALID_ID to mean \"no surface\",\nunfortunately functions that accept the actual surfaces as objects might\n(and in case of the cursor snooper, do not) be able to handle null\nobjects. Make sure that we validate not only the identifier (via the\nvmw_cmd_res_check) but also check that the actual resource exists before\ntrying to do something with it.\n\nFixes unchecked null-ptr reference in the snooping code.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40110",
"url": "https://www.suse.com/security/cve/CVE-2025-40110"
},
{
"category": "external",
"summary": "SUSE Bug 1253275 for CVE-2025-40110",
"url": "https://bugzilla.suse.com/1253275"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.1,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-19T16:19:41Z",
"details": "moderate"
}
],
"title": "CVE-2025-40110"
},
{
"cve": "CVE-2025-40111",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40111"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\ndrm/vmwgfx: Fix Use-after-free in validation\n\nNodes stored in the validation duplicates hashtable come from an arena\nallocator that is cleared at the end of vmw_execbuf_process. All nodes\nare expected to be cleared in vmw_validation_drop_ht but this node escaped\nbecause its resource was destroyed prematurely.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40111",
"url": "https://www.suse.com/security/cve/CVE-2025-40111"
},
{
"category": "external",
"summary": "SUSE Bug 1253362 for CVE-2025-40111",
"url": "https://bugzilla.suse.com/1253362"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.7,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:L/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-19T16:19:41Z",
"details": "moderate"
}
],
"title": "CVE-2025-40111"
},
{
"cve": "CVE-2025-40115",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40115"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nscsi: mpt3sas: Fix crash in transport port remove by using ioc_info()\n\nDuring mpt3sas_transport_port_remove(), messages were logged with\ndev_printk() against \u0026mpt3sas_port-\u003eport-\u003edev. At this point the SAS\ntransport device may already be partially unregistered or freed, leading\nto a crash when accessing its struct device.\n\nUsing ioc_info(), which logs via the PCI device (ioc-\u003epdev-\u003edev),\nguaranteed to remain valid until driver removal.\n\n[83428.295776] Oops: general protection fault, probably for non-canonical address 0x6f702f323a33312d: 0000 [#1] SMP NOPTI\n[83428.295785] CPU: 145 UID: 0 PID: 113296 Comm: rmmod Kdump: loaded Tainted: G OE 6.16.0-rc1+ #1 PREEMPT(voluntary)\n[83428.295792] Tainted: [O]=OOT_MODULE, [E]=UNSIGNED_MODULE\n[83428.295795] Hardware name: Dell Inc. Precision 7875 Tower/, BIOS 89.1.67 02/23/2024\n[83428.295799] RIP: 0010:__dev_printk+0x1f/0x70\n[83428.295805] Code: 90 90 90 90 90 90 90 90 90 90 90 0f 1f 44 00 00 49 89 d1 48 85 f6 74 52 4c 8b 46 50 4d 85 c0 74 1f 48 8b 46 68 48 85 c0 74 22 \u003c48\u003e 8b 08 0f b6 7f 01 48 c7 c2 db e8 42 ad 83 ef 30 e9 7b f8 ff ff\n[83428.295813] RSP: 0018:ff85aeafc3137bb0 EFLAGS: 00010206\n[83428.295817] RAX: 6f702f323a33312d RBX: ff4290ee81292860 RCX: 5000cca25103be32\n[83428.295820] RDX: ff85aeafc3137bb8 RSI: ff4290eeb1966c00 RDI: ffffffffc1560845\n[83428.295823] RBP: ff85aeafc3137c18 R08: 74726f702f303a33 R09: ff85aeafc3137bb8\n[83428.295826] R10: ff85aeafc3137b18 R11: ff4290f5bd60fe68 R12: ff4290ee81290000\n[83428.295830] R13: ff4290ee6e345de0 R14: ff4290ee81290000 R15: ff4290ee6e345e30\n[83428.295833] FS: 00007fd9472a6740(0000) GS:ff4290f5ce96b000(0000) knlGS:0000000000000000\n[83428.295837] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033\n[83428.295840] CR2: 00007f242b4db238 CR3: 00000002372b8006 CR4: 0000000000771ef0\n[83428.295844] PKRU: 55555554\n[83428.295846] Call Trace:\n[83428.295848] \u003cTASK\u003e\n[83428.295850] _dev_printk+0x5c/0x80\n[83428.295857] ? srso_alias_return_thunk+0x5/0xfbef5\n[83428.295863] mpt3sas_transport_port_remove+0x1c7/0x420 [mpt3sas]\n[83428.295882] _scsih_remove_device+0x21b/0x280 [mpt3sas]\n[83428.295894] ? _scsih_expander_node_remove+0x108/0x140 [mpt3sas]\n[83428.295906] ? srso_alias_return_thunk+0x5/0xfbef5\n[83428.295910] mpt3sas_device_remove_by_sas_address.part.0+0x8f/0x110 [mpt3sas]\n[83428.295921] _scsih_expander_node_remove+0x129/0x140 [mpt3sas]\n[83428.295933] _scsih_expander_node_remove+0x6a/0x140 [mpt3sas]\n[83428.295944] scsih_remove+0x3f0/0x4a0 [mpt3sas]\n[83428.295957] pci_device_remove+0x3b/0xb0\n[83428.295962] device_release_driver_internal+0x193/0x200\n[83428.295968] driver_detach+0x44/0x90\n[83428.295971] bus_remove_driver+0x69/0xf0\n[83428.295975] pci_unregister_driver+0x2a/0xb0\n[83428.295979] _mpt3sas_exit+0x1f/0x300 [mpt3sas]\n[83428.295991] __do_sys_delete_module.constprop.0+0x174/0x310\n[83428.295997] ? srso_alias_return_thunk+0x5/0xfbef5\n[83428.296000] ? __x64_sys_getdents64+0x9a/0x110\n[83428.296005] ? srso_alias_return_thunk+0x5/0xfbef5\n[83428.296009] ? syscall_trace_enter+0xf6/0x1b0\n[83428.296014] do_syscall_64+0x7b/0x2c0\n[83428.296019] ? srso_alias_return_thunk+0x5/0xfbef5\n[83428.296023] entry_SYSCALL_64_after_hwframe+0x76/0x7e",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40115",
"url": "https://www.suse.com/security/cve/CVE-2025-40115"
},
{
"category": "external",
"summary": "SUSE Bug 1253318 for CVE-2025-40115",
"url": "https://bugzilla.suse.com/1253318"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-19T16:19:41Z",
"details": "moderate"
}
],
"title": "CVE-2025-40115"
},
{
"cve": "CVE-2025-40116",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40116"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nusb: host: max3421-hcd: Fix error pointer dereference in probe cleanup\n\nThe kthread_run() function returns error pointers so the\nmax3421_hcd-\u003espi_thread pointer can be either error pointers or NULL.\nCheck for both before dereferencing it.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40116",
"url": "https://www.suse.com/security/cve/CVE-2025-40116"
},
{
"category": "external",
"summary": "SUSE Bug 1253324 for CVE-2025-40116",
"url": "https://bugzilla.suse.com/1253324"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-19T16:19:41Z",
"details": "moderate"
}
],
"title": "CVE-2025-40116"
},
{
"cve": "CVE-2025-40118",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40118"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nscsi: pm80xx: Fix array-index-out-of-of-bounds on rmmod\n\nSince commit f7b705c238d1 (\"scsi: pm80xx: Set phy_attached to zero when\ndevice is gone\") UBSAN reports:\n\n UBSAN: array-index-out-of-bounds in drivers/scsi/pm8001/pm8001_sas.c:786:17\n index 28 is out of range for type \u0027pm8001_phy [16]\u0027\n\non rmmod when using an expander.\n\nFor a direct attached device, attached_phy contains the local phy id.\nFor a device behind an expander, attached_phy contains the remote phy\nid, not the local phy id.\n\nI.e. while pm8001_ha will have pm8001_ha-\u003echip-\u003en_phy local phys, for a\ndevice behind an expander, attached_phy can be much larger than\npm8001_ha-\u003echip-\u003en_phy (depending on the amount of phys of the\nexpander).\n\nE.g. on my system pm8001_ha has 8 phys with phy ids 0-7. One of the\nports has an expander connected. The expander has 31 phys with phy ids\n0-30.\n\nThe pm8001_ha-\u003ephy array only contains the phys of the HBA. It does not\ncontain the phys of the expander. Thus, it is wrong to use attached_phy\nto index the pm8001_ha-\u003ephy array for a device behind an expander.\n\nThus, we can only clear phy_attached for devices that are directly\nattached.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40118",
"url": "https://www.suse.com/security/cve/CVE-2025-40118"
},
{
"category": "external",
"summary": "SUSE Bug 1253363 for CVE-2025-40118",
"url": "https://bugzilla.suse.com/1253363"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.1,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-19T16:19:41Z",
"details": "moderate"
}
],
"title": "CVE-2025-40118"
},
{
"cve": "CVE-2025-40120",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40120"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnet: usb: asix: hold PM usage ref to avoid PM/MDIO + RTNL deadlock\n\nPrevent USB runtime PM (autosuspend) for AX88772* in bind.\n\nusbnet enables runtime PM (autosuspend) by default, so disabling it via\nthe usb_driver flag is ineffective. On AX88772B, autosuspend shows no\nmeasurable power saving with current driver (no link partner, admin\nup/down). The ~0.453 W -\u003e ~0.248 W drop on v6.1 comes from phylib powering\nthe PHY off on admin-down, not from USB autosuspend.\n\nThe real hazard is that with runtime PM enabled, ndo_open() (under RTNL)\nmay synchronously trigger autoresume (usb_autopm_get_interface()) into\nasix_resume() while the USB PM lock is held. Resume paths then invoke\nphylink/phylib and MDIO, which also expect RTNL, leading to possible\ndeadlocks or PM lock vs MDIO wake issues.\n\nTo avoid this, keep the device runtime-PM active by taking a usage\nreference in ax88772_bind() and dropping it in unbind(). A non-zero PM\nusage count blocks runtime suspend regardless of userspace policy\n(.../power/control - pm_runtime_allow/forbid), making this approach\nrobust against sysfs overrides.\n\nHolding a runtime-PM usage ref does not affect system-wide suspend;\nsystem sleep/resume callbacks continue to run as before.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40120",
"url": "https://www.suse.com/security/cve/CVE-2025-40120"
},
{
"category": "external",
"summary": "SUSE Bug 1253360 for CVE-2025-40120",
"url": "https://bugzilla.suse.com/1253360"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-19T16:19:41Z",
"details": "moderate"
}
],
"title": "CVE-2025-40120"
},
{
"cve": "CVE-2025-40121",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40121"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nASoC: Intel: bytcr_rt5651: Fix invalid quirk input mapping\n\nWhen an invalid value is passed via quirk option, currently\nbytcr_rt5640 driver just ignores and leaves as is, which may lead to\nunepxected results like OOB access.\n\nThis patch adds the sanity check and corrects the input mapping to the\ncertain default value if an invalid value is passed.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40121",
"url": "https://www.suse.com/security/cve/CVE-2025-40121"
},
{
"category": "external",
"summary": "SUSE Bug 1253367 for CVE-2025-40121",
"url": "https://bugzilla.suse.com/1253367"
},
{
"category": "external",
"summary": "SUSE Bug 1253430 for CVE-2025-40121",
"url": "https://bugzilla.suse.com/1253430"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-19T16:19:41Z",
"details": "moderate"
}
],
"title": "CVE-2025-40121"
},
{
"cve": "CVE-2025-40127",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40127"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nhwrng: ks-sa - fix division by zero in ks_sa_rng_init\n\nFix division by zero in ks_sa_rng_init caused by missing clock\npointer initialization. The clk_get_rate() call is performed on\nan uninitialized clk pointer, resulting in division by zero when\ncalculating delay values.\n\nAdd clock initialization code before using the clock.\n\n\n drivers/char/hw_random/ks-sa-rng.c | 7 +++++++\n 1 file changed, 7 insertions(+)",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40127",
"url": "https://www.suse.com/security/cve/CVE-2025-40127"
},
{
"category": "external",
"summary": "SUSE Bug 1253369 for CVE-2025-40127",
"url": "https://bugzilla.suse.com/1253369"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-19T16:19:41Z",
"details": "moderate"
}
],
"title": "CVE-2025-40127"
},
{
"cve": "CVE-2025-40129",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40129"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nsunrpc: fix null pointer dereference on zero-length checksum\n\nIn xdr_stream_decode_opaque_auth(), zero-length checksum.len causes\nchecksum.data to be set to NULL. This triggers a NPD when accessing\nchecksum.data in gss_krb5_verify_mic_v2(). This patch ensures that\nthe value of checksum.len is not less than XDR_UNIT.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40129",
"url": "https://www.suse.com/security/cve/CVE-2025-40129"
},
{
"category": "external",
"summary": "SUSE Bug 1253472 for CVE-2025-40129",
"url": "https://bugzilla.suse.com/1253472"
},
{
"category": "external",
"summary": "SUSE Bug 1253473 for CVE-2025-40129",
"url": "https://bugzilla.suse.com/1253473"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-19T16:19:41Z",
"details": "important"
}
],
"title": "CVE-2025-40129"
},
{
"cve": "CVE-2025-40132",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40132"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nASoC: Intel: sof_sdw: Prevent jump to NULL add_sidecar callback\n\nIn create_sdw_dailink() check that sof_end-\u003ecodec_info-\u003eadd_sidecar\nis not NULL before calling it.\n\nThe original code assumed that if include_sidecar is true, the codec\non that link has an add_sidecar callback. But there could be other\ncodecs on the same link that do not have an add_sidecar callback.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40132",
"url": "https://www.suse.com/security/cve/CVE-2025-40132"
},
{
"category": "external",
"summary": "SUSE Bug 1253330 for CVE-2025-40132",
"url": "https://bugzilla.suse.com/1253330"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-19T16:19:41Z",
"details": "moderate"
}
],
"title": "CVE-2025-40132"
},
{
"cve": "CVE-2025-40133",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40133"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nmptcp: Use __sk_dst_get() and dst_dev_rcu() in mptcp_active_enable().\n\nmptcp_active_enable() is called from subflow_finish_connect(),\nwhich is icsk-\u003eicsk_af_ops-\u003esk_rx_dst_set() and it\u0027s not always\nunder RCU.\n\nUsing sk_dst_get(sk)-\u003edev could trigger UAF.\n\nLet\u0027s use __sk_dst_get() and dst_dev_rcu().",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40133",
"url": "https://www.suse.com/security/cve/CVE-2025-40133"
},
{
"category": "external",
"summary": "SUSE Bug 1253328 for CVE-2025-40133",
"url": "https://bugzilla.suse.com/1253328"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-19T16:19:41Z",
"details": "moderate"
}
],
"title": "CVE-2025-40133"
},
{
"cve": "CVE-2025-40134",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40134"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\ndm: fix NULL pointer dereference in __dm_suspend()\n\nThere is a race condition between dm device suspend and table load that\ncan lead to null pointer dereference. The issue occurs when suspend is\ninvoked before table load completes:\n\nBUG: kernel NULL pointer dereference, address: 0000000000000054\nOops: 0000 [#1] PREEMPT SMP PTI\nCPU: 6 PID: 6798 Comm: dmsetup Not tainted 6.6.0-g7e52f5f0ca9b #62\nHardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.16.1-2.fc37 04/01/2014\nRIP: 0010:blk_mq_wait_quiesce_done+0x0/0x50\nCall Trace:\n \u003cTASK\u003e\n blk_mq_quiesce_queue+0x2c/0x50\n dm_stop_queue+0xd/0x20\n __dm_suspend+0x130/0x330\n dm_suspend+0x11a/0x180\n dev_suspend+0x27e/0x560\n ctl_ioctl+0x4cf/0x850\n dm_ctl_ioctl+0xd/0x20\n vfs_ioctl+0x1d/0x50\n __se_sys_ioctl+0x9b/0xc0\n __x64_sys_ioctl+0x19/0x30\n x64_sys_call+0x2c4a/0x4620\n do_syscall_64+0x9e/0x1b0\n\nThe issue can be triggered as below:\n\nT1 \t\t\t\t\t\tT2\ndm_suspend\t\t\t\t\ttable_load\n__dm_suspend\t\t\t\t\tdm_setup_md_queue\n\t\t\t\t\t\tdm_mq_init_request_queue\n\t\t\t\t\t\tblk_mq_init_allocated_queue\n\t\t\t\t\t\t=\u003e q-\u003emq_ops = set-\u003eops; (1)\ndm_stop_queue / dm_wait_for_completion\n=\u003e q-\u003etag_set NULL pointer!\t(2)\n\t\t\t\t\t\t=\u003e q-\u003etag_set = set; (3)\n\nFix this by checking if a valid table (map) exists before performing\nrequest-based suspend and waiting for target I/O. When map is NULL,\nskip these table-dependent suspend steps.\n\nEven when map is NULL, no I/O can reach any target because there is\nno table loaded; I/O submitted in this state will fail early in the\nDM layer. Skipping the table-dependent suspend logic in this case\nis safe and avoids NULL pointer dereferences.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40134",
"url": "https://www.suse.com/security/cve/CVE-2025-40134"
},
{
"category": "external",
"summary": "SUSE Bug 1253386 for CVE-2025-40134",
"url": "https://bugzilla.suse.com/1253386"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.7,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-19T16:19:41Z",
"details": "moderate"
}
],
"title": "CVE-2025-40134"
},
{
"cve": "CVE-2025-40135",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40135"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nipv6: use RCU in ip6_xmit()\n\nUse RCU in ip6_xmit() in order to use dst_dev_rcu() to prevent\npossible UAF.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40135",
"url": "https://www.suse.com/security/cve/CVE-2025-40135"
},
{
"category": "external",
"summary": "SUSE Bug 1253342 for CVE-2025-40135",
"url": "https://bugzilla.suse.com/1253342"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.1,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-19T16:19:41Z",
"details": "moderate"
}
],
"title": "CVE-2025-40135"
},
{
"cve": "CVE-2025-40139",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40139"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nsmc: Use __sk_dst_get() and dst_dev_rcu() in in smc_clc_prfx_set().\n\nsmc_clc_prfx_set() is called during connect() and not under RCU\nnor RTNL.\n\nUsing sk_dst_get(sk)-\u003edev could trigger UAF.\n\nLet\u0027s use __sk_dst_get() and dev_dst_rcu() under rcu_read_lock()\nafter kernel_getsockname().\n\nNote that the returned value of smc_clc_prfx_set() is not used\nin the caller.\n\nWhile at it, we change the 1st arg of smc_clc_prfx_set[46]_rcu()\nnot to touch dst there.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40139",
"url": "https://www.suse.com/security/cve/CVE-2025-40139"
},
{
"category": "external",
"summary": "SUSE Bug 1253409 for CVE-2025-40139",
"url": "https://bugzilla.suse.com/1253409"
},
{
"category": "external",
"summary": "SUSE Bug 1253411 for CVE-2025-40139",
"url": "https://bugzilla.suse.com/1253411"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-19T16:19:41Z",
"details": "important"
}
],
"title": "CVE-2025-40139"
},
{
"cve": "CVE-2025-40140",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40140"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnet: usb: Remove disruptive netif_wake_queue in rtl8150_set_multicast\n\nsyzbot reported WARNING in rtl8150_start_xmit/usb_submit_urb.\nThis is the sequence of events that leads to the warning:\n\nrtl8150_start_xmit() {\n\tnetif_stop_queue();\n\tusb_submit_urb(dev-\u003etx_urb);\n}\n\nrtl8150_set_multicast() {\n\tnetif_stop_queue();\n\tnetif_wake_queue();\t\t\u003c-- wakes up TX queue before URB is done\n}\n\nrtl8150_start_xmit() {\n\tnetif_stop_queue();\n\tusb_submit_urb(dev-\u003etx_urb);\t\u003c-- double submission\n}\n\nrtl8150_set_multicast being the ndo_set_rx_mode callback should not be\ncalling netif_stop_queue and notif_start_queue as these handle\nTX queue synchronization.\n\nThe net core function dev_set_rx_mode handles the synchronization\nfor rtl8150_set_multicast making it safe to remove these locks.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40140",
"url": "https://www.suse.com/security/cve/CVE-2025-40140"
},
{
"category": "external",
"summary": "SUSE Bug 1253349 for CVE-2025-40140",
"url": "https://bugzilla.suse.com/1253349"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.3,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-19T16:19:41Z",
"details": "low"
}
],
"title": "CVE-2025-40140"
},
{
"cve": "CVE-2025-40141",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40141"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nBluetooth: ISO: Fix possible UAF on iso_conn_free\n\nThis attempt to fix similar issue to sco_conn_free where if the\nconn-\u003esk is not set to NULL may lead to UAF on iso_conn_free.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40141",
"url": "https://www.suse.com/security/cve/CVE-2025-40141"
},
{
"category": "external",
"summary": "SUSE Bug 1253352 for CVE-2025-40141",
"url": "https://bugzilla.suse.com/1253352"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-19T16:19:41Z",
"details": "moderate"
}
],
"title": "CVE-2025-40141"
},
{
"cve": "CVE-2025-40142",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40142"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nALSA: pcm: Disable bottom softirqs as part of spin_lock_irq() on PREEMPT_RT\n\nsnd_pcm_group_lock_irq() acquires a spinlock_t and disables interrupts\nvia spin_lock_irq(). This also implicitly disables the handling of\nsoftirqs such as TIMER_SOFTIRQ.\nOn PREEMPT_RT softirqs are preemptible and spin_lock_irq() does not\ndisable them. That means a timer can be invoked during spin_lock_irq()\non the same CPU. Due to synchronisations reasons local_bh_disable() has\na per-CPU lock named softirq_ctrl.lock which synchronizes individual\nsoftirq against each other.\nsyz-bot managed to trigger a lockdep report where softirq_ctrl.lock is\nacquired in hrtimer_cancel() in addition to hrtimer_run_softirq(). This\nis a possible deadlock.\n\nThe softirq_ctrl.lock can not be made part of spin_lock_irq() as this\nwould lead to too much synchronisation against individual threads on the\nsystem. To avoid the possible deadlock, softirqs must be manually\ndisabled before the lock is acquired.\n\nDisable softirqs before the lock is acquired on PREEMPT_RT.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40142",
"url": "https://www.suse.com/security/cve/CVE-2025-40142"
},
{
"category": "external",
"summary": "SUSE Bug 1253348 for CVE-2025-40142",
"url": "https://bugzilla.suse.com/1253348"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.7,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-19T16:19:41Z",
"details": "moderate"
}
],
"title": "CVE-2025-40142"
},
{
"cve": "CVE-2025-40149",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40149"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\ntls: Use __sk_dst_get() and dst_dev_rcu() in get_netdev_for_sock().\n\nget_netdev_for_sock() is called during setsockopt(),\nso not under RCU.\n\nUsing sk_dst_get(sk)-\u003edev could trigger UAF.\n\nLet\u0027s use __sk_dst_get() and dst_dev_rcu().\n\nNote that the only -\u003endo_sk_get_lower_dev() user is\nbond_sk_get_lower_dev(), which uses RCU.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40149",
"url": "https://www.suse.com/security/cve/CVE-2025-40149"
},
{
"category": "external",
"summary": "SUSE Bug 1253355 for CVE-2025-40149",
"url": "https://bugzilla.suse.com/1253355"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-19T16:19:41Z",
"details": "moderate"
}
],
"title": "CVE-2025-40149"
},
{
"cve": "CVE-2025-40153",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40153"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nmm: hugetlb: avoid soft lockup when mprotect to large memory area\n\nWhen calling mprotect() to a large hugetlb memory area in our customer\u0027s\nworkload (~300GB hugetlb memory), soft lockup was observed:\n\nwatchdog: BUG: soft lockup - CPU#98 stuck for 23s! [t2_new_sysv:126916]\n\nCPU: 98 PID: 126916 Comm: t2_new_sysv Kdump: loaded Not tainted 6.17-rc7\nHardware name: GIGACOMPUTING R2A3-T40-AAV1/Jefferson CIO, BIOS 5.4.4.1 07/15/2025\npstate: 20400009 (nzCv daif +PAN -UAO -TCO -DIT -SSBS BTYPE=--)\npc : mte_clear_page_tags+0x14/0x24\nlr : mte_sync_tags+0x1c0/0x240\nsp : ffff80003150bb80\nx29: ffff80003150bb80 x28: ffff00739e9705a8 x27: 0000ffd2d6a00000\nx26: 0000ff8e4bc00000 x25: 00e80046cde00f45 x24: 0000000000022458\nx23: 0000000000000000 x22: 0000000000000004 x21: 000000011b380000\nx20: ffff000000000000 x19: 000000011b379f40 x18: 0000000000000000\nx17: 0000000000000000 x16: 0000000000000000 x15: 0000000000000000\nx14: 0000000000000000 x13: 0000000000000000 x12: 0000000000000000\nx11: 0000000000000000 x10: 0000000000000000 x9 : ffffc875e0aa5e2c\nx8 : 0000000000000000 x7 : 0000000000000000 x6 : 0000000000000000\nx5 : fffffc01ce7a5c00 x4 : 00000000046cde00 x3 : fffffc0000000000\nx2 : 0000000000000004 x1 : 0000000000000040 x0 : ffff0046cde7c000\n\nCall trace:\n mte_clear_page_tags+0x14/0x24\n set_huge_pte_at+0x25c/0x280\n hugetlb_change_protection+0x220/0x430\n change_protection+0x5c/0x8c\n mprotect_fixup+0x10c/0x294\n do_mprotect_pkey.constprop.0+0x2e0/0x3d4\n __arm64_sys_mprotect+0x24/0x44\n invoke_syscall+0x50/0x160\n el0_svc_common+0x48/0x144\n do_el0_svc+0x30/0xe0\n el0_svc+0x30/0xf0\n el0t_64_sync_handler+0xc4/0x148\n el0t_64_sync+0x1a4/0x1a8\n\nSoft lockup is not triggered with THP or base page because there is\ncond_resched() called for each PMD size.\n\nAlthough the soft lockup was triggered by MTE, it should be not MTE\nspecific. The other processing which takes long time in the loop may\ntrigger soft lockup too.\n\nSo add cond_resched() for hugetlb to avoid soft lockup.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40153",
"url": "https://www.suse.com/security/cve/CVE-2025-40153"
},
{
"category": "external",
"summary": "SUSE Bug 1253408 for CVE-2025-40153",
"url": "https://bugzilla.suse.com/1253408"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.3,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-19T16:19:41Z",
"details": "low"
}
],
"title": "CVE-2025-40153"
},
{
"cve": "CVE-2025-40154",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40154"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nASoC: Intel: bytcr_rt5640: Fix invalid quirk input mapping\n\nWhen an invalid value is passed via quirk option, currently\nbytcr_rt5640 driver only shows an error message but leaves as is.\nThis may lead to unepxected results like OOB access.\n\nThis patch corrects the input mapping to the certain default value if\nan invalid value is passed.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40154",
"url": "https://www.suse.com/security/cve/CVE-2025-40154"
},
{
"category": "external",
"summary": "SUSE Bug 1253431 for CVE-2025-40154",
"url": "https://bugzilla.suse.com/1253431"
},
{
"category": "external",
"summary": "SUSE Bug 1253432 for CVE-2025-40154",
"url": "https://bugzilla.suse.com/1253432"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-19T16:19:41Z",
"details": "moderate"
}
],
"title": "CVE-2025-40154"
},
{
"cve": "CVE-2025-40156",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40156"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nPM / devfreq: mtk-cci: Fix potential error pointer dereference in probe()\n\nThe drv-\u003esram_reg pointer could be set to ERR_PTR(-EPROBE_DEFER) which\nwould lead to a error pointer dereference. Use IS_ERR_OR_NULL() to check\nthat the pointer is valid.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40156",
"url": "https://www.suse.com/security/cve/CVE-2025-40156"
},
{
"category": "external",
"summary": "SUSE Bug 1253428 for CVE-2025-40156",
"url": "https://bugzilla.suse.com/1253428"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-19T16:19:41Z",
"details": "moderate"
}
],
"title": "CVE-2025-40156"
},
{
"cve": "CVE-2025-40157",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40157"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nEDAC/i10nm: Skip DIMM enumeration on a disabled memory controller\n\nWhen loading the i10nm_edac driver on some Intel Granite Rapids servers,\na call trace may appear as follows:\n\n UBSAN: shift-out-of-bounds in drivers/edac/skx_common.c:453:16\n shift exponent -66 is negative\n ...\n __ubsan_handle_shift_out_of_bounds+0x1e3/0x390\n skx_get_dimm_info.cold+0x47/0xd40 [skx_edac_common]\n i10nm_get_dimm_config+0x23e/0x390 [i10nm_edac]\n skx_register_mci+0x159/0x220 [skx_edac_common]\n i10nm_init+0xcb0/0x1ff0 [i10nm_edac]\n ...\n\nThis occurs because some BIOS may disable a memory controller if there\naren\u0027t any memory DIMMs populated on this memory controller. The DIMMMTR\nregister of this disabled memory controller contains the invalid value\n~0, resulting in the call trace above.\n\nFix this call trace by skipping DIMM enumeration on a disabled memory\ncontroller.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40157",
"url": "https://www.suse.com/security/cve/CVE-2025-40157"
},
{
"category": "external",
"summary": "SUSE Bug 1253423 for CVE-2025-40157",
"url": "https://bugzilla.suse.com/1253423"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.2,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:L/I:L/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-19T16:19:41Z",
"details": "moderate"
}
],
"title": "CVE-2025-40157"
},
{
"cve": "CVE-2025-40158",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40158"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nipv6: use RCU in ip6_output()\n\nUse RCU in ip6_output() in order to use dst_dev_rcu() to prevent\npossible UAF.\n\nWe can remove rcu_read_lock()/rcu_read_unlock() pairs\nfrom ip6_finish_output2().",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40158",
"url": "https://www.suse.com/security/cve/CVE-2025-40158"
},
{
"category": "external",
"summary": "SUSE Bug 1253402 for CVE-2025-40158",
"url": "https://bugzilla.suse.com/1253402"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-19T16:19:41Z",
"details": "moderate"
}
],
"title": "CVE-2025-40158"
},
{
"cve": "CVE-2025-40159",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40159"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nxsk: Harden userspace-supplied xdp_desc validation\n\nTurned out certain clearly invalid values passed in xdp_desc from\nuserspace can pass xp_{,un}aligned_validate_desc() and then lead\nto UBs or just invalid frames to be queued for xmit.\n\ndesc-\u003elen close to ``U32_MAX`` with a non-zero pool-\u003etx_metadata_len\ncan cause positive integer overflow and wraparound, the same way low\nenough desc-\u003eaddr with a non-zero pool-\u003etx_metadata_len can cause\nnegative integer overflow. Both scenarios can then pass the\nvalidation successfully.\nThis doesn\u0027t happen with valid XSk applications, but can be used\nto perform attacks.\n\nAlways promote desc-\u003elen to ``u64`` first to exclude positive\noverflows of it. Use explicit check_{add,sub}_overflow() when\nvalidating desc-\u003eaddr (which is ``u64`` already).\n\nbloat-o-meter reports a little growth of the code size:\n\nadd/remove: 0/0 grow/shrink: 2/1 up/down: 60/-16 (44)\nFunction old new delta\nxskq_cons_peek_desc 299 330 +31\nxsk_tx_peek_release_desc_batch 973 1002 +29\nxsk_generic_xmit 3148 3132 -16\n\nbut hopefully this doesn\u0027t hurt the performance much.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40159",
"url": "https://www.suse.com/security/cve/CVE-2025-40159"
},
{
"category": "external",
"summary": "SUSE Bug 1253403 for CVE-2025-40159",
"url": "https://bugzilla.suse.com/1253403"
},
{
"category": "external",
"summary": "SUSE Bug 1253404 for CVE-2025-40159",
"url": "https://bugzilla.suse.com/1253404"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-19T16:19:41Z",
"details": "important"
}
],
"title": "CVE-2025-40159"
},
{
"cve": "CVE-2025-40161",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40161"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nmailbox: zynqmp-ipi: Fix SGI cleanup on unbind\n\nThe driver incorrectly determines SGI vs SPI interrupts by checking IRQ\nnumber \u003c 16, which fails with dynamic IRQ allocation. During unbind,\nthis causes improper SGI cleanup leading to kernel crash.\n\nAdd explicit irq_type field to pdata for reliable identification of SGI\ninterrupts (type-2) and only clean up SGI resources when appropriate.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40161",
"url": "https://www.suse.com/security/cve/CVE-2025-40161"
},
{
"category": "external",
"summary": "SUSE Bug 1253410 for CVE-2025-40161",
"url": "https://bugzilla.suse.com/1253410"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.1,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-19T16:19:41Z",
"details": "moderate"
}
],
"title": "CVE-2025-40161"
},
{
"cve": "CVE-2025-40162",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40162"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nASoC: amd/sdw_utils: avoid NULL deref when devm_kasprintf() fails\n\ndevm_kasprintf() may return NULL on memory allocation failure,\nbut the debug message prints cpus-\u003edai_name before checking it.\nMove the dev_dbg() call after the NULL check to prevent potential\nNULL pointer dereference.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40162",
"url": "https://www.suse.com/security/cve/CVE-2025-40162"
},
{
"category": "external",
"summary": "SUSE Bug 1253422 for CVE-2025-40162",
"url": "https://bugzilla.suse.com/1253422"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-19T16:19:41Z",
"details": "moderate"
}
],
"title": "CVE-2025-40162"
},
{
"cve": "CVE-2025-40164",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40164"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nusbnet: Fix using smp_processor_id() in preemptible code warnings\n\nSyzbot reported the following warning:\n\nBUG: using smp_processor_id() in preemptible [00000000] code: dhcpcd/2879\ncaller is usbnet_skb_return+0x74/0x490 drivers/net/usb/usbnet.c:331\nCPU: 1 UID: 0 PID: 2879 Comm: dhcpcd Not tainted 6.15.0-rc4-syzkaller-00098-g615dca38c2ea #0 PREEMPT(voluntary)\nCall Trace:\n \u003cTASK\u003e\n __dump_stack lib/dump_stack.c:94 [inline]\n dump_stack_lvl+0x16c/0x1f0 lib/dump_stack.c:120\n check_preemption_disabled+0xd0/0xe0 lib/smp_processor_id.c:49\n usbnet_skb_return+0x74/0x490 drivers/net/usb/usbnet.c:331\n usbnet_resume_rx+0x4b/0x170 drivers/net/usb/usbnet.c:708\n usbnet_change_mtu+0x1be/0x220 drivers/net/usb/usbnet.c:417\n __dev_set_mtu net/core/dev.c:9443 [inline]\n netif_set_mtu_ext+0x369/0x5c0 net/core/dev.c:9496\n netif_set_mtu+0xb0/0x160 net/core/dev.c:9520\n dev_set_mtu+0xae/0x170 net/core/dev_api.c:247\n dev_ifsioc+0xa31/0x18d0 net/core/dev_ioctl.c:572\n dev_ioctl+0x223/0x10e0 net/core/dev_ioctl.c:821\n sock_do_ioctl+0x19d/0x280 net/socket.c:1204\n sock_ioctl+0x42f/0x6a0 net/socket.c:1311\n vfs_ioctl fs/ioctl.c:51 [inline]\n __do_sys_ioctl fs/ioctl.c:906 [inline]\n __se_sys_ioctl fs/ioctl.c:892 [inline]\n __x64_sys_ioctl+0x190/0x200 fs/ioctl.c:892\n do_syscall_x64 arch/x86/entry/syscall_64.c:63 [inline]\n do_syscall_64+0xcd/0x260 arch/x86/entry/syscall_64.c:94\n entry_SYSCALL_64_after_hwframe+0x77/0x7f\n\nFor historical and portability reasons, the netif_rx() is usually\nrun in the softirq or interrupt context, this commit therefore add\nlocal_bh_disable/enable() protection in the usbnet_resume_rx().",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40164",
"url": "https://www.suse.com/security/cve/CVE-2025-40164"
},
{
"category": "external",
"summary": "SUSE Bug 1253407 for CVE-2025-40164",
"url": "https://bugzilla.suse.com/1253407"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.7,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-19T16:19:41Z",
"details": "moderate"
}
],
"title": "CVE-2025-40164"
},
{
"cve": "CVE-2025-40165",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40165"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nmedia: nxp: imx8-isi: m2m: Fix streaming cleanup on release\n\nIf streamon/streamoff calls are imbalanced, such as when exiting an\napplication with Ctrl+C when streaming, the m2m usage_count will never\nreach zero and the ISI channel won\u0027t be freed. Besides from that, if the\ninput line width is more than 2K, it will trigger a WARN_ON():\n\n[ 59.222120] ------------[ cut here ]------------\n[ 59.226758] WARNING: drivers/media/platform/nxp/imx8-isi/imx8-isi-hw.c:631 at mxc_isi_channel_chain+0xa4/0x120, CPU#4: v4l2-ctl/654\n[ 59.238569] Modules linked in: ap1302\n[ 59.242231] CPU: 4 UID: 0 PID: 654 Comm: v4l2-ctl Not tainted 6.16.0-rc4-next-20250704-06511-gff0e002d480a-dirty #258 PREEMPT\n[ 59.253597] Hardware name: NXP i.MX95 15X15 board (DT)\n[ 59.258720] pstate: 80400009 (Nzcv daif +PAN -UAO -TCO -DIT -SSBS BTYPE=--)\n[ 59.265669] pc : mxc_isi_channel_chain+0xa4/0x120\n[ 59.270358] lr : mxc_isi_channel_chain+0x44/0x120\n[ 59.275047] sp : ffff8000848c3b40\n[ 59.278348] x29: ffff8000848c3b40 x28: ffff0000859b4c98 x27: ffff800081939f00\n[ 59.285472] x26: 000000000000000a x25: ffff0000859b4cb8 x24: 0000000000000001\n[ 59.292597] x23: ffff0000816f4760 x22: ffff0000816f4258 x21: ffff000084ceb780\n[ 59.299720] x20: ffff000084342ff8 x19: ffff000084340000 x18: 0000000000000000\n[ 59.306845] x17: 0000000000000000 x16: 0000000000000000 x15: 0000ffffdb369e1c\n[ 59.313969] x14: 0000000000000000 x13: 0000000000000000 x12: 0000000000000000\n[ 59.321093] x11: 0000000000000000 x10: 0000000000000000 x9 : 0000000000000000\n[ 59.328217] x8 : ffff8000848c3d48 x7 : ffff800081930b30 x6 : ffff800081930b30\n[ 59.335340] x5 : ffff0000859b6000 x4 : ffff80008193ae80 x3 : ffff800081022420\n[ 59.342464] x2 : ffff0000852f6900 x1 : 0000000000000001 x0 : ffff000084341000\n[ 59.349590] Call trace:\n[ 59.352025] mxc_isi_channel_chain+0xa4/0x120 (P)\n[ 59.356722] mxc_isi_m2m_streamon+0x160/0x20c\n[ 59.361072] v4l_streamon+0x24/0x30\n[ 59.364556] __video_do_ioctl+0x40c/0x4a0\n[ 59.368560] video_usercopy+0x2bc/0x690\n[ 59.372382] video_ioctl2+0x18/0x24\n[ 59.375857] v4l2_ioctl+0x40/0x60\n[ 59.379168] __arm64_sys_ioctl+0xac/0x104\n[ 59.383172] invoke_syscall+0x48/0x104\n[ 59.386916] el0_svc_common.constprop.0+0xc0/0xe0\n[ 59.391613] do_el0_svc+0x1c/0x28\n[ 59.394915] el0_svc+0x34/0xf4\n[ 59.397966] el0t_64_sync_handler+0xa0/0xe4\n[ 59.402143] el0t_64_sync+0x198/0x19c\n[ 59.405801] ---[ end trace 0000000000000000 ]---\n\nAddress this issue by moving the streaming preparation and cleanup to\nthe vb2 .prepare_streaming() and .unprepare_streaming() operations. This\nalso simplifies the driver by allowing direct usage of the\nv4l2_m2m_ioctl_streamon() and v4l2_m2m_ioctl_streamoff() helpers.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40165",
"url": "https://www.suse.com/security/cve/CVE-2025-40165"
},
{
"category": "external",
"summary": "SUSE Bug 1253405 for CVE-2025-40165",
"url": "https://bugzilla.suse.com/1253405"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.7,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-19T16:19:41Z",
"details": "moderate"
}
],
"title": "CVE-2025-40165"
},
{
"cve": "CVE-2025-40166",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40166"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\ndrm/xe/guc: Check GuC running state before deregistering exec queue\n\nIn normal operation, a registered exec queue is disabled and\nderegistered through the GuC, and freed only after the GuC confirms\ncompletion. However, if the driver is forced to unbind while the exec\nqueue is still running, the user may call exec_destroy() after the GuC\nhas already been stopped and CT communication disabled.\n\nIn this case, the driver cannot receive a response from the GuC,\npreventing proper cleanup of exec queue resources. Fix this by directly\nreleasing the resources when GuC is not running.\n\nHere is the failure dmesg log:\n\"\n[ 468.089581] ---[ end trace 0000000000000000 ]---\n[ 468.089608] pci 0000:03:00.0: [drm] *ERROR* GT0: GUC ID manager unclean (1/65535)\n[ 468.090558] pci 0000:03:00.0: [drm] GT0: total 65535\n[ 468.090562] pci 0000:03:00.0: [drm] GT0: used 1\n[ 468.090564] pci 0000:03:00.0: [drm] GT0: range 1..1 (1)\n[ 468.092716] ------------[ cut here ]------------\n[ 468.092719] WARNING: CPU: 14 PID: 4775 at drivers/gpu/drm/xe/xe_ttm_vram_mgr.c:298 ttm_vram_mgr_fini+0xf8/0x130 [xe]\n\"\n\nv2: use xe_uc_fw_is_running() instead of xe_guc_ct_enabled().\n As CT may go down and come back during VF migration.\n\n(cherry picked from commit 9b42321a02c50a12b2beb6ae9469606257fbecea)",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40166",
"url": "https://www.suse.com/security/cve/CVE-2025-40166"
},
{
"category": "external",
"summary": "SUSE Bug 1253433 for CVE-2025-40166",
"url": "https://bugzilla.suse.com/1253433"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-19T16:19:41Z",
"details": "moderate"
}
],
"title": "CVE-2025-40166"
},
{
"cve": "CVE-2025-40168",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40168"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nsmc: Use __sk_dst_get() and dst_dev_rcu() in smc_clc_prfx_match().\n\nsmc_clc_prfx_match() is called from smc_listen_work() and\nnot under RCU nor RTNL.\n\nUsing sk_dst_get(sk)-\u003edev could trigger UAF.\n\nLet\u0027s use __sk_dst_get() and dst_dev_rcu().\n\nNote that the returned value of smc_clc_prfx_match() is not\nused in the caller.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40168",
"url": "https://www.suse.com/security/cve/CVE-2025-40168"
},
{
"category": "external",
"summary": "SUSE Bug 1253427 for CVE-2025-40168",
"url": "https://bugzilla.suse.com/1253427"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-19T16:19:41Z",
"details": "moderate"
}
],
"title": "CVE-2025-40168"
},
{
"cve": "CVE-2025-40169",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40169"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nbpf: Reject negative offsets for ALU ops\n\nWhen verifying BPF programs, the check_alu_op() function validates\ninstructions with ALU operations. The \u0027offset\u0027 field in these\ninstructions is a signed 16-bit integer.\n\nThe existing check \u0027insn-\u003eoff \u003e 1\u0027 was intended to ensure the offset is\neither 0, or 1 for BPF_MOD/BPF_DIV. However, because \u0027insn-\u003eoff\u0027 is\nsigned, this check incorrectly accepts all negative values (e.g., -1).\n\nThis commit tightens the validation by changing the condition to\n\u0027(insn-\u003eoff != 0 \u0026\u0026 insn-\u003eoff != 1)\u0027. This ensures that any value\nother than the explicitly permitted 0 and 1 is rejected, hardening the\nverifier against malformed BPF programs.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40169",
"url": "https://www.suse.com/security/cve/CVE-2025-40169"
},
{
"category": "external",
"summary": "SUSE Bug 1253416 for CVE-2025-40169",
"url": "https://bugzilla.suse.com/1253416"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.8,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-19T16:19:41Z",
"details": "moderate"
}
],
"title": "CVE-2025-40169"
},
{
"cve": "CVE-2025-40171",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40171"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnvmet-fc: move lsop put work to nvmet_fc_ls_req_op\n\nIt\u0027s possible for more than one async command to be in flight from\n__nvmet_fc_send_ls_req. For each command, a tgtport reference is taken.\n\nIn the current code, only one put work item is queued at a time, which\nresults in a leaked reference.\n\nTo fix this, move the work item to the nvmet_fc_ls_req_op struct, which\nalready tracks all resources related to the command.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40171",
"url": "https://www.suse.com/security/cve/CVE-2025-40171"
},
{
"category": "external",
"summary": "SUSE Bug 1253412 for CVE-2025-40171",
"url": "https://bugzilla.suse.com/1253412"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-19T16:19:41Z",
"details": "moderate"
}
],
"title": "CVE-2025-40171"
},
{
"cve": "CVE-2025-40172",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40172"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\naccel/qaic: Treat remaining == 0 as error in find_and_map_user_pages()\n\nCurrently, if find_and_map_user_pages() takes a DMA xfer request from the\nuser with a length field set to 0, or in a rare case, the host receives\nQAIC_TRANS_DMA_XFER_CONT from the device where resources-\u003exferred_dma_size\nis equal to the requested transaction size, the function will return 0\nbefore allocating an sgt or setting the fields of the dma_xfer struct.\nIn that case, encode_addr_size_pairs() will try to access the sgt which\nwill lead to a general protection fault.\n\nReturn an EINVAL in case the user provides a zero-sized ALP, or the device\nrequests continuation after all of the bytes have been transferred.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40172",
"url": "https://www.suse.com/security/cve/CVE-2025-40172"
},
{
"category": "external",
"summary": "SUSE Bug 1253424 for CVE-2025-40172",
"url": "https://bugzilla.suse.com/1253424"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-19T16:19:41Z",
"details": "moderate"
}
],
"title": "CVE-2025-40172"
},
{
"cve": "CVE-2025-40173",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40173"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnet/ip6_tunnel: Prevent perpetual tunnel growth\n\nSimilarly to ipv4 tunnel, ipv6 version updates dev-\u003eneeded_headroom, too.\nWhile ipv4 tunnel headroom adjustment growth was limited in\ncommit 5ae1e9922bbd (\"net: ip_tunnel: prevent perpetual headroom growth\"),\nipv6 tunnel yet increases the headroom without any ceiling.\n\nReflect ipv4 tunnel headroom adjustment limit on ipv6 version.\n\nCredits to Francesco Ruggeri, who was originally debugging this issue\nand wrote local Arista-specific patch and a reproducer.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40173",
"url": "https://www.suse.com/security/cve/CVE-2025-40173"
},
{
"category": "external",
"summary": "SUSE Bug 1253421 for CVE-2025-40173",
"url": "https://bugzilla.suse.com/1253421"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.7,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-19T16:19:41Z",
"details": "moderate"
}
],
"title": "CVE-2025-40173"
},
{
"cve": "CVE-2025-40175",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40175"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nidpf: cleanup remaining SKBs in PTP flows\n\nWhen the driver requests Tx timestamp value, one of the first steps is\nto clone SKB using skb_get. It increases the reference counter for that\nSKB to prevent unexpected freeing by another component.\nHowever, there may be a case where the index is requested, SKB is\nassigned and never consumed by PTP flows - for example due to reset during\nrunning PTP apps.\n\nAdd a check in release timestamping function to verify if the SKB\nassigned to Tx timestamp latch was freed, and release remaining SKBs.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40175",
"url": "https://www.suse.com/security/cve/CVE-2025-40175"
},
{
"category": "external",
"summary": "SUSE Bug 1253426 for CVE-2025-40175",
"url": "https://bugzilla.suse.com/1253426"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.7,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-19T16:19:41Z",
"details": "moderate"
}
],
"title": "CVE-2025-40175"
},
{
"cve": "CVE-2025-40176",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40176"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\ntls: wait for pending async decryptions if tls_strp_msg_hold fails\n\nAsync decryption calls tls_strp_msg_hold to create a clone of the\ninput skb to hold references to the memory it uses. If we fail to\nallocate that clone, proceeding with async decryption can lead to\nvarious issues (UAF on the skb, writing into userspace memory after\nthe recv() call has returned).\n\nIn this case, wait for all pending decryption requests.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40176",
"url": "https://www.suse.com/security/cve/CVE-2025-40176"
},
{
"category": "external",
"summary": "SUSE Bug 1253425 for CVE-2025-40176",
"url": "https://bugzilla.suse.com/1253425"
},
{
"category": "external",
"summary": "SUSE Bug 1254100 for CVE-2025-40176",
"url": "https://bugzilla.suse.com/1254100"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-19T16:19:41Z",
"details": "important"
}
],
"title": "CVE-2025-40176"
},
{
"cve": "CVE-2025-40177",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40177"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\naccel/qaic: Fix bootlog initialization ordering\n\nAs soon as we queue MHI buffers to receive the bootlog from the device,\nwe could be receiving data. Therefore all the resources needed to\nprocess that data need to be setup prior to queuing the buffers.\n\nWe currently initialize some of the resources after queuing the buffers\nwhich creates a race between the probe() and any data that comes back\nfrom the device. If the uninitialized resources are accessed, we could\nsee page faults.\n\nFix the init ordering to close the race.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40177",
"url": "https://www.suse.com/security/cve/CVE-2025-40177"
},
{
"category": "external",
"summary": "SUSE Bug 1253443 for CVE-2025-40177",
"url": "https://bugzilla.suse.com/1253443"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-19T16:19:41Z",
"details": "moderate"
}
],
"title": "CVE-2025-40177"
},
{
"cve": "CVE-2025-40178",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40178"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\npid: Add a judgment for ns null in pid_nr_ns\n\n__task_pid_nr_ns\n ns = task_active_pid_ns(current);\n pid_nr_ns(rcu_dereference(*task_pid_ptr(task, type)), ns);\n if (pid \u0026\u0026 ns-\u003elevel \u003c= pid-\u003elevel) {\n\nSometimes null is returned for task_active_pid_ns. Then it will trigger kernel panic in pid_nr_ns.\n\nFor example:\n\tUnable to handle kernel NULL pointer dereference at virtual address 0000000000000058\n\tMem abort info:\n\tESR = 0x0000000096000007\n\tEC = 0x25: DABT (current EL), IL = 32 bits\n\tSET = 0, FnV = 0\n\tEA = 0, S1PTW = 0\n\tFSC = 0x07: level 3 translation fault\n\tData abort info:\n\tISV = 0, ISS = 0x00000007, ISS2 = 0x00000000\n\tCM = 0, WnR = 0, TnD = 0, TagAccess = 0\n\tGCS = 0, Overlay = 0, DirtyBit = 0, Xs = 0\n\tuser pgtable: 4k pages, 39-bit VAs, pgdp=00000002175aa000\n\t[0000000000000058] pgd=08000002175ab003, p4d=08000002175ab003, pud=08000002175ab003, pmd=08000002175be003, pte=0000000000000000\n\tpstate: 834000c5 (Nzcv daIF +PAN -UAO +TCO +DIT -SSBS BTYPE=--)\n\tpc : __task_pid_nr_ns+0x74/0xd0\n\tlr : __task_pid_nr_ns+0x24/0xd0\n\tsp : ffffffc08001bd10\n\tx29: ffffffc08001bd10 x28: ffffffd4422b2000 x27: 0000000000000001\n\tx26: ffffffd442821168 x25: ffffffd442821000 x24: 00000f89492eab31\n\tx23: 00000000000000c0 x22: ffffff806f5693c0 x21: ffffff806f5693c0\n\tx20: 0000000000000001 x19: 0000000000000000 x18: 0000000000000000\n\tx17: 00000000529c6ef0 x16: 00000000529c6ef0 x15: 00000000023a1adc\n\tx14: 0000000000000003 x13: 00000000007ef6d8 x12: 001167c391c78800\n\tx11: 00ffffffffffffff x10: 0000000000000000 x9 : 0000000000000001\n\tx8 : ffffff80816fa3c0 x7 : 0000000000000000 x6 : 49534d702d535449\n\tx5 : ffffffc080c4c2c0 x4 : ffffffd43ee128c8 x3 : ffffffd43ee124dc\n\tx2 : 0000000000000000 x1 : 0000000000000001 x0 : ffffff806f5693c0\n\tCall trace:\n\t__task_pid_nr_ns+0x74/0xd0\n\t...\n\t__handle_irq_event_percpu+0xd4/0x284\n\thandle_irq_event+0x48/0xb0\n\thandle_fasteoi_irq+0x160/0x2d8\n\tgeneric_handle_domain_irq+0x44/0x60\n\tgic_handle_irq+0x4c/0x114\n\tcall_on_irq_stack+0x3c/0x74\n\tdo_interrupt_handler+0x4c/0x84\n\tel1_interrupt+0x34/0x58\n\tel1h_64_irq_handler+0x18/0x24\n\tel1h_64_irq+0x68/0x6c\n\taccount_kernel_stack+0x60/0x144\n\texit_task_stack_account+0x1c/0x80\n\tdo_exit+0x7e4/0xaf8\n\t...\n\tget_signal+0x7bc/0x8d8\n\tdo_notify_resume+0x128/0x828\n\tel0_svc+0x6c/0x70\n\tel0t_64_sync_handler+0x68/0xbc\n\tel0t_64_sync+0x1a8/0x1ac\n\tCode: 35fffe54 911a02a8 f9400108 b4000128 (b9405a69)\n\t---[ end trace 0000000000000000 ]---\n\tKernel panic - not syncing: Oops: Fatal exception in interrupt",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40178",
"url": "https://www.suse.com/security/cve/CVE-2025-40178"
},
{
"category": "external",
"summary": "SUSE Bug 1253463 for CVE-2025-40178",
"url": "https://bugzilla.suse.com/1253463"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-19T16:19:41Z",
"details": "moderate"
}
],
"title": "CVE-2025-40178"
},
{
"cve": "CVE-2025-40180",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40180"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nmailbox: zynqmp-ipi: Fix out-of-bounds access in mailbox cleanup loop\n\nThe cleanup loop was starting at the wrong array index, causing\nout-of-bounds access.\nStart the loop at the correct index for zero-indexed arrays to prevent\naccessing memory beyond the allocated array bounds.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40180",
"url": "https://www.suse.com/security/cve/CVE-2025-40180"
},
{
"category": "external",
"summary": "SUSE Bug 1253440 for CVE-2025-40180",
"url": "https://bugzilla.suse.com/1253440"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-19T16:19:41Z",
"details": "moderate"
}
],
"title": "CVE-2025-40180"
},
{
"cve": "CVE-2025-40183",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40183"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nbpf: Fix metadata_dst leak __bpf_redirect_neigh_v{4,6}\n\nCilium has a BPF egress gateway feature which forces outgoing K8s Pod\ntraffic to pass through dedicated egress gateways which then SNAT the\ntraffic in order to interact with stable IPs outside the cluster.\n\nThe traffic is directed to the gateway via vxlan tunnel in collect md\nmode. A recent BPF change utilized the bpf_redirect_neigh() helper to\nforward packets after the arrival and decap on vxlan, which turned out\nover time that the kmalloc-256 slab usage in kernel was ever-increasing.\n\nThe issue was that vxlan allocates the metadata_dst object and attaches\nit through a fake dst entry to the skb. The latter was never released\nthough given bpf_redirect_neigh() was merely setting the new dst entry\nvia skb_dst_set() without dropping an existing one first.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40183",
"url": "https://www.suse.com/security/cve/CVE-2025-40183"
},
{
"category": "external",
"summary": "SUSE Bug 1253441 for CVE-2025-40183",
"url": "https://bugzilla.suse.com/1253441"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-19T16:19:41Z",
"details": "moderate"
}
],
"title": "CVE-2025-40183"
},
{
"cve": "CVE-2025-40185",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40185"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nice: ice_adapter: release xa entry on adapter allocation failure\n\nWhen ice_adapter_new() fails, the reserved XArray entry created by\nxa_insert() is not released. This causes subsequent insertions at\nthe same index to return -EBUSY, potentially leading to\nNULL pointer dereferences.\n\nReorder the operations as suggested by Przemek Kitszel:\n1. Check if adapter already exists (xa_load)\n2. Reserve the XArray slot (xa_reserve)\n3. Allocate the adapter (ice_adapter_new)\n4. Store the adapter (xa_store)",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40185",
"url": "https://www.suse.com/security/cve/CVE-2025-40185"
},
{
"category": "external",
"summary": "SUSE Bug 1253394 for CVE-2025-40185",
"url": "https://bugzilla.suse.com/1253394"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-19T16:19:41Z",
"details": "moderate"
}
],
"title": "CVE-2025-40185"
},
{
"cve": "CVE-2025-40186",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40186"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\ntcp: Don\u0027t call reqsk_fastopen_remove() in tcp_conn_request().\n\nsyzbot reported the splat below in tcp_conn_request(). [0]\n\nIf a listener is close()d while a TFO socket is being processed in\ntcp_conn_request(), inet_csk_reqsk_queue_add() does not set reqsk-\u003esk\nand calls inet_child_forget(), which calls tcp_disconnect() for the\nTFO socket.\n\nAfter the cited commit, tcp_disconnect() calls reqsk_fastopen_remove(),\nwhere reqsk_put() is called due to !reqsk-\u003esk.\n\nThen, reqsk_fastopen_remove() in tcp_conn_request() decrements the\nlast req-\u003ersk_refcnt and frees reqsk, and __reqsk_free() at the\ndrop_and_free label causes the refcount underflow for the listener\nand double-free of the reqsk.\n\nLet\u0027s remove reqsk_fastopen_remove() in tcp_conn_request().\n\nNote that other callers make sure tp-\u003efastopen_rsk is not NULL.\n\n[0]:\nrefcount_t: underflow; use-after-free.\nWARNING: CPU: 12 PID: 5563 at lib/refcount.c:28 refcount_warn_saturate (lib/refcount.c:28)\nModules linked in:\nCPU: 12 UID: 0 PID: 5563 Comm: syz-executor Not tainted syzkaller #0 PREEMPT(full)\nHardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025\nRIP: 0010:refcount_warn_saturate (lib/refcount.c:28)\nCode: ab e8 8e b4 98 ff 0f 0b c3 cc cc cc cc cc 80 3d a4 e4 d6 01 00 75 9c c6 05 9b e4 d6 01 01 48 c7 c7 e8 df fb ab e8 6a b4 98 ff \u003c0f\u003e 0b e9 03 5b 76 00 cc 80 3d 7d e4 d6 01 00 0f 85 74 ff ff ff c6\nRSP: 0018:ffffa79fc0304a98 EFLAGS: 00010246\nRAX: d83af4db1c6b3900 RBX: ffff9f65c7a69020 RCX: d83af4db1c6b3900\nRDX: 0000000000000000 RSI: 00000000ffff7fff RDI: ffffffffac78a280\nRBP: 000000009d781b60 R08: 0000000000007fff R09: ffffffffac6ca280\nR10: 0000000000017ffd R11: 0000000000000004 R12: ffff9f65c7b4f100\nR13: ffff9f65c7d23c00 R14: ffff9f65c7d26000 R15: ffff9f65c7a64ef8\nFS: 00007f9f962176c0(0000) GS:ffff9f65fcf00000(0000) knlGS:0000000000000000\nCS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033\nCR2: 0000200000000180 CR3: 000000000dbbe006 CR4: 0000000000372ef0\nCall Trace:\n \u003cIRQ\u003e\n tcp_conn_request (./include/linux/refcount.h:400 ./include/linux/refcount.h:432 ./include/linux/refcount.h:450 ./include/net/sock.h:1965 ./include/net/request_sock.h:131 net/ipv4/tcp_input.c:7301)\n tcp_rcv_state_process (net/ipv4/tcp_input.c:6708)\n tcp_v6_do_rcv (net/ipv6/tcp_ipv6.c:1670)\n tcp_v6_rcv (net/ipv6/tcp_ipv6.c:1906)\n ip6_protocol_deliver_rcu (net/ipv6/ip6_input.c:438)\n ip6_input (net/ipv6/ip6_input.c:500)\n ipv6_rcv (net/ipv6/ip6_input.c:311)\n __netif_receive_skb (net/core/dev.c:6104)\n process_backlog (net/core/dev.c:6456)\n __napi_poll (net/core/dev.c:7506)\n net_rx_action (net/core/dev.c:7569 net/core/dev.c:7696)\n handle_softirqs (kernel/softirq.c:579)\n do_softirq (kernel/softirq.c:480)\n \u003c/IRQ\u003e",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40186",
"url": "https://www.suse.com/security/cve/CVE-2025-40186"
},
{
"category": "external",
"summary": "SUSE Bug 1253438 for CVE-2025-40186",
"url": "https://bugzilla.suse.com/1253438"
},
{
"category": "external",
"summary": "SUSE Bug 1253439 for CVE-2025-40186",
"url": "https://bugzilla.suse.com/1253439"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-19T16:19:41Z",
"details": "important"
}
],
"title": "CVE-2025-40186"
},
{
"cve": "CVE-2025-40187",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40187"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnet/sctp: fix a null dereference in sctp_disposition sctp_sf_do_5_1D_ce()\n\nIf new_asoc-\u003epeer.adaptation_ind=0 and sctp_ulpevent_make_authkey=0\nand sctp_ulpevent_make_authkey() returns 0, then the variable\nai_ev remains zero and the zero will be dereferenced\nin the sctp_ulpevent_free() function.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40187",
"url": "https://www.suse.com/security/cve/CVE-2025-40187"
},
{
"category": "external",
"summary": "SUSE Bug 1253647 for CVE-2025-40187",
"url": "https://bugzilla.suse.com/1253647"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.1,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-19T16:19:41Z",
"details": "moderate"
}
],
"title": "CVE-2025-40187"
},
{
"cve": "CVE-2025-40188",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40188"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\npwm: berlin: Fix wrong register in suspend/resume\n\nThe \u0027enable\u0027 register should be BERLIN_PWM_EN rather than\nBERLIN_PWM_ENABLE, otherwise, the driver accesses wrong address, there\nwill be cpu exception then kernel panic during suspend/resume.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40188",
"url": "https://www.suse.com/security/cve/CVE-2025-40188"
},
{
"category": "external",
"summary": "SUSE Bug 1253449 for CVE-2025-40188",
"url": "https://bugzilla.suse.com/1253449"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-19T16:19:41Z",
"details": "moderate"
}
],
"title": "CVE-2025-40188"
},
{
"cve": "CVE-2025-40192",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40192"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nRevert \"ipmi: fix msg stack when IPMI is disconnected\"\n\nThis reverts commit c608966f3f9c2dca596967501d00753282b395fc.\n\nThis patch has a subtle bug that can cause the IPMI driver to go into an\ninfinite loop if the BMC misbehaves in a certain way. Apparently\ncertain BMCs do misbehave this way because several reports have come in\nrecently about this.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40192",
"url": "https://www.suse.com/security/cve/CVE-2025-40192"
},
{
"category": "external",
"summary": "SUSE Bug 1253622 for CVE-2025-40192",
"url": "https://bugzilla.suse.com/1253622"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-19T16:19:41Z",
"details": "moderate"
}
],
"title": "CVE-2025-40192"
},
{
"cve": "CVE-2025-40194",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40194"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\ncpufreq: intel_pstate: Fix object lifecycle issue in update_qos_request()\n\nThe cpufreq_cpu_put() call in update_qos_request() takes place too early\nbecause the latter subsequently calls freq_qos_update_request() that\nindirectly accesses the policy object in question through the QoS request\nobject passed to it.\n\nFortunately, update_qos_request() is called under intel_pstate_driver_lock,\nso this issue does not matter for changing the intel_pstate operation\nmode, but it theoretically can cause a crash to occur on CPU device hot\nremoval (which currently can only happen in virt, but it is formally\nsupported nevertheless).\n\nAddress this issue by modifying update_qos_request() to drop the\nreference to the policy later.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40194",
"url": "https://www.suse.com/security/cve/CVE-2025-40194"
},
{
"category": "external",
"summary": "SUSE Bug 1253445 for CVE-2025-40194",
"url": "https://bugzilla.suse.com/1253445"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.7,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-19T16:19:41Z",
"details": "moderate"
}
],
"title": "CVE-2025-40194"
},
{
"cve": "CVE-2025-40196",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40196"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nfs: quota: create dedicated workqueue for quota_release_work\n\nThere is a kernel panic due to WARN_ONCE when panic_on_warn is set.\n\nThis issue occurs when writeback is triggered due to sync call for an\nopened file(ie, writeback reason is WB_REASON_SYNC). When f2fs balance\nis needed at sync path, flush for quota_release_work is triggered.\nBy default quota_release_work is queued to \"events_unbound\" queue which\ndoes not have WQ_MEM_RECLAIM flag. During f2fs balance \"writeback\"\nworkqueue tries to flush quota_release_work causing kernel panic due to\nMEM_RECLAIM flag mismatch errors.\n\nThis patch creates dedicated workqueue with WQ_MEM_RECLAIM flag\nfor work quota_release_work.\n\n------------[ cut here ]------------\nWARNING: CPU: 4 PID: 14867 at kernel/workqueue.c:3721 check_flush_dependency+0x13c/0x148\nCall trace:\n check_flush_dependency+0x13c/0x148\n __flush_work+0xd0/0x398\n flush_delayed_work+0x44/0x5c\n dquot_writeback_dquots+0x54/0x318\n f2fs_do_quota_sync+0xb8/0x1a8\n f2fs_write_checkpoint+0x3cc/0x99c\n f2fs_gc+0x190/0x750\n f2fs_balance_fs+0x110/0x168\n f2fs_write_single_data_page+0x474/0x7dc\n f2fs_write_data_pages+0x7d0/0xd0c\n do_writepages+0xe0/0x2f4\n __writeback_single_inode+0x44/0x4ac\n writeback_sb_inodes+0x30c/0x538\n wb_writeback+0xf4/0x440\n wb_workfn+0x128/0x5d4\n process_scheduled_works+0x1c4/0x45c\n worker_thread+0x32c/0x3e8\n kthread+0x11c/0x1b0\n ret_from_fork+0x10/0x20\nKernel panic - not syncing: kernel: panic_on_warn set ...",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40196",
"url": "https://www.suse.com/security/cve/CVE-2025-40196"
},
{
"category": "external",
"summary": "SUSE Bug 1253624 for CVE-2025-40196",
"url": "https://bugzilla.suse.com/1253624"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.3,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-19T16:19:41Z",
"details": "low"
}
],
"title": "CVE-2025-40196"
},
{
"cve": "CVE-2025-40197",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40197"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nmedia: mc: Clear minor number before put device\n\nThe device minor should not be cleared after the device is released.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40197",
"url": "https://www.suse.com/security/cve/CVE-2025-40197"
},
{
"category": "external",
"summary": "SUSE Bug 1253450 for CVE-2025-40197",
"url": "https://bugzilla.suse.com/1253450"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-19T16:19:41Z",
"details": "moderate"
}
],
"title": "CVE-2025-40197"
},
{
"cve": "CVE-2025-40198",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40198"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\next4: avoid potential buffer over-read in parse_apply_sb_mount_options()\n\nUnlike other strings in the ext4 superblock, we rely on tune2fs to\nmake sure s_mount_opts is NUL terminated. Harden\nparse_apply_sb_mount_options() by treating s_mount_opts as a potential\n__nonstring.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40198",
"url": "https://www.suse.com/security/cve/CVE-2025-40198"
},
{
"category": "external",
"summary": "SUSE Bug 1253453 for CVE-2025-40198",
"url": "https://bugzilla.suse.com/1253453"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-19T16:19:41Z",
"details": "moderate"
}
],
"title": "CVE-2025-40198"
},
{
"cve": "CVE-2025-40200",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40200"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nSquashfs: reject negative file sizes in squashfs_read_inode()\n\nSyskaller reports a \"WARNING in ovl_copy_up_file\" in overlayfs.\n\nThis warning is ultimately caused because the underlying Squashfs file\nsystem returns a file with a negative file size.\n\nThis commit checks for a negative file size and returns EINVAL.\n\n[phillip@squashfs.org.uk: only need to check 64 bit quantity]",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40200",
"url": "https://www.suse.com/security/cve/CVE-2025-40200"
},
{
"category": "external",
"summary": "SUSE Bug 1253448 for CVE-2025-40200",
"url": "https://bugzilla.suse.com/1253448"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-19T16:19:41Z",
"details": "moderate"
}
],
"title": "CVE-2025-40200"
},
{
"cve": "CVE-2025-40201",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40201"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nkernel/sys.c: fix the racy usage of task_lock(tsk-\u003egroup_leader) in sys_prlimit64() paths\n\nThe usage of task_lock(tsk-\u003egroup_leader) in sys_prlimit64()-\u003edo_prlimit()\npath is very broken.\n\nsys_prlimit64() does get_task_struct(tsk) but this only protects task_struct\nitself. If tsk != current and tsk is not a leader, this process can exit/exec\nand task_lock(tsk-\u003egroup_leader) may use the already freed task_struct.\n\nAnother problem is that sys_prlimit64() can race with mt-exec which changes\n-\u003egroup_leader. In this case do_prlimit() may take the wrong lock, or (worse)\n-\u003egroup_leader may change between task_lock() and task_unlock().\n\nChange sys_prlimit64() to take tasklist_lock when necessary. This is not\nnice, but I don\u0027t see a better fix for -stable.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40201",
"url": "https://www.suse.com/security/cve/CVE-2025-40201"
},
{
"category": "external",
"summary": "SUSE Bug 1253455 for CVE-2025-40201",
"url": "https://bugzilla.suse.com/1253455"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-19T16:19:41Z",
"details": "moderate"
}
],
"title": "CVE-2025-40201"
},
{
"cve": "CVE-2025-40202",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40202"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nipmi: Rework user message limit handling\n\nThe limit on the number of user messages had a number of issues,\nimproper counting in some cases and a use after free.\n\nRestructure how this is all done to handle more in the receive message\nallocation routine, so all refcouting and user message limit counts\nare done in that routine. It\u0027s a lot cleaner and safer.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40202",
"url": "https://www.suse.com/security/cve/CVE-2025-40202"
},
{
"category": "external",
"summary": "SUSE Bug 1253451 for CVE-2025-40202",
"url": "https://bugzilla.suse.com/1253451"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-19T16:19:41Z",
"details": "moderate"
}
],
"title": "CVE-2025-40202"
},
{
"cve": "CVE-2025-40203",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40203"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nlistmount: don\u0027t call path_put() under namespace semaphore\n\nMassage listmount() and make sure we don\u0027t call path_put() under the\nnamespace semaphore. If we put the last reference we\u0027re fscked.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40203",
"url": "https://www.suse.com/security/cve/CVE-2025-40203"
},
{
"category": "external",
"summary": "SUSE Bug 1253457 for CVE-2025-40203",
"url": "https://bugzilla.suse.com/1253457"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-19T16:19:41Z",
"details": "moderate"
}
],
"title": "CVE-2025-40203"
},
{
"cve": "CVE-2025-40204",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40204"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nsctp: Fix MAC comparison to be constant-time\n\nTo prevent timing attacks, MACs need to be compared in constant time.\nUse the appropriate helper function for this.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40204",
"url": "https://www.suse.com/security/cve/CVE-2025-40204"
},
{
"category": "external",
"summary": "SUSE Bug 1253436 for CVE-2025-40204",
"url": "https://bugzilla.suse.com/1253436"
},
{
"category": "external",
"summary": "SUSE Bug 1253437 for CVE-2025-40204",
"url": "https://bugzilla.suse.com/1253437"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-19T16:19:41Z",
"details": "important"
}
],
"title": "CVE-2025-40204"
},
{
"cve": "CVE-2025-40205",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40205"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nbtrfs: avoid potential out-of-bounds in btrfs_encode_fh()\n\nThe function btrfs_encode_fh() does not properly account for the three\ncases it handles.\n\nBefore writing to the file handle (fh), the function only returns to the\nuser BTRFS_FID_SIZE_NON_CONNECTABLE (5 dwords, 20 bytes) or\nBTRFS_FID_SIZE_CONNECTABLE (8 dwords, 32 bytes).\n\nHowever, when a parent exists and the root ID of the parent and the\ninode are different, the function writes BTRFS_FID_SIZE_CONNECTABLE_ROOT\n(10 dwords, 40 bytes).\n\nIf *max_len is not large enough, this write goes out of bounds because\nBTRFS_FID_SIZE_CONNECTABLE_ROOT is greater than\nBTRFS_FID_SIZE_CONNECTABLE originally returned.\n\nThis results in an 8-byte out-of-bounds write at\nfid-\u003eparent_root_objectid = parent_root_id.\n\nA previous attempt to fix this issue was made but was lost.\n\nhttps://lore.kernel.org/all/4CADAEEC020000780001B32C@vpn.id2.novell.com/\n\nAlthough this issue does not seem to be easily triggerable, it is a\npotential memory corruption bug that should be fixed. This patch\nresolves the issue by ensuring the function returns the appropriate size\nfor all three cases and validates that *max_len is large enough before\nwriting any data.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40205",
"url": "https://www.suse.com/security/cve/CVE-2025-40205"
},
{
"category": "external",
"summary": "SUSE Bug 1253456 for CVE-2025-40205",
"url": "https://bugzilla.suse.com/1253456"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-19T16:19:41Z",
"details": "moderate"
}
],
"title": "CVE-2025-40205"
},
{
"cve": "CVE-2025-40206",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40206"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnetfilter: nft_objref: validate objref and objrefmap expressions\n\nReferencing a synproxy stateful object from OUTPUT hook causes kernel\ncrash due to infinite recursive calls:\n\nBUG: TASK stack guard page was hit at 000000008bda5b8c (stack is 000000003ab1c4a5..00000000494d8b12)\n[...]\nCall Trace:\n __find_rr_leaf+0x99/0x230\n fib6_table_lookup+0x13b/0x2d0\n ip6_pol_route+0xa4/0x400\n fib6_rule_lookup+0x156/0x240\n ip6_route_output_flags+0xc6/0x150\n __nf_ip6_route+0x23/0x50\n synproxy_send_tcp_ipv6+0x106/0x200\n synproxy_send_client_synack_ipv6+0x1aa/0x1f0\n nft_synproxy_do_eval+0x263/0x310\n nft_do_chain+0x5a8/0x5f0 [nf_tables\n nft_do_chain_inet+0x98/0x110\n nf_hook_slow+0x43/0xc0\n __ip6_local_out+0xf0/0x170\n ip6_local_out+0x17/0x70\n synproxy_send_tcp_ipv6+0x1a2/0x200\n synproxy_send_client_synack_ipv6+0x1aa/0x1f0\n[...]\n\nImplement objref and objrefmap expression validate functions.\n\nCurrently, only NFT_OBJECT_SYNPROXY object type requires validation.\nThis will also handle a jump to a chain using a synproxy object from the\nOUTPUT hook.\n\nNow when trying to reference a synproxy object in the OUTPUT hook, nft\nwill produce the following error:\n\nsynproxy_crash.nft: Error: Could not process rule: Operation not supported\n synproxy name mysynproxy\n ^^^^^^^^^^^^^^^^^^^^^^^^",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40206",
"url": "https://www.suse.com/security/cve/CVE-2025-40206"
},
{
"category": "external",
"summary": "SUSE Bug 1253393 for CVE-2025-40206",
"url": "https://bugzilla.suse.com/1253393"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.1,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-19T16:19:41Z",
"details": "moderate"
}
],
"title": "CVE-2025-40206"
},
{
"cve": "CVE-2025-40207",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40207"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nmedia: v4l2-subdev: Fix alloc failure check in v4l2_subdev_call_state_try()\n\nv4l2_subdev_call_state_try() macro allocates a subdev state with\n__v4l2_subdev_state_alloc(), but does not check the returned value. If\n__v4l2_subdev_state_alloc fails, it returns an ERR_PTR, and that would\ncause v4l2_subdev_call_state_try() to crash.\n\nAdd proper error handling to v4l2_subdev_call_state_try().",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40207",
"url": "https://www.suse.com/security/cve/CVE-2025-40207"
},
{
"category": "external",
"summary": "SUSE Bug 1253395 for CVE-2025-40207",
"url": "https://bugzilla.suse.com/1253395"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-19T16:19:41Z",
"details": "moderate"
}
],
"title": "CVE-2025-40207"
}
]
}
SUSE-SU-2026:20012-1
Vulnerability from csaf_suse - Published: 2025-12-19 16:46 - Updated: 2025-12-19 16:46Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Security update for the Linux Kernel",
"title": "Title of the patch"
},
{
"category": "description",
"text": "\nThe SUSE Linux Enterprise 16.0 kernel was updated to fix various security issues\n\nThe following security issues were fixed:\n\n- CVE-2022-50253: bpf: make sure skb-\u003elen != 0 when redirecting to a tunneling device (bsc#1249912).\n- CVE-2025-37916: pds_core: remove write-after-free of client_id (bsc#1243474).\n- CVE-2025-38084: mm/hugetlb: unshare page tables during VMA split, not before (bsc#1245431 bsc#1245498).\n- CVE-2025-38085: mm/hugetlb: fix huge_pmd_unshare() vs GUP-fast race (bsc#1245431 bsc#1245499).\n- CVE-2025-38321: smb: Log an error when close_all_cached_dirs fails (bsc#1246328).\n- CVE-2025-38728: smb3: fix for slab out of bounds on mount to ksmbd (bsc#1249256).\n- CVE-2025-39805: net: macb: fix unregister_netdev call order in macb_remove() (bsc#1249982).\n- CVE-2025-39819: fs/smb: Fix inconsistent refcnt update (bsc#1250176).\n- CVE-2025-39822: io_uring/kbuf: fix signedness in this_len calculation (bsc#1250034).\n- CVE-2025-39831: fbnic: Move phylink resume out of service_task and into open/close (bsc#1249977).\n- CVE-2025-39859: ptp: ocp: fix use-after-free bugs causing by ptp_ocp_watchdog (bsc#1250252).\n- CVE-2025-39897: net: xilinx: axienet: Add error handling for RX metadata pointer retrieval (bsc#1250746).\n- CVE-2025-39917: bpf: Fix out-of-bounds dynptr write in bpf_crypto_crypt (bsc#1250723).\n- CVE-2025-39944: octeontx2-pf: Fix use-after-free bugs in otx2_sync_tstamp() (bsc#1251120).\n- CVE-2025-39961: iommu/amd/pgtbl: Fix possible race while increase page table level (bsc#1251817).\n- CVE-2025-39980: nexthop: Forbid FDB status change while nexthop is in a group (bsc#1252063).\n- CVE-2025-39990: bpf: Check the helper function is valid in get_helper_proto (bsc#1252054).\n- CVE-2025-40001: scsi: mvsas: Fix use-after-free bugs in mvs_work_queue (bsc#1252303).\n- CVE-2025-40003: net: mscc: ocelot: Fix use-after-free caused by cyclic delayed work (bsc#1252301).\n- CVE-2025-40006: mm/hugetlb: fix folio is still mapped when deleted (bsc#1252342).\n- CVE-2025-40021: tracing: dynevent: Add a missing lockdown check on dynevent (bsc#1252681).\n- CVE-2025-40024: vhost: Take a reference on the task in struct vhost_task (bsc#1252686).\n- CVE-2025-40027: net/9p: fix double req put in p9_fd_cancelled (bsc#1252763).\n- CVE-2025-40031: tee: fix register_shm_helper() (bsc#1252779).\n- CVE-2025-40033: remoteproc: pru: Fix potential NULL pointer dereference in pru_rproc_set_ctable() (bsc#1252824).\n- CVE-2025-40038: KVM: SVM: Skip fastpath emulation on VM-Exit if next RIP isn\u0027t valid (bsc#1252817).\n- CVE-2025-40047: io_uring/waitid: always prune wait queue entry in io_waitid_wait() (bsc#1252790).\n- CVE-2025-40053: net: dlink: handle copy_thresh allocation failure (bsc#1252808).\n- CVE-2025-40055: ocfs2: fix double free in user_cluster_connect() (bsc#1252821).\n- CVE-2025-40059: coresight: Fix incorrect handling for return value of devm_kzalloc (bsc#1252809).\n- CVE-2025-40064: smc: Fix use-after-free in __pnet_find_base_ndev() (bsc#1252845).\n- CVE-2025-40070: pps: fix warning in pps_register_cdev when register device fail (bsc#1252836).\n- CVE-2025-40074: tcp: convert to dev_net_rcu() (bsc#1252794).\n- CVE-2025-40075: tcp_metrics: use dst_dev_net_rcu() (bsc#1252795).\n- CVE-2025-40081: perf: arm_spe: Prevent overflow in PERF_IDX2OFF() (bsc#1252776).\n- CVE-2025-40083: net/sched: sch_qfq: Fix null-deref in agg_dequeue (bsc#1252912).\n- CVE-2025-40086: drm/xe: Don\u0027t allow evicting of BOs in same VM in array of VM binds (bsc#1252923).\n- CVE-2025-40098: ALSA: hda: cs35l41: Fix NULL pointer dereference in cs35l41_get_acpi_mute_state() (bsc#1252917).\n- CVE-2025-40101: btrfs: fix memory leaks when rejecting a non SINGLE data profile without an RST (bsc#1252901).\n- CVE-2025-40102: KVM: arm64: Prevent access to vCPU events before init (bsc#1252919).\n- CVE-2025-40105: vfs: Don\u0027t leak disconnected dentries on umount (bsc#1252928).\n- CVE-2025-40133: mptcp: Call dst_release() in mptcp_active_enable() (bsc#1253328).\n- CVE-2025-40134: dm: fix NULL pointer dereference in __dm_suspend() (bsc#1253386).\n- CVE-2025-40135: ipv6: use RCU in ip6_xmit() (bsc#1253342).\n- CVE-2025-40139: smc: Use __sk_dst_get() and dst_dev_rcu() in in smc_clc_prfx_set() (bsc#1253409).\n- CVE-2025-40149: tls: Use __sk_dst_get() and dst_dev_rcu() in get_netdev_for_sock() (bsc#1253355).\n- CVE-2025-40153: mm: hugetlb: avoid soft lockup when mprotect to large memory area (bsc#1253408).\n- CVE-2025-40157: EDAC/i10nm: Skip DIMM enumeration on a disabled memory controller (bsc#1253423).\n- CVE-2025-40158: ipv6: use RCU in ip6_output() (bsc#1253402).\n- CVE-2025-40159: xsk: Harden userspace-supplied xdp_desc validation (bsc#1253403).\n- CVE-2025-40168: smc: Use __sk_dst_get() and dst_dev_rcu() in smc_clc_prfx_match() (bsc#1253427).\n- CVE-2025-40169: bpf: Reject negative offsets for ALU ops (bsc#1253416).\n- CVE-2025-40173: net/ip6_tunnel: Prevent perpetual tunnel growth (bsc#1253421).\n- CVE-2025-40175: idpf: cleanup remaining SKBs in PTP flows (bsc#1253426).\n- CVE-2025-40176: tls: wait for pending async decryptions if tls_strp_msg_hold fails (bsc#1253425).\n- CVE-2025-40178: pid: Add a judgment for ns null in pid_nr_ns (bsc#1253463).\n- CVE-2025-40185: ice: ice_adapter: release xa entry on adapter allocation failure (bsc#1253394).\n- CVE-2025-40201: kernel/sys.c: fix the racy usage of task_lock(tsk-\u003egroup_leader) in sys_prlimit64() paths (bsc#1253455).\n- CVE-2025-40203: listmount: don\u0027t call path_put() under namespace semaphore (bsc#1253457).\n\nThe following non security issues were fixed:\n\n- ACPI: scan: Update honor list for RPMI System MSI (stable-fixes).\n- ACPICA: Update dsmethod.c to get rid of unused variable warning (stable-fixes).\n- Disable CONFIG_CPU5_WDT The cpu5wdt driver doesn\u0027t implement a\n proper watchdog interface and has many code issues. It only handles\n obscure and obsolete hardware. Stop building and supporting this driver\n (jsc#PED-14062).\n- Fix \"drm/xe: Don\u0027t allow evicting of BOs in same VM in array of VM binds\" (bsc#1252923)\n- KVM: SVM: Delete IRTE link from previous vCPU before setting new IRTE (git-fixes).\n- KVM: SVM: Delete IRTE link from previous vCPU irrespective of new routing (git-fixes).\n- KVM: SVM: Mark VMCB_LBR dirty when MSR_IA32_DEBUGCTLMSR is updated (git-fixes).\n- KVM: s390: improve interrupt cpu for wakeup (bsc#1235463).\n- KVM: s390: kABI backport for \u0027last_sleep_cpu\u0027 (bsc#1252352).\n- KVM: x86/mmu: Return -EAGAIN if userspace deletes/moves memslot during prefault (git-fixes).\n- PCI/ERR: Update device error_state already after reset (stable-fixes).\n- PM: EM: Slightly reduce em_check_capacity_update() overhead (stable-fixes).\n- Revert \"net/mlx5e: Update and set Xon/Xoff upon MTU set\" (git-fixes).\n- Revert \"net/mlx5e: Update and set Xon/Xoff upon port speed set\" (git-fixes).\n- Update config files: enable zstd module decompression (jsc#PED-14115).\n- bpf/selftests: Fix test_tcpnotify_user (bsc#1253635).\n- btrfs: do not clear read-only when adding sprout device (bsc#1253238).\n- btrfs: do not update last_log_commit when logging inode due to a new name (git-fixes).\n- dm: fix queue start/stop imbalance under suspend/load/resume races (bsc#1253386)\n- drm/amd/display: Add AVI infoframe copy in copy_stream_update_to_stream (stable-fixes).\n- drm/amd/display: update color on atomic commit time (stable-fixes).\n- drm/amd/display: update dpp/disp clock from smu clock table (stable-fixes).\n- drm/radeon: delete radeon_fence_process in is_signaled, no deadlock (stable-fixes).\n- hwmon: (lenovo-ec-sensors) Update P8 supprt (stable-fixes).\n- media: amphion: Delete v4l2_fh synchronously in .release() (stable-fixes).\n- mount: handle NULL values in mnt_ns_release() (bsc#1254308)\n- net/smc: Remove validation of reserved bits in CLC Decline (bsc#1252357).\n- net: phy: move realtek PHY driver to its own subdirectory (jsc#PED-14353).\n- net: phy: realtek: add defines for shadowed c45 standard registers (jsc#PED-14353).\n- net: phy: realtek: add helper RTL822X_VND2_C22_REG (jsc#PED-14353).\n- net: phy: realtek: change order of calls in C22 read_status() (jsc#PED-14353).\n- net: phy: realtek: clear 1000Base-T link partner advertisement (jsc#PED-14353).\n- net: phy: realtek: improve mmd register access for internal PHY\u0027s (jsc#PED-14353).\n- net: phy: realtek: read duplex and gbit master from PHYSR register (jsc#PED-14353).\n- net: phy: realtek: switch from paged to MMD ops in rtl822x functions (jsc#PED-14353).\n- net: phy: realtek: use string choices helpers (jsc#PED-14353).\n- net: xilinx: axienet: Fix IRQ coalescing packet count overflow (bsc#1250746)\n- net: xilinx: axienet: Fix RX skb ring management in DMAengine mode (bsc#1250746)\n- net: xilinx: axienet: Fix Tx skb circular buffer occupancy check in dmaengine xmit (bsc#1250746)\n- nvmet-auth: update sc_c in host response (git-fixes bsc#1249397).\n- nvmet-auth: update sc_c in target host hash calculation (git-fixes).\n- perf list: Add IBM z17 event descriptions (jsc#PED-13611).\n- platform/x86:intel/pmc: Update Arrow Lake telemetry GUID (git-fixes).\n- powercap: intel_rapl: Add support for Panther Lake platform (jsc#PED-13949).\n- pwm: pca9685: Use bulk write to atomicially update registers (stable-fixes).\n- r8169: add PHY c45 ops for MDIO_MMD_VENDOR2 registers (jsc#PED-14353).\n- r8169: add support for Intel Killer E5000 (jsc#PED-14353).\n- r8169: add support for RTL8125BP rev.b (jsc#PED-14353).\n- r8169: add support for RTL8125D rev.b (jsc#PED-14353).\n- r8169: adjust version numbering for RTL8126 (jsc#PED-14353).\n- r8169: align RTL8125 EEE config with vendor driver (jsc#PED-14353).\n- r8169: align RTL8125/RTL8126 PHY config with vendor driver (jsc#PED-14353).\n- r8169: align RTL8126 EEE config with vendor driver (jsc#PED-14353).\n- r8169: align WAKE_PHY handling with r8125/r8126 vendor drivers (jsc#PED-14353).\n- r8169: avoid duplicated messages if loading firmware fails and switch to warn level (jsc#PED-14353).\n- r8169: don\u0027t take RTNL lock in rtl_task() (jsc#PED-14353).\n- r8169: enable EEE at 2.5G per default on RTL8125B (jsc#PED-14353).\n- r8169: enable RTL8168H/RTL8168EP/RTL8168FP ASPM support (jsc#PED-14353).\n- r8169: fix inconsistent indenting in rtl8169_get_eth_mac_stats (jsc#PED-14353).\n- r8169: implement additional ethtool stats ops (jsc#PED-14353).\n- r8169: improve __rtl8169_set_wol (jsc#PED-14353).\n- r8169: improve initialization of RSS registers on RTL8125/RTL8126 (jsc#PED-14353).\n- r8169: improve rtl_set_d3_pll_down (jsc#PED-14353).\n- r8169: increase max jumbo packet size on RTL8125/RTL8126 (jsc#PED-14353).\n- r8169: remove leftover locks after reverted change (jsc#PED-14353).\n- r8169: remove original workaround for RTL8125 broken rx issue (jsc#PED-14353).\n- r8169: remove rtl_dash_loop_wait_high/low (jsc#PED-14353).\n- r8169: remove support for chip version 11 (jsc#PED-14353).\n- r8169: remove unused flag RTL_FLAG_TASK_RESET_NO_QUEUE_WAKE (jsc#PED-14353).\n- r8169: replace custom flag with disable_work() et al (jsc#PED-14353).\n- r8169: switch away from deprecated pcim_iomap_table (jsc#PED-14353).\n- r8169: use helper r8169_mod_reg8_cond to simplify rtl_jumbo_config (jsc#PED-14353).\n- ring-buffer: Update pages_touched to reflect persistent buffer content (git-fixes).\n- s390/mm: Fix __ptep_rdp() inline assembly (bsc#1253643).\n- sched/fair: Get rid of sched_domains_curr_level hack for tl-\u003ecpumask() (bsc#1246843).\n- sched/fair: Have SD_SERIALIZE affect newidle balancing (bsc#1248792).\n- sched/fair: Proportional newidle balance (bsc#1248792).\n- sched/fair: Proportional newidle balance -KABI (bsc#1248792).\n- sched/fair: Revert max_newidle_lb_cost bump (bsc#1248792).\n- sched/fair: Skip sched_balance_running cmpxchg when balance is not due (bsc#1248792).\n- sched/fair: Small cleanup to sched_balance_newidle() (bsc#1248792).\n- sched/fair: Small cleanup to update_newidle_cost() (bsc#1248792).\n- scsi: lpfc: Add capability to register Platform Name ID to fabric (bsc#1254119).\n- scsi: lpfc: Allow support for BB credit recovery in point-to-point topology (bsc#1254119).\n- scsi: lpfc: Ensure unregistration of rpis for received PLOGIs (bsc#1254119).\n- scsi: lpfc: Fix leaked ndlp krefs when in point-to-point topology (bsc#1254119).\n- scsi: lpfc: Fix reusing an ndlp that is marked NLP_DROPPED during FLOGI (bsc#1254119).\n- scsi: lpfc: Modify kref handling for Fabric Controller ndlps (bsc#1254119).\n- scsi: lpfc: Remove redundant NULL ptr assignment in lpfc_els_free_iocb() (bsc#1254119).\n- scsi: lpfc: Revise discovery related function headers and comments (bsc#1254119).\n- scsi: lpfc: Update lpfc version to 14.4.0.12 (bsc#1254119).\n- scsi: lpfc: Update various NPIV diagnostic log messaging (bsc#1254119).\n- selftests/run_kselftest.sh: Add `--skip` argument option (bsc#1254221).\n- smpboot: introduce SDTL_INIT() helper to tidy sched topology setup (bsc#1246843).\n- soc/tegra: fuse: speedo-tegra210: Update speedo IDs (git-fixes).\n- spi: tegra210-quad: Check hardware status on timeout (bsc#1253155)\n- spi: tegra210-quad: Fix timeout handling (bsc#1253155)\n- spi: tegra210-quad: Refactor error handling into helper functions (bsc#1253155)\n- spi: tegra210-quad: Update dummy sequence configuration (git-fixes)\n- tcp_bpf: Call sk_msg_free() when tcp_bpf_send_verdict() fails to allocate psock-\u003ecork (bsc#1250705).\n- wifi: ath11k: Add quirk entries for Thinkpad T14s Gen3 AMD (bsc#1254181).\n- wifi: mt76: do not add wcid entries to sta poll list during MCU reset (bsc#1254315).\n- wifi: mt76: introduce mt792x_config_mac_addr_list routine (bsc#1254315).\n- wifi: mt76: mt7925: Fix logical vs bitwise typo (bsc#1254315).\n- wifi: mt76: mt7925: Remove unnecessary if-check (bsc#1254315).\n- wifi: mt76: mt7925: Simplify HIF suspend handling to avoid suspend fail (bsc#1254315).\n- wifi: mt76: mt7925: add EHT control support based on the CLC data (bsc#1254315).\n- wifi: mt76: mt7925: add handler to hif suspend/resume event (bsc#1254315).\n- wifi: mt76: mt7925: add pci restore for hibernate (bsc#1254315).\n- wifi: mt76: mt7925: config the dwell time by firmware (bsc#1254315).\n- wifi: mt76: mt7925: extend MCU support for testmode (bsc#1254315).\n- wifi: mt76: mt7925: fix CLC command timeout when suspend/resume (bsc#1254315).\n- wifi: mt76: mt7925: fix missing hdr_trans_tlv command for broadcast wtbl (bsc#1254315).\n- wifi: mt76: mt7925: fix the unfinished command of regd_notifier before suspend (bsc#1254315).\n- wifi: mt76: mt7925: refine the txpower initialization flow (bsc#1254315).\n- wifi: mt76: mt7925: replace zero-length array with flexible-array member (bsc#1254315).\n- wifi: mt76: mt7925: update the channel usage when the regd domain changed (bsc#1254315).\n- wifi: mt76: mt7925e: fix too long of wifi resume time (bsc#1254315).\n- x86/smpboot: avoid SMT domain attach/destroy if SMT is not enabled (bsc#1246843).\n- x86/smpboot: moves x86_topology to static initialize and truncate (bsc#1246843).\n- x86/smpboot: remove redundant CONFIG_SCHED_SMT (bsc#1246843).\n",
"title": "Description of the patch"
},
{
"category": "details",
"text": "SUSE-SL-Micro-6.2-113",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2026_20012-1.json"
},
{
"category": "self",
"summary": "URL for SUSE-SU-2026:20012-1",
"url": "https://www.suse.com/support/update/announcement/2026/suse-su-202620012-1/"
},
{
"category": "self",
"summary": "E-Mail link for SUSE-SU-2026:20012-1",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-January/023715.html"
},
{
"category": "self",
"summary": "SUSE Bug 1235463",
"url": "https://bugzilla.suse.com/1235463"
},
{
"category": "self",
"summary": "SUSE Bug 1243474",
"url": "https://bugzilla.suse.com/1243474"
},
{
"category": "self",
"summary": "SUSE Bug 1245193",
"url": "https://bugzilla.suse.com/1245193"
},
{
"category": "self",
"summary": "SUSE Bug 1245431",
"url": "https://bugzilla.suse.com/1245431"
},
{
"category": "self",
"summary": "SUSE Bug 1245498",
"url": "https://bugzilla.suse.com/1245498"
},
{
"category": "self",
"summary": "SUSE Bug 1245499",
"url": "https://bugzilla.suse.com/1245499"
},
{
"category": "self",
"summary": "SUSE Bug 1246328",
"url": "https://bugzilla.suse.com/1246328"
},
{
"category": "self",
"summary": "SUSE Bug 1246843",
"url": "https://bugzilla.suse.com/1246843"
},
{
"category": "self",
"summary": "SUSE Bug 1247500",
"url": "https://bugzilla.suse.com/1247500"
},
{
"category": "self",
"summary": "SUSE Bug 1248792",
"url": "https://bugzilla.suse.com/1248792"
},
{
"category": "self",
"summary": "SUSE Bug 1249256",
"url": "https://bugzilla.suse.com/1249256"
},
{
"category": "self",
"summary": "SUSE Bug 1249397",
"url": "https://bugzilla.suse.com/1249397"
},
{
"category": "self",
"summary": "SUSE Bug 1249912",
"url": "https://bugzilla.suse.com/1249912"
},
{
"category": "self",
"summary": "SUSE Bug 1249977",
"url": "https://bugzilla.suse.com/1249977"
},
{
"category": "self",
"summary": "SUSE Bug 1249982",
"url": "https://bugzilla.suse.com/1249982"
},
{
"category": "self",
"summary": "SUSE Bug 1250034",
"url": "https://bugzilla.suse.com/1250034"
},
{
"category": "self",
"summary": "SUSE Bug 1250176",
"url": "https://bugzilla.suse.com/1250176"
},
{
"category": "self",
"summary": "SUSE Bug 1250237",
"url": "https://bugzilla.suse.com/1250237"
},
{
"category": "self",
"summary": "SUSE Bug 1250252",
"url": "https://bugzilla.suse.com/1250252"
},
{
"category": "self",
"summary": "SUSE Bug 1250705",
"url": "https://bugzilla.suse.com/1250705"
},
{
"category": "self",
"summary": "SUSE Bug 1250723",
"url": "https://bugzilla.suse.com/1250723"
},
{
"category": "self",
"summary": "SUSE Bug 1250746",
"url": "https://bugzilla.suse.com/1250746"
},
{
"category": "self",
"summary": "SUSE Bug 1251120",
"url": "https://bugzilla.suse.com/1251120"
},
{
"category": "self",
"summary": "SUSE Bug 1251817",
"url": "https://bugzilla.suse.com/1251817"
},
{
"category": "self",
"summary": "SUSE Bug 1252054",
"url": "https://bugzilla.suse.com/1252054"
},
{
"category": "self",
"summary": "SUSE Bug 1252063",
"url": "https://bugzilla.suse.com/1252063"
},
{
"category": "self",
"summary": "SUSE Bug 1252301",
"url": "https://bugzilla.suse.com/1252301"
},
{
"category": "self",
"summary": "SUSE Bug 1252303",
"url": "https://bugzilla.suse.com/1252303"
},
{
"category": "self",
"summary": "SUSE Bug 1252342",
"url": "https://bugzilla.suse.com/1252342"
},
{
"category": "self",
"summary": "SUSE Bug 1252352",
"url": "https://bugzilla.suse.com/1252352"
},
{
"category": "self",
"summary": "SUSE Bug 1252357",
"url": "https://bugzilla.suse.com/1252357"
},
{
"category": "self",
"summary": "SUSE Bug 1252681",
"url": "https://bugzilla.suse.com/1252681"
},
{
"category": "self",
"summary": "SUSE Bug 1252686",
"url": "https://bugzilla.suse.com/1252686"
},
{
"category": "self",
"summary": "SUSE Bug 1252763",
"url": "https://bugzilla.suse.com/1252763"
},
{
"category": "self",
"summary": "SUSE Bug 1252776",
"url": "https://bugzilla.suse.com/1252776"
},
{
"category": "self",
"summary": "SUSE Bug 1252779",
"url": "https://bugzilla.suse.com/1252779"
},
{
"category": "self",
"summary": "SUSE Bug 1252790",
"url": "https://bugzilla.suse.com/1252790"
},
{
"category": "self",
"summary": "SUSE Bug 1252794",
"url": "https://bugzilla.suse.com/1252794"
},
{
"category": "self",
"summary": "SUSE Bug 1252795",
"url": "https://bugzilla.suse.com/1252795"
},
{
"category": "self",
"summary": "SUSE Bug 1252808",
"url": "https://bugzilla.suse.com/1252808"
},
{
"category": "self",
"summary": "SUSE Bug 1252809",
"url": "https://bugzilla.suse.com/1252809"
},
{
"category": "self",
"summary": "SUSE Bug 1252817",
"url": "https://bugzilla.suse.com/1252817"
},
{
"category": "self",
"summary": "SUSE Bug 1252821",
"url": "https://bugzilla.suse.com/1252821"
},
{
"category": "self",
"summary": "SUSE Bug 1252824",
"url": "https://bugzilla.suse.com/1252824"
},
{
"category": "self",
"summary": "SUSE Bug 1252836",
"url": "https://bugzilla.suse.com/1252836"
},
{
"category": "self",
"summary": "SUSE Bug 1252845",
"url": "https://bugzilla.suse.com/1252845"
},
{
"category": "self",
"summary": "SUSE Bug 1252901",
"url": "https://bugzilla.suse.com/1252901"
},
{
"category": "self",
"summary": "SUSE Bug 1252912",
"url": "https://bugzilla.suse.com/1252912"
},
{
"category": "self",
"summary": "SUSE Bug 1252917",
"url": "https://bugzilla.suse.com/1252917"
},
{
"category": "self",
"summary": "SUSE Bug 1252919",
"url": "https://bugzilla.suse.com/1252919"
},
{
"category": "self",
"summary": "SUSE Bug 1252923",
"url": "https://bugzilla.suse.com/1252923"
},
{
"category": "self",
"summary": "SUSE Bug 1252928",
"url": "https://bugzilla.suse.com/1252928"
},
{
"category": "self",
"summary": "SUSE Bug 1253018",
"url": "https://bugzilla.suse.com/1253018"
},
{
"category": "self",
"summary": "SUSE Bug 1253155",
"url": "https://bugzilla.suse.com/1253155"
},
{
"category": "self",
"summary": "SUSE Bug 1253176",
"url": "https://bugzilla.suse.com/1253176"
},
{
"category": "self",
"summary": "SUSE Bug 1253238",
"url": "https://bugzilla.suse.com/1253238"
},
{
"category": "self",
"summary": "SUSE Bug 1253275",
"url": "https://bugzilla.suse.com/1253275"
},
{
"category": "self",
"summary": "SUSE Bug 1253318",
"url": "https://bugzilla.suse.com/1253318"
},
{
"category": "self",
"summary": "SUSE Bug 1253324",
"url": "https://bugzilla.suse.com/1253324"
},
{
"category": "self",
"summary": "SUSE Bug 1253328",
"url": "https://bugzilla.suse.com/1253328"
},
{
"category": "self",
"summary": "SUSE Bug 1253330",
"url": "https://bugzilla.suse.com/1253330"
},
{
"category": "self",
"summary": "SUSE Bug 1253342",
"url": "https://bugzilla.suse.com/1253342"
},
{
"category": "self",
"summary": "SUSE Bug 1253348",
"url": "https://bugzilla.suse.com/1253348"
},
{
"category": "self",
"summary": "SUSE Bug 1253349",
"url": "https://bugzilla.suse.com/1253349"
},
{
"category": "self",
"summary": "SUSE Bug 1253352",
"url": "https://bugzilla.suse.com/1253352"
},
{
"category": "self",
"summary": "SUSE Bug 1253355",
"url": "https://bugzilla.suse.com/1253355"
},
{
"category": "self",
"summary": "SUSE Bug 1253360",
"url": "https://bugzilla.suse.com/1253360"
},
{
"category": "self",
"summary": "SUSE Bug 1253362",
"url": "https://bugzilla.suse.com/1253362"
},
{
"category": "self",
"summary": "SUSE Bug 1253363",
"url": "https://bugzilla.suse.com/1253363"
},
{
"category": "self",
"summary": "SUSE Bug 1253367",
"url": "https://bugzilla.suse.com/1253367"
},
{
"category": "self",
"summary": "SUSE Bug 1253369",
"url": "https://bugzilla.suse.com/1253369"
},
{
"category": "self",
"summary": "SUSE Bug 1253386",
"url": "https://bugzilla.suse.com/1253386"
},
{
"category": "self",
"summary": "SUSE Bug 1253394",
"url": "https://bugzilla.suse.com/1253394"
},
{
"category": "self",
"summary": "SUSE Bug 1253395",
"url": "https://bugzilla.suse.com/1253395"
},
{
"category": "self",
"summary": "SUSE Bug 1253402",
"url": "https://bugzilla.suse.com/1253402"
},
{
"category": "self",
"summary": "SUSE Bug 1253403",
"url": "https://bugzilla.suse.com/1253403"
},
{
"category": "self",
"summary": "SUSE Bug 1253405",
"url": "https://bugzilla.suse.com/1253405"
},
{
"category": "self",
"summary": "SUSE Bug 1253407",
"url": "https://bugzilla.suse.com/1253407"
},
{
"category": "self",
"summary": "SUSE Bug 1253408",
"url": "https://bugzilla.suse.com/1253408"
},
{
"category": "self",
"summary": "SUSE Bug 1253409",
"url": "https://bugzilla.suse.com/1253409"
},
{
"category": "self",
"summary": "SUSE Bug 1253410",
"url": "https://bugzilla.suse.com/1253410"
},
{
"category": "self",
"summary": "SUSE Bug 1253412",
"url": "https://bugzilla.suse.com/1253412"
},
{
"category": "self",
"summary": "SUSE Bug 1253416",
"url": "https://bugzilla.suse.com/1253416"
},
{
"category": "self",
"summary": "SUSE Bug 1253421",
"url": "https://bugzilla.suse.com/1253421"
},
{
"category": "self",
"summary": "SUSE Bug 1253422",
"url": "https://bugzilla.suse.com/1253422"
},
{
"category": "self",
"summary": "SUSE Bug 1253423",
"url": "https://bugzilla.suse.com/1253423"
},
{
"category": "self",
"summary": "SUSE Bug 1253424",
"url": "https://bugzilla.suse.com/1253424"
},
{
"category": "self",
"summary": "SUSE Bug 1253425",
"url": "https://bugzilla.suse.com/1253425"
},
{
"category": "self",
"summary": "SUSE Bug 1253426",
"url": "https://bugzilla.suse.com/1253426"
},
{
"category": "self",
"summary": "SUSE Bug 1253427",
"url": "https://bugzilla.suse.com/1253427"
},
{
"category": "self",
"summary": "SUSE Bug 1253428",
"url": "https://bugzilla.suse.com/1253428"
},
{
"category": "self",
"summary": "SUSE Bug 1253431",
"url": "https://bugzilla.suse.com/1253431"
},
{
"category": "self",
"summary": "SUSE Bug 1253433",
"url": "https://bugzilla.suse.com/1253433"
},
{
"category": "self",
"summary": "SUSE Bug 1253436",
"url": "https://bugzilla.suse.com/1253436"
},
{
"category": "self",
"summary": "SUSE Bug 1253438",
"url": "https://bugzilla.suse.com/1253438"
},
{
"category": "self",
"summary": "SUSE Bug 1253440",
"url": "https://bugzilla.suse.com/1253440"
},
{
"category": "self",
"summary": "SUSE Bug 1253441",
"url": "https://bugzilla.suse.com/1253441"
},
{
"category": "self",
"summary": "SUSE Bug 1253443",
"url": "https://bugzilla.suse.com/1253443"
},
{
"category": "self",
"summary": "SUSE Bug 1253445",
"url": "https://bugzilla.suse.com/1253445"
},
{
"category": "self",
"summary": "SUSE Bug 1253448",
"url": "https://bugzilla.suse.com/1253448"
},
{
"category": "self",
"summary": "SUSE Bug 1253449",
"url": "https://bugzilla.suse.com/1253449"
},
{
"category": "self",
"summary": "SUSE Bug 1253450",
"url": "https://bugzilla.suse.com/1253450"
},
{
"category": "self",
"summary": "SUSE Bug 1253451",
"url": "https://bugzilla.suse.com/1253451"
},
{
"category": "self",
"summary": "SUSE Bug 1253453",
"url": "https://bugzilla.suse.com/1253453"
},
{
"category": "self",
"summary": "SUSE Bug 1253455",
"url": "https://bugzilla.suse.com/1253455"
},
{
"category": "self",
"summary": "SUSE Bug 1253456",
"url": "https://bugzilla.suse.com/1253456"
},
{
"category": "self",
"summary": "SUSE Bug 1253457",
"url": "https://bugzilla.suse.com/1253457"
},
{
"category": "self",
"summary": "SUSE Bug 1253463",
"url": "https://bugzilla.suse.com/1253463"
},
{
"category": "self",
"summary": "SUSE Bug 1253472",
"url": "https://bugzilla.suse.com/1253472"
},
{
"category": "self",
"summary": "SUSE Bug 1253622",
"url": "https://bugzilla.suse.com/1253622"
},
{
"category": "self",
"summary": "SUSE Bug 1253624",
"url": "https://bugzilla.suse.com/1253624"
},
{
"category": "self",
"summary": "SUSE Bug 1253635",
"url": "https://bugzilla.suse.com/1253635"
},
{
"category": "self",
"summary": "SUSE Bug 1253643",
"url": "https://bugzilla.suse.com/1253643"
},
{
"category": "self",
"summary": "SUSE Bug 1253647",
"url": "https://bugzilla.suse.com/1253647"
},
{
"category": "self",
"summary": "SUSE Bug 1254119",
"url": "https://bugzilla.suse.com/1254119"
},
{
"category": "self",
"summary": "SUSE Bug 1254181",
"url": "https://bugzilla.suse.com/1254181"
},
{
"category": "self",
"summary": "SUSE Bug 1254221",
"url": "https://bugzilla.suse.com/1254221"
},
{
"category": "self",
"summary": "SUSE Bug 1254308",
"url": "https://bugzilla.suse.com/1254308"
},
{
"category": "self",
"summary": "SUSE Bug 1254315",
"url": "https://bugzilla.suse.com/1254315"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-50253 page",
"url": "https://www.suse.com/security/cve/CVE-2022-50253/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-37916 page",
"url": "https://www.suse.com/security/cve/CVE-2025-37916/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-38084 page",
"url": "https://www.suse.com/security/cve/CVE-2025-38084/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-38085 page",
"url": "https://www.suse.com/security/cve/CVE-2025-38085/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-38321 page",
"url": "https://www.suse.com/security/cve/CVE-2025-38321/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-38728 page",
"url": "https://www.suse.com/security/cve/CVE-2025-38728/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-39805 page",
"url": "https://www.suse.com/security/cve/CVE-2025-39805/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-39819 page",
"url": "https://www.suse.com/security/cve/CVE-2025-39819/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-39822 page",
"url": "https://www.suse.com/security/cve/CVE-2025-39822/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-39831 page",
"url": "https://www.suse.com/security/cve/CVE-2025-39831/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-39859 page",
"url": "https://www.suse.com/security/cve/CVE-2025-39859/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-39897 page",
"url": "https://www.suse.com/security/cve/CVE-2025-39897/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-39917 page",
"url": "https://www.suse.com/security/cve/CVE-2025-39917/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-39944 page",
"url": "https://www.suse.com/security/cve/CVE-2025-39944/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-39961 page",
"url": "https://www.suse.com/security/cve/CVE-2025-39961/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-39980 page",
"url": "https://www.suse.com/security/cve/CVE-2025-39980/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-39990 page",
"url": "https://www.suse.com/security/cve/CVE-2025-39990/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40001 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40001/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40003 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40003/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40006 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40006/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40021 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40021/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40024 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40024/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40027 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40027/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40031 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40031/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40033 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40033/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40038 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40038/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40047 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40047/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40053 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40053/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40055 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40055/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40059 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40059/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40064 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40064/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40070 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40070/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40074 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40074/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40075 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40075/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40081 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40081/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40083 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40083/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40086 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40086/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40098 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40098/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40101 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40101/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40102 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40102/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40105 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40105/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40107 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40107/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40109 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40109/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40110 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40110/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40111 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40111/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40115 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40115/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40116 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40116/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40118 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40118/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40120 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40120/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40121 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40121/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40127 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40127/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40129 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40129/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40132 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40132/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40133 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40133/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40134 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40134/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40135 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40135/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40139 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40139/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40140 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40140/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40141 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40141/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40142 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40142/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40149 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40149/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40153 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40153/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40154 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40154/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40156 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40156/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40157 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40157/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40158 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40158/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40159 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40159/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40161 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40161/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40162 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40162/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40164 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40164/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40165 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40165/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40166 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40166/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40168 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40168/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40169 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40169/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40171 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40171/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40172 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40172/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40173 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40173/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40175 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40175/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40176 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40176/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40177 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40177/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40178 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40178/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40180 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40180/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40183 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40183/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40185 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40185/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40186 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40186/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40187 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40187/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40188 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40188/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40192 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40192/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40194 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40194/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40196 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40196/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40197 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40197/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40198 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40198/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40200 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40200/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40201 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40201/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40202 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40202/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40203 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40203/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40204 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40204/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40205 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40205/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40206 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40206/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40207 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40207/"
}
],
"title": "Security update for the Linux Kernel",
"tracking": {
"current_release_date": "2025-12-19T16:46:47Z",
"generator": {
"date": "2025-12-19T16:46:47Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "SUSE-SU-2026:20012-1",
"initial_release_date": "2025-12-19T16:46:47Z",
"revision_history": [
{
"date": "2025-12-19T16:46:47Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "kernel-64kb-6.12.0-160000.8.1.aarch64",
"product": {
"name": "kernel-64kb-6.12.0-160000.8.1.aarch64",
"product_id": "kernel-64kb-6.12.0-160000.8.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"product": {
"name": "kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"product_id": "kernel-64kb-devel-6.12.0-160000.8.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-default-6.12.0-160000.8.1.aarch64",
"product": {
"name": "kernel-default-6.12.0-160000.8.1.aarch64",
"product_id": "kernel-default-6.12.0-160000.8.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"product": {
"name": "kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"product_id": "kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-default-devel-6.12.0-160000.8.1.aarch64",
"product": {
"name": "kernel-default-devel-6.12.0-160000.8.1.aarch64",
"product_id": "kernel-default-devel-6.12.0-160000.8.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-default-extra-6.12.0-160000.8.1.aarch64",
"product": {
"name": "kernel-default-extra-6.12.0-160000.8.1.aarch64",
"product_id": "kernel-default-extra-6.12.0-160000.8.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-rt-6.12.0-160000.8.1.aarch64",
"product": {
"name": "kernel-rt-6.12.0-160000.8.1.aarch64",
"product_id": "kernel-rt-6.12.0-160000.8.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"product": {
"name": "kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"product_id": "kernel-rt-devel-6.12.0-160000.8.1.aarch64"
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-devel-6.12.0-160000.8.1.noarch",
"product": {
"name": "kernel-devel-6.12.0-160000.8.1.noarch",
"product_id": "kernel-devel-6.12.0-160000.8.1.noarch"
}
},
{
"category": "product_version",
"name": "kernel-macros-6.12.0-160000.8.1.noarch",
"product": {
"name": "kernel-macros-6.12.0-160000.8.1.noarch",
"product_id": "kernel-macros-6.12.0-160000.8.1.noarch"
}
},
{
"category": "product_version",
"name": "kernel-source-6.12.0-160000.8.1.noarch",
"product": {
"name": "kernel-source-6.12.0-160000.8.1.noarch",
"product_id": "kernel-source-6.12.0-160000.8.1.noarch"
}
}
],
"category": "architecture",
"name": "noarch"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-default-6.12.0-160000.8.1.ppc64le",
"product": {
"name": "kernel-default-6.12.0-160000.8.1.ppc64le",
"product_id": "kernel-default-6.12.0-160000.8.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"product": {
"name": "kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"product_id": "kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"product": {
"name": "kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"product_id": "kernel-default-devel-6.12.0-160000.8.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"product": {
"name": "kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"product_id": "kernel-default-extra-6.12.0-160000.8.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"product": {
"name": "kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"product_id": "kernel-default-livepatch-6.12.0-160000.8.1.ppc64le"
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-default-6.12.0-160000.8.1.s390x",
"product": {
"name": "kernel-default-6.12.0-160000.8.1.s390x",
"product_id": "kernel-default-6.12.0-160000.8.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-default-devel-6.12.0-160000.8.1.s390x",
"product": {
"name": "kernel-default-devel-6.12.0-160000.8.1.s390x",
"product_id": "kernel-default-devel-6.12.0-160000.8.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-default-extra-6.12.0-160000.8.1.s390x",
"product": {
"name": "kernel-default-extra-6.12.0-160000.8.1.s390x",
"product_id": "kernel-default-extra-6.12.0-160000.8.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"product": {
"name": "kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"product_id": "kernel-default-livepatch-6.12.0-160000.8.1.s390x"
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-default-6.12.0-160000.8.1.x86_64",
"product": {
"name": "kernel-default-6.12.0-160000.8.1.x86_64",
"product_id": "kernel-default-6.12.0-160000.8.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"product": {
"name": "kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"product_id": "kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-default-devel-6.12.0-160000.8.1.x86_64",
"product": {
"name": "kernel-default-devel-6.12.0-160000.8.1.x86_64",
"product_id": "kernel-default-devel-6.12.0-160000.8.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-default-extra-6.12.0-160000.8.1.x86_64",
"product": {
"name": "kernel-default-extra-6.12.0-160000.8.1.x86_64",
"product_id": "kernel-default-extra-6.12.0-160000.8.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"product": {
"name": "kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"product_id": "kernel-default-livepatch-6.12.0-160000.8.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-rt-6.12.0-160000.8.1.x86_64",
"product": {
"name": "kernel-rt-6.12.0-160000.8.1.x86_64",
"product_id": "kernel-rt-6.12.0-160000.8.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"product": {
"name": "kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"product_id": "kernel-rt-devel-6.12.0-160000.8.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-rt-livepatch-6.12.0-160000.8.1.x86_64",
"product": {
"name": "kernel-rt-livepatch-6.12.0-160000.8.1.x86_64",
"product_id": "kernel-rt-livepatch-6.12.0-160000.8.1.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "SUSE Linux Micro 6.2",
"product": {
"name": "SUSE Linux Micro 6.2",
"product_id": "SUSE Linux Micro 6.2",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sles:16:16.0:transactional"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-64kb-6.12.0-160000.8.1.aarch64 as component of SUSE Linux Micro 6.2",
"product_id": "SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.8.1.aarch64"
},
"product_reference": "kernel-64kb-6.12.0-160000.8.1.aarch64",
"relates_to_product_reference": "SUSE Linux Micro 6.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-64kb-devel-6.12.0-160000.8.1.aarch64 as component of SUSE Linux Micro 6.2",
"product_id": "SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.8.1.aarch64"
},
"product_reference": "kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"relates_to_product_reference": "SUSE Linux Micro 6.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-6.12.0-160000.8.1.aarch64 as component of SUSE Linux Micro 6.2",
"product_id": "SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.aarch64"
},
"product_reference": "kernel-default-6.12.0-160000.8.1.aarch64",
"relates_to_product_reference": "SUSE Linux Micro 6.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-6.12.0-160000.8.1.ppc64le as component of SUSE Linux Micro 6.2",
"product_id": "SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.ppc64le"
},
"product_reference": "kernel-default-6.12.0-160000.8.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Micro 6.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-6.12.0-160000.8.1.s390x as component of SUSE Linux Micro 6.2",
"product_id": "SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.s390x"
},
"product_reference": "kernel-default-6.12.0-160000.8.1.s390x",
"relates_to_product_reference": "SUSE Linux Micro 6.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-6.12.0-160000.8.1.x86_64 as component of SUSE Linux Micro 6.2",
"product_id": "SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.x86_64"
},
"product_reference": "kernel-default-6.12.0-160000.8.1.x86_64",
"relates_to_product_reference": "SUSE Linux Micro 6.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64 as component of SUSE Linux Micro 6.2",
"product_id": "SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64"
},
"product_reference": "kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"relates_to_product_reference": "SUSE Linux Micro 6.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le as component of SUSE Linux Micro 6.2",
"product_id": "SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le"
},
"product_reference": "kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"relates_to_product_reference": "SUSE Linux Micro 6.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64 as component of SUSE Linux Micro 6.2",
"product_id": "SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64"
},
"product_reference": "kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"relates_to_product_reference": "SUSE Linux Micro 6.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-devel-6.12.0-160000.8.1.aarch64 as component of SUSE Linux Micro 6.2",
"product_id": "SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.aarch64"
},
"product_reference": "kernel-default-devel-6.12.0-160000.8.1.aarch64",
"relates_to_product_reference": "SUSE Linux Micro 6.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-devel-6.12.0-160000.8.1.ppc64le as component of SUSE Linux Micro 6.2",
"product_id": "SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.ppc64le"
},
"product_reference": "kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Micro 6.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-devel-6.12.0-160000.8.1.s390x as component of SUSE Linux Micro 6.2",
"product_id": "SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.s390x"
},
"product_reference": "kernel-default-devel-6.12.0-160000.8.1.s390x",
"relates_to_product_reference": "SUSE Linux Micro 6.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-devel-6.12.0-160000.8.1.x86_64 as component of SUSE Linux Micro 6.2",
"product_id": "SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.x86_64"
},
"product_reference": "kernel-default-devel-6.12.0-160000.8.1.x86_64",
"relates_to_product_reference": "SUSE Linux Micro 6.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-extra-6.12.0-160000.8.1.aarch64 as component of SUSE Linux Micro 6.2",
"product_id": "SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.aarch64"
},
"product_reference": "kernel-default-extra-6.12.0-160000.8.1.aarch64",
"relates_to_product_reference": "SUSE Linux Micro 6.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-extra-6.12.0-160000.8.1.ppc64le as component of SUSE Linux Micro 6.2",
"product_id": "SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.ppc64le"
},
"product_reference": "kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Micro 6.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-extra-6.12.0-160000.8.1.s390x as component of SUSE Linux Micro 6.2",
"product_id": "SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.s390x"
},
"product_reference": "kernel-default-extra-6.12.0-160000.8.1.s390x",
"relates_to_product_reference": "SUSE Linux Micro 6.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-extra-6.12.0-160000.8.1.x86_64 as component of SUSE Linux Micro 6.2",
"product_id": "SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.x86_64"
},
"product_reference": "kernel-default-extra-6.12.0-160000.8.1.x86_64",
"relates_to_product_reference": "SUSE Linux Micro 6.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-livepatch-6.12.0-160000.8.1.ppc64le as component of SUSE Linux Micro 6.2",
"product_id": "SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le"
},
"product_reference": "kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Micro 6.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-livepatch-6.12.0-160000.8.1.s390x as component of SUSE Linux Micro 6.2",
"product_id": "SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.s390x"
},
"product_reference": "kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"relates_to_product_reference": "SUSE Linux Micro 6.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-livepatch-6.12.0-160000.8.1.x86_64 as component of SUSE Linux Micro 6.2",
"product_id": "SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.x86_64"
},
"product_reference": "kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"relates_to_product_reference": "SUSE Linux Micro 6.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-6.12.0-160000.8.1.noarch as component of SUSE Linux Micro 6.2",
"product_id": "SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.8.1.noarch"
},
"product_reference": "kernel-devel-6.12.0-160000.8.1.noarch",
"relates_to_product_reference": "SUSE Linux Micro 6.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-macros-6.12.0-160000.8.1.noarch as component of SUSE Linux Micro 6.2",
"product_id": "SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.8.1.noarch"
},
"product_reference": "kernel-macros-6.12.0-160000.8.1.noarch",
"relates_to_product_reference": "SUSE Linux Micro 6.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-6.12.0-160000.8.1.aarch64 as component of SUSE Linux Micro 6.2",
"product_id": "SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.aarch64"
},
"product_reference": "kernel-rt-6.12.0-160000.8.1.aarch64",
"relates_to_product_reference": "SUSE Linux Micro 6.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-6.12.0-160000.8.1.x86_64 as component of SUSE Linux Micro 6.2",
"product_id": "SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.x86_64"
},
"product_reference": "kernel-rt-6.12.0-160000.8.1.x86_64",
"relates_to_product_reference": "SUSE Linux Micro 6.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-devel-6.12.0-160000.8.1.aarch64 as component of SUSE Linux Micro 6.2",
"product_id": "SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.aarch64"
},
"product_reference": "kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"relates_to_product_reference": "SUSE Linux Micro 6.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-devel-6.12.0-160000.8.1.x86_64 as component of SUSE Linux Micro 6.2",
"product_id": "SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.x86_64"
},
"product_reference": "kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"relates_to_product_reference": "SUSE Linux Micro 6.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-livepatch-6.12.0-160000.8.1.x86_64 as component of SUSE Linux Micro 6.2",
"product_id": "SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.8.1.x86_64"
},
"product_reference": "kernel-rt-livepatch-6.12.0-160000.8.1.x86_64",
"relates_to_product_reference": "SUSE Linux Micro 6.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-source-6.12.0-160000.8.1.noarch as component of SUSE Linux Micro 6.2",
"product_id": "SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.8.1.noarch"
},
"product_reference": "kernel-source-6.12.0-160000.8.1.noarch",
"relates_to_product_reference": "SUSE Linux Micro 6.2"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2022-50253",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-50253"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nbpf: make sure skb-\u003elen != 0 when redirecting to a tunneling device\n\nsyzkaller managed to trigger another case where skb-\u003elen == 0\nwhen we enter __dev_queue_xmit:\n\nWARNING: CPU: 0 PID: 2470 at include/linux/skbuff.h:2576 skb_assert_len include/linux/skbuff.h:2576 [inline]\nWARNING: CPU: 0 PID: 2470 at include/linux/skbuff.h:2576 __dev_queue_xmit+0x2069/0x35e0 net/core/dev.c:4295\n\nCall Trace:\n dev_queue_xmit+0x17/0x20 net/core/dev.c:4406\n __bpf_tx_skb net/core/filter.c:2115 [inline]\n __bpf_redirect_no_mac net/core/filter.c:2140 [inline]\n __bpf_redirect+0x5fb/0xda0 net/core/filter.c:2163\n ____bpf_clone_redirect net/core/filter.c:2447 [inline]\n bpf_clone_redirect+0x247/0x390 net/core/filter.c:2419\n bpf_prog_48159a89cb4a9a16+0x59/0x5e\n bpf_dispatcher_nop_func include/linux/bpf.h:897 [inline]\n __bpf_prog_run include/linux/filter.h:596 [inline]\n bpf_prog_run include/linux/filter.h:603 [inline]\n bpf_test_run+0x46c/0x890 net/bpf/test_run.c:402\n bpf_prog_test_run_skb+0xbdc/0x14c0 net/bpf/test_run.c:1170\n bpf_prog_test_run+0x345/0x3c0 kernel/bpf/syscall.c:3648\n __sys_bpf+0x43a/0x6c0 kernel/bpf/syscall.c:5005\n __do_sys_bpf kernel/bpf/syscall.c:5091 [inline]\n __se_sys_bpf kernel/bpf/syscall.c:5089 [inline]\n __x64_sys_bpf+0x7c/0x90 kernel/bpf/syscall.c:5089\n do_syscall_64+0x54/0x70 arch/x86/entry/common.c:48\n entry_SYSCALL_64_after_hwframe+0x61/0xc6\n\nThe reproducer doesn\u0027t really reproduce outside of syzkaller\nenvironment, so I\u0027m taking a guess here. It looks like we\ndo generate correct ETH_HLEN-sized packet, but we redirect\nthe packet to the tunneling device. Before we do so, we\n__skb_pull l2 header and arrive again at skb-\u003elen == 0.\nDoesn\u0027t seem like we can do anything better than having\nan explicit check after __skb_pull?",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.8.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-50253",
"url": "https://www.suse.com/security/cve/CVE-2022-50253"
},
{
"category": "external",
"summary": "SUSE Bug 1249912 for CVE-2022-50253",
"url": "https://bugzilla.suse.com/1249912"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.8.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.8.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-19T16:46:47Z",
"details": "moderate"
}
],
"title": "CVE-2022-50253"
},
{
"cve": "CVE-2025-37916",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-37916"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\npds_core: remove write-after-free of client_id\n\nA use-after-free error popped up in stress testing:\n\n[Mon Apr 21 21:21:33 2025] BUG: KFENCE: use-after-free write in pdsc_auxbus_dev_del+0xef/0x160 [pds_core]\n[Mon Apr 21 21:21:33 2025] Use-after-free write at 0x000000007013ecd1 (in kfence-#47):\n[Mon Apr 21 21:21:33 2025] pdsc_auxbus_dev_del+0xef/0x160 [pds_core]\n[Mon Apr 21 21:21:33 2025] pdsc_remove+0xc0/0x1b0 [pds_core]\n[Mon Apr 21 21:21:33 2025] pci_device_remove+0x24/0x70\n[Mon Apr 21 21:21:33 2025] device_release_driver_internal+0x11f/0x180\n[Mon Apr 21 21:21:33 2025] driver_detach+0x45/0x80\n[Mon Apr 21 21:21:33 2025] bus_remove_driver+0x83/0xe0\n[Mon Apr 21 21:21:33 2025] pci_unregister_driver+0x1a/0x80\n\nThe actual device uninit usually happens on a separate thread\nscheduled after this code runs, but there is no guarantee of order\nof thread execution, so this could be a problem. There\u0027s no\nactual need to clear the client_id at this point, so simply\nremove the offending code.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.8.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-37916",
"url": "https://www.suse.com/security/cve/CVE-2025-37916"
},
{
"category": "external",
"summary": "SUSE Bug 1243474 for CVE-2025-37916",
"url": "https://bugzilla.suse.com/1243474"
},
{
"category": "external",
"summary": "SUSE Bug 1243535 for CVE-2025-37916",
"url": "https://bugzilla.suse.com/1243535"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.8.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.8.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-19T16:46:47Z",
"details": "moderate"
}
],
"title": "CVE-2025-37916"
},
{
"cve": "CVE-2025-38084",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-38084"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nmm/hugetlb: unshare page tables during VMA split, not before\n\nCurrently, __split_vma() triggers hugetlb page table unsharing through\nvm_ops-\u003emay_split(). This happens before the VMA lock and rmap locks are\ntaken - which is too early, it allows racing VMA-locked page faults in our\nprocess and racing rmap walks from other processes to cause page tables to\nbe shared again before we actually perform the split.\n\nFix it by explicitly calling into the hugetlb unshare logic from\n__split_vma() in the same place where THP splitting also happens. At that\npoint, both the VMA and the rmap(s) are write-locked.\n\nAn annoying detail is that we can now call into the helper\nhugetlb_unshare_pmds() from two different locking contexts:\n\n1. from hugetlb_split(), holding:\n - mmap lock (exclusively)\n - VMA lock\n - file rmap lock (exclusively)\n2. hugetlb_unshare_all_pmds(), which I think is designed to be able to\n call us with only the mmap lock held (in shared mode), but currently\n only runs while holding mmap lock (exclusively) and VMA lock\n\nBackporting note:\nThis commit fixes a racy protection that was introduced in commit\nb30c14cd6102 (\"hugetlb: unshare some PMDs when splitting VMAs\"); that\ncommit claimed to fix an issue introduced in 5.13, but it should actually\nalso go all the way back.\n\n[jannh@google.com: v2]",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.8.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-38084",
"url": "https://www.suse.com/security/cve/CVE-2025-38084"
},
{
"category": "external",
"summary": "SUSE Bug 1245498 for CVE-2025-38084",
"url": "https://bugzilla.suse.com/1245498"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.8.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.8,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.8.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-19T16:46:47Z",
"details": "moderate"
}
],
"title": "CVE-2025-38084"
},
{
"cve": "CVE-2025-38085",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-38085"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nmm/hugetlb: fix huge_pmd_unshare() vs GUP-fast race\n\nhuge_pmd_unshare() drops a reference on a page table that may have\npreviously been shared across processes, potentially turning it into a\nnormal page table used in another process in which unrelated VMAs can\nafterwards be installed.\n\nIf this happens in the middle of a concurrent gup_fast(), gup_fast() could\nend up walking the page tables of another process. While I don\u0027t see any\nway in which that immediately leads to kernel memory corruption, it is\nreally weird and unexpected.\n\nFix it with an explicit broadcast IPI through tlb_remove_table_sync_one(),\njust like we do in khugepaged when removing page tables for a THP\ncollapse.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.8.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-38085",
"url": "https://www.suse.com/security/cve/CVE-2025-38085"
},
{
"category": "external",
"summary": "SUSE Bug 1245499 for CVE-2025-38085",
"url": "https://bugzilla.suse.com/1245499"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.8.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.6,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.8.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-19T16:46:47Z",
"details": "moderate"
}
],
"title": "CVE-2025-38085"
},
{
"cve": "CVE-2025-38321",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-38321"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nsmb: Log an error when close_all_cached_dirs fails\n\nUnder low-memory conditions, close_all_cached_dirs() can\u0027t move the\ndentries to a separate list to dput() them once the locks are dropped.\nThis will result in a \"Dentry still in use\" error, so add an error\nmessage that makes it clear this is what happened:\n\n[ 495.281119] CIFS: VFS: \\\\otters.example.com\\share Out of memory while dropping dentries\n[ 495.281595] ------------[ cut here ]------------\n[ 495.281887] BUG: Dentry ffff888115531138{i=78,n=/} still in use (2) [unmount of cifs cifs]\n[ 495.282391] WARNING: CPU: 1 PID: 2329 at fs/dcache.c:1536 umount_check+0xc8/0xf0\n\nAlso, bail out of looping through all tcons as soon as a single\nallocation fails, since we\u0027re already in trouble, and kmalloc() attempts\nfor subseqeuent tcons are likely to fail just like the first one did.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.8.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-38321",
"url": "https://www.suse.com/security/cve/CVE-2025-38321"
},
{
"category": "external",
"summary": "SUSE Bug 1246328 for CVE-2025-38321",
"url": "https://bugzilla.suse.com/1246328"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.8.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.8.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-19T16:46:47Z",
"details": "moderate"
}
],
"title": "CVE-2025-38321"
},
{
"cve": "CVE-2025-38728",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-38728"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nsmb3: fix for slab out of bounds on mount to ksmbd\n\nWith KASAN enabled, it is possible to get a slab out of bounds\nduring mount to ksmbd due to missing check in parse_server_interfaces()\n(see below):\n\n BUG: KASAN: slab-out-of-bounds in\n parse_server_interfaces+0x14ee/0x1880 [cifs]\n Read of size 4 at addr ffff8881433dba98 by task mount/9827\n\n CPU: 5 UID: 0 PID: 9827 Comm: mount Tainted: G\n OE 6.16.0-rc2-kasan #2 PREEMPT(voluntary)\n Tainted: [O]=OOT_MODULE, [E]=UNSIGNED_MODULE\n Hardware name: Dell Inc. Precision Tower 3620/0MWYPT,\n BIOS 2.13.1 06/14/2019\n Call Trace:\n \u003cTASK\u003e\n dump_stack_lvl+0x9f/0xf0\n print_report+0xd1/0x670\n __virt_addr_valid+0x22c/0x430\n ? parse_server_interfaces+0x14ee/0x1880 [cifs]\n ? kasan_complete_mode_report_info+0x2a/0x1f0\n ? parse_server_interfaces+0x14ee/0x1880 [cifs]\n kasan_report+0xd6/0x110\n parse_server_interfaces+0x14ee/0x1880 [cifs]\n __asan_report_load_n_noabort+0x13/0x20\n parse_server_interfaces+0x14ee/0x1880 [cifs]\n ? __pfx_parse_server_interfaces+0x10/0x10 [cifs]\n ? trace_hardirqs_on+0x51/0x60\n SMB3_request_interfaces+0x1ad/0x3f0 [cifs]\n ? __pfx_SMB3_request_interfaces+0x10/0x10 [cifs]\n ? SMB2_tcon+0x23c/0x15d0 [cifs]\n smb3_qfs_tcon+0x173/0x2b0 [cifs]\n ? __pfx_smb3_qfs_tcon+0x10/0x10 [cifs]\n ? cifs_get_tcon+0x105d/0x2120 [cifs]\n ? do_raw_spin_unlock+0x5d/0x200\n ? cifs_get_tcon+0x105d/0x2120 [cifs]\n ? __pfx_smb3_qfs_tcon+0x10/0x10 [cifs]\n cifs_mount_get_tcon+0x369/0xb90 [cifs]\n ? dfs_cache_find+0xe7/0x150 [cifs]\n dfs_mount_share+0x985/0x2970 [cifs]\n ? check_path.constprop.0+0x28/0x50\n ? save_trace+0x54/0x370\n ? __pfx_dfs_mount_share+0x10/0x10 [cifs]\n ? __lock_acquire+0xb82/0x2ba0\n ? __kasan_check_write+0x18/0x20\n cifs_mount+0xbc/0x9e0 [cifs]\n ? __pfx_cifs_mount+0x10/0x10 [cifs]\n ? do_raw_spin_unlock+0x5d/0x200\n ? cifs_setup_cifs_sb+0x29d/0x810 [cifs]\n cifs_smb3_do_mount+0x263/0x1990 [cifs]",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.8.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-38728",
"url": "https://www.suse.com/security/cve/CVE-2025-38728"
},
{
"category": "external",
"summary": "SUSE Bug 1249256 for CVE-2025-38728",
"url": "https://bugzilla.suse.com/1249256"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.8.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.8.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-19T16:46:47Z",
"details": "moderate"
}
],
"title": "CVE-2025-38728"
},
{
"cve": "CVE-2025-39805",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-39805"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnet: macb: fix unregister_netdev call order in macb_remove()\n\nWhen removing a macb device, the driver calls phy_exit() before\nunregister_netdev(). This leads to a WARN from kernfs:\n\n ------------[ cut here ]------------\n kernfs: can not remove \u0027attached_dev\u0027, no directory\n WARNING: CPU: 1 PID: 27146 at fs/kernfs/dir.c:1683\n Call trace:\n kernfs_remove_by_name_ns+0xd8/0xf0\n sysfs_remove_link+0x24/0x58\n phy_detach+0x5c/0x168\n phy_disconnect+0x4c/0x70\n phylink_disconnect_phy+0x6c/0xc0 [phylink]\n macb_close+0x6c/0x170 [macb]\n ...\n macb_remove+0x60/0x168 [macb]\n platform_remove+0x5c/0x80\n ...\n\nThe warning happens because the PHY is being exited while the netdev\nis still registered. The correct order is to unregister the netdev\nbefore shutting down the PHY and cleaning up the MDIO bus.\n\nFix this by moving unregister_netdev() ahead of phy_exit() in\nmacb_remove().",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.8.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-39805",
"url": "https://www.suse.com/security/cve/CVE-2025-39805"
},
{
"category": "external",
"summary": "SUSE Bug 1249982 for CVE-2025-39805",
"url": "https://bugzilla.suse.com/1249982"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.8.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.8.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-19T16:46:47Z",
"details": "moderate"
}
],
"title": "CVE-2025-39805"
},
{
"cve": "CVE-2025-39819",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-39819"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nfs/smb: Fix inconsistent refcnt update\n\nA possible inconsistent update of refcount was identified in `smb2_compound_op`.\nSuch inconsistent update could lead to possible resource leaks.\n\nWhy it is a possible bug:\n1. In the comment section of the function, it clearly states that the\nreference to `cfile` should be dropped after calling this function.\n2. Every control flow path would check and drop the reference to\n`cfile`, except the patched one.\n3. Existing callers would not handle refcount update of `cfile` if\n-ENOMEM is returned.\n\nTo fix the bug, an extra goto label \"out\" is added, to make sure that the\ncleanup logic would always be respected. As the problem is caused by the\nallocation failure of `vars`, the cleanup logic between label \"finished\"\nand \"out\" can be safely ignored. According to the definition of function\n`is_replayable_error`, the error code of \"-ENOMEM\" is not recoverable.\nTherefore, the replay logic also gets ignored.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.8.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-39819",
"url": "https://www.suse.com/security/cve/CVE-2025-39819"
},
{
"category": "external",
"summary": "SUSE Bug 1250176 for CVE-2025-39819",
"url": "https://bugzilla.suse.com/1250176"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.8.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.8.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-19T16:46:47Z",
"details": "moderate"
}
],
"title": "CVE-2025-39819"
},
{
"cve": "CVE-2025-39822",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-39822"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nio_uring/kbuf: fix signedness in this_len calculation\n\nWhen importing and using buffers, buf-\u003elen is considered unsigned.\nHowever, buf-\u003elen is converted to signed int when committing. This can\nlead to unexpected behavior if the buffer is large enough to be\ninterpreted as a negative value. Make min_t calculation unsigned.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.8.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-39822",
"url": "https://www.suse.com/security/cve/CVE-2025-39822"
},
{
"category": "external",
"summary": "SUSE Bug 1250034 for CVE-2025-39822",
"url": "https://bugzilla.suse.com/1250034"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.8.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.8.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-19T16:46:47Z",
"details": "moderate"
}
],
"title": "CVE-2025-39822"
},
{
"cve": "CVE-2025-39831",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-39831"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nfbnic: Move phylink resume out of service_task and into open/close\n\nThe fbnic driver was presenting with the following locking assert coming\nout of a PM resume:\n[ 42.208116][ T164] RTNL: assertion failed at drivers/net/phy/phylink.c (2611)\n[ 42.208492][ T164] WARNING: CPU: 1 PID: 164 at drivers/net/phy/phylink.c:2611 phylink_resume+0x190/0x1e0\n[ 42.208872][ T164] Modules linked in:\n[ 42.209140][ T164] CPU: 1 UID: 0 PID: 164 Comm: bash Not tainted 6.17.0-rc2-virtme #134 PREEMPT(full)\n[ 42.209496][ T164] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.17.0-5.fc42 04/01/2014\n[ 42.209861][ T164] RIP: 0010:phylink_resume+0x190/0x1e0\n[ 42.210057][ T164] Code: 83 e5 01 0f 85 b0 fe ff ff c6 05 1c cd 3e 02 01 90 ba 33 0a 00 00 48 c7 c6 20 3a 1d a5 48 c7 c7 e0 3e 1d a5 e8 21 b8 90 fe 90 \u003c0f\u003e 0b 90 90 e9 86 fe ff ff e8 42 ea 1f ff e9 e2 fe ff ff 48 89 ef\n[ 42.210708][ T164] RSP: 0018:ffffc90000affbd8 EFLAGS: 00010296\n[ 42.210983][ T164] RAX: 0000000000000000 RBX: ffff8880078d8400 RCX: 0000000000000000\n[ 42.211235][ T164] RDX: 0000000000000000 RSI: 1ffffffff4f10938 RDI: 0000000000000001\n[ 42.211466][ T164] RBP: 0000000000000000 R08: ffffffffa2ae79ea R09: fffffbfff4b3eb84\n[ 42.211707][ T164] R10: 0000000000000003 R11: 0000000000000000 R12: ffff888007ad8000\n[ 42.211997][ T164] R13: 0000000000000002 R14: ffff888006a18800 R15: ffffffffa34c59e0\n[ 42.212234][ T164] FS: 00007f0dc8e39740(0000) GS:ffff88808f51f000(0000) knlGS:0000000000000000\n[ 42.212505][ T164] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033\n[ 42.212704][ T164] CR2: 00007f0dc8e9fe10 CR3: 000000000b56d003 CR4: 0000000000772ef0\n[ 42.213227][ T164] PKRU: 55555554\n[ 42.213366][ T164] Call Trace:\n[ 42.213483][ T164] \u003cTASK\u003e\n[ 42.213565][ T164] __fbnic_pm_attach.isra.0+0x8e/0xa0\n[ 42.213725][ T164] pci_reset_function+0x116/0x1d0\n[ 42.213895][ T164] reset_store+0xa0/0x100\n[ 42.214025][ T164] ? pci_dev_reset_attr_is_visible+0x50/0x50\n[ 42.214221][ T164] ? sysfs_file_kobj+0xc1/0x1e0\n[ 42.214374][ T164] ? sysfs_kf_write+0x65/0x160\n[ 42.214526][ T164] kernfs_fop_write_iter+0x2f8/0x4c0\n[ 42.214677][ T164] ? kernfs_vma_page_mkwrite+0x1f0/0x1f0\n[ 42.214836][ T164] new_sync_write+0x308/0x6f0\n[ 42.214987][ T164] ? __lock_acquire+0x34c/0x740\n[ 42.215135][ T164] ? new_sync_read+0x6f0/0x6f0\n[ 42.215288][ T164] ? lock_acquire.part.0+0xbc/0x260\n[ 42.215440][ T164] ? ksys_write+0xff/0x200\n[ 42.215590][ T164] ? perf_trace_sched_switch+0x6d0/0x6d0\n[ 42.215742][ T164] vfs_write+0x65e/0xbb0\n[ 42.215876][ T164] ksys_write+0xff/0x200\n[ 42.215994][ T164] ? __ia32_sys_read+0xc0/0xc0\n[ 42.216141][ T164] ? do_user_addr_fault+0x269/0x9f0\n[ 42.216292][ T164] ? rcu_is_watching+0x15/0xd0\n[ 42.216442][ T164] do_syscall_64+0xbb/0x360\n[ 42.216591][ T164] entry_SYSCALL_64_after_hwframe+0x4b/0x53\n[ 42.216784][ T164] RIP: 0033:0x7f0dc8ea9986\n\nA bit of digging showed that we were invoking the phylink_resume as a part\nof the fbnic_up path when we were enabling the service task while not\nholding the RTNL lock. We should be enabling this sooner as a part of the\nndo_open path and then just letting the service task come online later.\nThis will help to enforce the correct locking and brings the phylink\ninterface online at the same time as the network interface, instead of at a\nlater time.\n\nI tested this on QEMU to verify this was working by putting the system to\nsleep using \"echo mem \u003e /sys/power/state\" to put the system to sleep in the\nguest and then using the command \"system_wakeup\" in the QEMU monitor.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.8.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-39831",
"url": "https://www.suse.com/security/cve/CVE-2025-39831"
},
{
"category": "external",
"summary": "SUSE Bug 1249977 for CVE-2025-39831",
"url": "https://bugzilla.suse.com/1249977"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.8.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.8.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-19T16:46:47Z",
"details": "moderate"
}
],
"title": "CVE-2025-39831"
},
{
"cve": "CVE-2025-39859",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-39859"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nptp: ocp: fix use-after-free bugs causing by ptp_ocp_watchdog\n\nThe ptp_ocp_detach() only shuts down the watchdog timer if it is\npending. However, if the timer handler is already running, the\ntimer_delete_sync() is not called. This leads to race conditions\nwhere the devlink that contains the ptp_ocp is deallocated while\nthe timer handler is still accessing it, resulting in use-after-free\nbugs. The following details one of the race scenarios.\n\n(thread 1) | (thread 2)\nptp_ocp_remove() |\n ptp_ocp_detach() | ptp_ocp_watchdog()\n if (timer_pending(\u0026bp-\u003ewatchdog))| bp = timer_container_of()\n timer_delete_sync() |\n |\n devlink_free(devlink) //free |\n | bp-\u003e //use\n\nResolve this by unconditionally calling timer_delete_sync() to ensure\nthe timer is reliably deactivated, preventing any access after free.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.8.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-39859",
"url": "https://www.suse.com/security/cve/CVE-2025-39859"
},
{
"category": "external",
"summary": "SUSE Bug 1250252 for CVE-2025-39859",
"url": "https://bugzilla.suse.com/1250252"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.8.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.8.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-19T16:46:47Z",
"details": "moderate"
}
],
"title": "CVE-2025-39859"
},
{
"cve": "CVE-2025-39897",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-39897"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnet: xilinx: axienet: Add error handling for RX metadata pointer retrieval\n\nAdd proper error checking for dmaengine_desc_get_metadata_ptr() which\ncan return an error pointer and lead to potential crashes or undefined\nbehaviour if the pointer retrieval fails.\n\nProperly handle the error by unmapping DMA buffer, freeing the skb and\nreturning early to prevent further processing with invalid data.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.8.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-39897",
"url": "https://www.suse.com/security/cve/CVE-2025-39897"
},
{
"category": "external",
"summary": "SUSE Bug 1250746 for CVE-2025-39897",
"url": "https://bugzilla.suse.com/1250746"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.8.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.6,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.8.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-19T16:46:47Z",
"details": "moderate"
}
],
"title": "CVE-2025-39897"
},
{
"cve": "CVE-2025-39917",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-39917"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nbpf: Fix out-of-bounds dynptr write in bpf_crypto_crypt\n\nStanislav reported that in bpf_crypto_crypt() the destination dynptr\u0027s\nsize is not validated to be at least as large as the source dynptr\u0027s\nsize before calling into the crypto backend with \u0027len = src_len\u0027. This\ncan result in an OOB write when the destination is smaller than the\nsource.\n\nConcretely, in mentioned function, psrc and pdst are both linear\nbuffers fetched from each dynptr:\n\n psrc = __bpf_dynptr_data(src, src_len);\n [...]\n pdst = __bpf_dynptr_data_rw(dst, dst_len);\n [...]\n err = decrypt ?\n ctx-\u003etype-\u003edecrypt(ctx-\u003etfm, psrc, pdst, src_len, piv) :\n ctx-\u003etype-\u003eencrypt(ctx-\u003etfm, psrc, pdst, src_len, piv);\n\nThe crypto backend expects pdst to be large enough with a src_len length\nthat can be written. Add an additional src_len \u003e dst_len check and bail\nout if it\u0027s the case. Note that these kfuncs are accessible under root\nprivileges only.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.8.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-39917",
"url": "https://www.suse.com/security/cve/CVE-2025-39917"
},
{
"category": "external",
"summary": "SUSE Bug 1250723 for CVE-2025-39917",
"url": "https://bugzilla.suse.com/1250723"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.8.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.8.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-19T16:46:47Z",
"details": "moderate"
}
],
"title": "CVE-2025-39917"
},
{
"cve": "CVE-2025-39944",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-39944"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nocteontx2-pf: Fix use-after-free bugs in otx2_sync_tstamp()\n\nThe original code relies on cancel_delayed_work() in otx2_ptp_destroy(),\nwhich does not ensure that the delayed work item synctstamp_work has fully\ncompleted if it was already running. This leads to use-after-free scenarios\nwhere otx2_ptp is deallocated by otx2_ptp_destroy(), while synctstamp_work\nremains active and attempts to dereference otx2_ptp in otx2_sync_tstamp().\nFurthermore, the synctstamp_work is cyclic, the likelihood of triggering\nthe bug is nonnegligible.\n\nA typical race condition is illustrated below:\n\nCPU 0 (cleanup) | CPU 1 (delayed work callback)\notx2_remove() |\n otx2_ptp_destroy() | otx2_sync_tstamp()\n cancel_delayed_work() |\n kfree(ptp) |\n | ptp = container_of(...); //UAF\n | ptp-\u003e //UAF\n\nThis is confirmed by a KASAN report:\n\nBUG: KASAN: slab-use-after-free in __run_timer_base.part.0+0x7d7/0x8c0\nWrite of size 8 at addr ffff88800aa09a18 by task bash/136\n...\nCall Trace:\n \u003cIRQ\u003e\n dump_stack_lvl+0x55/0x70\n print_report+0xcf/0x610\n ? __run_timer_base.part.0+0x7d7/0x8c0\n kasan_report+0xb8/0xf0\n ? __run_timer_base.part.0+0x7d7/0x8c0\n __run_timer_base.part.0+0x7d7/0x8c0\n ? __pfx___run_timer_base.part.0+0x10/0x10\n ? __pfx_read_tsc+0x10/0x10\n ? ktime_get+0x60/0x140\n ? lapic_next_event+0x11/0x20\n ? clockevents_program_event+0x1d4/0x2a0\n run_timer_softirq+0xd1/0x190\n handle_softirqs+0x16a/0x550\n irq_exit_rcu+0xaf/0xe0\n sysvec_apic_timer_interrupt+0x70/0x80\n \u003c/IRQ\u003e\n...\nAllocated by task 1:\n kasan_save_stack+0x24/0x50\n kasan_save_track+0x14/0x30\n __kasan_kmalloc+0x7f/0x90\n otx2_ptp_init+0xb1/0x860\n otx2_probe+0x4eb/0xc30\n local_pci_probe+0xdc/0x190\n pci_device_probe+0x2fe/0x470\n really_probe+0x1ca/0x5c0\n __driver_probe_device+0x248/0x310\n driver_probe_device+0x44/0x120\n __driver_attach+0xd2/0x310\n bus_for_each_dev+0xed/0x170\n bus_add_driver+0x208/0x500\n driver_register+0x132/0x460\n do_one_initcall+0x89/0x300\n kernel_init_freeable+0x40d/0x720\n kernel_init+0x1a/0x150\n ret_from_fork+0x10c/0x1a0\n ret_from_fork_asm+0x1a/0x30\n\nFreed by task 136:\n kasan_save_stack+0x24/0x50\n kasan_save_track+0x14/0x30\n kasan_save_free_info+0x3a/0x60\n __kasan_slab_free+0x3f/0x50\n kfree+0x137/0x370\n otx2_ptp_destroy+0x38/0x80\n otx2_remove+0x10d/0x4c0\n pci_device_remove+0xa6/0x1d0\n device_release_driver_internal+0xf8/0x210\n pci_stop_bus_device+0x105/0x150\n pci_stop_and_remove_bus_device_locked+0x15/0x30\n remove_store+0xcc/0xe0\n kernfs_fop_write_iter+0x2c3/0x440\n vfs_write+0x871/0xd70\n ksys_write+0xee/0x1c0\n do_syscall_64+0xac/0x280\n entry_SYSCALL_64_after_hwframe+0x77/0x7f\n...\n\nReplace cancel_delayed_work() with cancel_delayed_work_sync() to ensure\nthat the delayed work item is properly canceled before the otx2_ptp is\ndeallocated.\n\nThis bug was initially identified through static analysis. To reproduce\nand test it, I simulated the OcteonTX2 PCI device in QEMU and introduced\nartificial delays within the otx2_sync_tstamp() function to increase the\nlikelihood of triggering the bug.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.8.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-39944",
"url": "https://www.suse.com/security/cve/CVE-2025-39944"
},
{
"category": "external",
"summary": "SUSE Bug 1251120 for CVE-2025-39944",
"url": "https://bugzilla.suse.com/1251120"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.8.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.8.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-19T16:46:47Z",
"details": "moderate"
}
],
"title": "CVE-2025-39944"
},
{
"cve": "CVE-2025-39961",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-39961"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\niommu/amd/pgtbl: Fix possible race while increase page table level\n\nThe AMD IOMMU host page table implementation supports dynamic page table levels\n(up to 6 levels), starting with a 3-level configuration that expands based on\nIOVA address. The kernel maintains a root pointer and current page table level\nto enable proper page table walks in alloc_pte()/fetch_pte() operations.\n\nThe IOMMU IOVA allocator initially starts with 32-bit address and onces its\nexhuasted it switches to 64-bit address (max address is determined based\non IOMMU and device DMA capability). To support larger IOVA, AMD IOMMU\ndriver increases page table level.\n\nBut in unmap path (iommu_v1_unmap_pages()), fetch_pte() reads\npgtable-\u003e[root/mode] without lock. So its possible that in exteme corner case,\nwhen increase_address_space() is updating pgtable-\u003e[root/mode], fetch_pte()\nreads wrong page table level (pgtable-\u003emode). It does compare the value with\nlevel encoded in page table and returns NULL. This will result is\niommu_unmap ops to fail and upper layer may retry/log WARN_ON.\n\nCPU 0 CPU 1\n------ ------\nmap pages unmap pages\nalloc_pte() -\u003e increase_address_space() iommu_v1_unmap_pages() -\u003e fetch_pte()\n pgtable-\u003eroot = pte (new root value)\n READ pgtable-\u003e[mode/root]\n\t\t\t\t\t Reads new root, old mode\n Updates mode (pgtable-\u003emode += 1)\n\nSince Page table level updates are infrequent and already synchronized with a\nspinlock, implement seqcount to enable lock-free read operations on the read path.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.8.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-39961",
"url": "https://www.suse.com/security/cve/CVE-2025-39961"
},
{
"category": "external",
"summary": "SUSE Bug 1251817 for CVE-2025-39961",
"url": "https://bugzilla.suse.com/1251817"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.8.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.8,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.8.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-19T16:46:47Z",
"details": "moderate"
}
],
"title": "CVE-2025-39961"
},
{
"cve": "CVE-2025-39980",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-39980"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnexthop: Forbid FDB status change while nexthop is in a group\n\nThe kernel forbids the creation of non-FDB nexthop groups with FDB\nnexthops:\n\n # ip nexthop add id 1 via 192.0.2.1 fdb\n # ip nexthop add id 2 group 1\n Error: Non FDB nexthop group cannot have fdb nexthops.\n\nAnd vice versa:\n\n # ip nexthop add id 3 via 192.0.2.2 dev dummy1\n # ip nexthop add id 4 group 3 fdb\n Error: FDB nexthop group can only have fdb nexthops.\n\nHowever, as long as no routes are pointing to a non-FDB nexthop group,\nthe kernel allows changing the type of a nexthop from FDB to non-FDB and\nvice versa:\n\n # ip nexthop add id 5 via 192.0.2.2 dev dummy1\n # ip nexthop add id 6 group 5\n # ip nexthop replace id 5 via 192.0.2.2 fdb\n # echo $?\n 0\n\nThis configuration is invalid and can result in a NPD [1] since FDB\nnexthops are not associated with a nexthop device:\n\n # ip route add 198.51.100.1/32 nhid 6\n # ping 198.51.100.1\n\nFix by preventing nexthop FDB status change while the nexthop is in a\ngroup:\n\n # ip nexthop add id 7 via 192.0.2.2 dev dummy1\n # ip nexthop add id 8 group 7\n # ip nexthop replace id 7 via 192.0.2.2 fdb\n Error: Cannot change nexthop FDB status while in a group.\n\n[1]\nBUG: kernel NULL pointer dereference, address: 00000000000003c0\n[...]\nOops: Oops: 0000 [#1] SMP\nCPU: 6 UID: 0 PID: 367 Comm: ping Not tainted 6.17.0-rc6-virtme-gb65678cacc03 #1 PREEMPT(voluntary)\nHardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.17.0-4.fc41 04/01/2014\nRIP: 0010:fib_lookup_good_nhc+0x1e/0x80\n[...]\nCall Trace:\n \u003cTASK\u003e\n fib_table_lookup+0x541/0x650\n ip_route_output_key_hash_rcu+0x2ea/0x970\n ip_route_output_key_hash+0x55/0x80\n __ip4_datagram_connect+0x250/0x330\n udp_connect+0x2b/0x60\n __sys_connect+0x9c/0xd0\n __x64_sys_connect+0x18/0x20\n do_syscall_64+0xa4/0x2a0\n entry_SYSCALL_64_after_hwframe+0x4b/0x53",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.8.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-39980",
"url": "https://www.suse.com/security/cve/CVE-2025-39980"
},
{
"category": "external",
"summary": "SUSE Bug 1252063 for CVE-2025-39980",
"url": "https://bugzilla.suse.com/1252063"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.8.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.8.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-19T16:46:47Z",
"details": "moderate"
}
],
"title": "CVE-2025-39980"
},
{
"cve": "CVE-2025-39990",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-39990"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nbpf: Check the helper function is valid in get_helper_proto\n\nkernel test robot reported verifier bug [1] where the helper func\npointer could be NULL due to disabled config option.\n\nAs Alexei suggested we could check on that in get_helper_proto\ndirectly. Marking tail_call helper func with BPF_PTR_POISON,\nbecause it is unused by design.\n\n [1] https://lore.kernel.org/oe-lkp/202507160818.68358831-lkp@intel.com",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.8.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-39990",
"url": "https://www.suse.com/security/cve/CVE-2025-39990"
},
{
"category": "external",
"summary": "SUSE Bug 1252054 for CVE-2025-39990",
"url": "https://bugzilla.suse.com/1252054"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.8.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.8.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-19T16:46:47Z",
"details": "moderate"
}
],
"title": "CVE-2025-39990"
},
{
"cve": "CVE-2025-40001",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40001"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nscsi: mvsas: Fix use-after-free bugs in mvs_work_queue\n\nDuring the detaching of Marvell\u0027s SAS/SATA controller, the original code\ncalls cancel_delayed_work() in mvs_free() to cancel the delayed work\nitem mwq-\u003ework_q. However, if mwq-\u003ework_q is already running, the\ncancel_delayed_work() may fail to cancel it. This can lead to\nuse-after-free scenarios where mvs_free() frees the mvs_info while\nmvs_work_queue() is still executing and attempts to access the\nalready-freed mvs_info.\n\nA typical race condition is illustrated below:\n\nCPU 0 (remove) | CPU 1 (delayed work callback)\nmvs_pci_remove() |\n mvs_free() | mvs_work_queue()\n cancel_delayed_work() |\n kfree(mvi) |\n | mvi-\u003e // UAF\n\nReplace cancel_delayed_work() with cancel_delayed_work_sync() to ensure\nthat the delayed work item is properly canceled and any executing\ndelayed work item completes before the mvs_info is deallocated.\n\nThis bug was found by static analysis.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.8.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40001",
"url": "https://www.suse.com/security/cve/CVE-2025-40001"
},
{
"category": "external",
"summary": "SUSE Bug 1252303 for CVE-2025-40001",
"url": "https://bugzilla.suse.com/1252303"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.8.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.8,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.8.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-19T16:46:47Z",
"details": "moderate"
}
],
"title": "CVE-2025-40001"
},
{
"cve": "CVE-2025-40003",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40003"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnet: mscc: ocelot: Fix use-after-free caused by cyclic delayed work\n\nThe origin code calls cancel_delayed_work() in ocelot_stats_deinit()\nto cancel the cyclic delayed work item ocelot-\u003estats_work. However,\ncancel_delayed_work() may fail to cancel the work item if it is already\nexecuting. While destroy_workqueue() does wait for all pending work items\nin the work queue to complete before destroying the work queue, it cannot\nprevent the delayed work item from being rescheduled within the\nocelot_check_stats_work() function. This limitation exists because the\ndelayed work item is only enqueued into the work queue after its timer\nexpires. Before the timer expiration, destroy_workqueue() has no visibility\nof this pending work item. Once the work queue appears empty,\ndestroy_workqueue() proceeds with destruction. When the timer eventually\nexpires, the delayed work item gets queued again, leading to the following\nwarning:\n\nworkqueue: cannot queue ocelot_check_stats_work on wq ocelot-switch-stats\nWARNING: CPU: 2 PID: 0 at kernel/workqueue.c:2255 __queue_work+0x875/0xaf0\n...\nRIP: 0010:__queue_work+0x875/0xaf0\n...\nRSP: 0018:ffff88806d108b10 EFLAGS: 00010086\nRAX: 0000000000000000 RBX: 0000000000000101 RCX: 0000000000000027\nRDX: 0000000000000027 RSI: 0000000000000004 RDI: ffff88806d123e88\nRBP: ffffffff813c3170 R08: 0000000000000000 R09: ffffed100da247d2\nR10: ffffed100da247d1 R11: ffff88806d123e8b R12: ffff88800c00f000\nR13: ffff88800d7285c0 R14: ffff88806d0a5580 R15: ffff88800d7285a0\nFS: 0000000000000000(0000) GS:ffff8880e5725000(0000) knlGS:0000000000000000\nCS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033\nCR2: 00007fe18e45ea10 CR3: 0000000005e6c000 CR4: 00000000000006f0\nCall Trace:\n \u003cIRQ\u003e\n ? kasan_report+0xc6/0xf0\n ? __pfx_delayed_work_timer_fn+0x10/0x10\n ? __pfx_delayed_work_timer_fn+0x10/0x10\n call_timer_fn+0x25/0x1c0\n __run_timer_base.part.0+0x3be/0x8c0\n ? __pfx_delayed_work_timer_fn+0x10/0x10\n ? rcu_sched_clock_irq+0xb06/0x27d0\n ? __pfx___run_timer_base.part.0+0x10/0x10\n ? try_to_wake_up+0xb15/0x1960\n ? _raw_spin_lock_irq+0x80/0xe0\n ? __pfx__raw_spin_lock_irq+0x10/0x10\n tmigr_handle_remote_up+0x603/0x7e0\n ? __pfx_tmigr_handle_remote_up+0x10/0x10\n ? sched_balance_trigger+0x1c0/0x9f0\n ? sched_tick+0x221/0x5a0\n ? _raw_spin_lock_irq+0x80/0xe0\n ? __pfx__raw_spin_lock_irq+0x10/0x10\n ? tick_nohz_handler+0x339/0x440\n ? __pfx_tmigr_handle_remote_up+0x10/0x10\n __walk_groups.isra.0+0x42/0x150\n tmigr_handle_remote+0x1f4/0x2e0\n ? __pfx_tmigr_handle_remote+0x10/0x10\n ? ktime_get+0x60/0x140\n ? lapic_next_event+0x11/0x20\n ? clockevents_program_event+0x1d4/0x2a0\n ? hrtimer_interrupt+0x322/0x780\n handle_softirqs+0x16a/0x550\n irq_exit_rcu+0xaf/0xe0\n sysvec_apic_timer_interrupt+0x70/0x80\n \u003c/IRQ\u003e\n...\n\nThe following diagram reveals the cause of the above warning:\n\nCPU 0 (remove) | CPU 1 (delayed work callback)\nmscc_ocelot_remove() |\n ocelot_deinit() | ocelot_check_stats_work()\n ocelot_stats_deinit() |\n cancel_delayed_work()| ...\n | queue_delayed_work()\n destroy_workqueue() | (wait a time)\n | __queue_work() //UAF\n\nThe above scenario actually constitutes a UAF vulnerability.\n\nThe ocelot_stats_deinit() is only invoked when initialization\nfailure or resource destruction, so we must ensure that any\ndelayed work items cannot be rescheduled.\n\nReplace cancel_delayed_work() with disable_delayed_work_sync()\nto guarantee proper cancellation of the delayed work item and\nensure completion of any currently executing work before the\nworkqueue is deallocated.\n\nA deadlock concern was considered: ocelot_stats_deinit() is called\nin a process context and is not holding any locks that the delayed\nwork item might also need. Therefore, the use of the _sync() variant\nis safe here.\n\nThis bug was identified through static analysis. To reproduce the\nissue and validate the fix, I simulated ocelot-swit\n---truncated---",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.8.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40003",
"url": "https://www.suse.com/security/cve/CVE-2025-40003"
},
{
"category": "external",
"summary": "SUSE Bug 1252301 for CVE-2025-40003",
"url": "https://bugzilla.suse.com/1252301"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.8.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.8.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-19T16:46:47Z",
"details": "moderate"
}
],
"title": "CVE-2025-40003"
},
{
"cve": "CVE-2025-40006",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40006"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nmm/hugetlb: fix folio is still mapped when deleted\n\nMigration may be raced with fallocating hole. remove_inode_single_folio\nwill unmap the folio if the folio is still mapped. However, it\u0027s called\nwithout folio lock. If the folio is migrated and the mapped pte has been\nconverted to migration entry, folio_mapped() returns false, and won\u0027t\nunmap it. Due to extra refcount held by remove_inode_single_folio,\nmigration fails, restores migration entry to normal pte, and the folio is\nmapped again. As a result, we triggered BUG in filemap_unaccount_folio.\n\nThe log is as follows:\n BUG: Bad page cache in process hugetlb pfn:156c00\n page: refcount:515 mapcount:0 mapping:0000000099fef6e1 index:0x0 pfn:0x156c00\n head: order:9 mapcount:1 entire_mapcount:1 nr_pages_mapped:0 pincount:0\n aops:hugetlbfs_aops ino:dcc dentry name(?):\"my_hugepage_file\"\n flags: 0x17ffffc00000c1(locked|waiters|head|node=0|zone=2|lastcpupid=0x1fffff)\n page_type: f4(hugetlb)\n page dumped because: still mapped when deleted\n CPU: 1 UID: 0 PID: 395 Comm: hugetlb Not tainted 6.17.0-rc5-00044-g7aac71907bde-dirty #484 NONE\n Hardware name: QEMU Ubuntu 24.04 PC (i440FX + PIIX, 1996), BIOS 0.0.0 02/06/2015\n Call Trace:\n \u003cTASK\u003e\n dump_stack_lvl+0x4f/0x70\n filemap_unaccount_folio+0xc4/0x1c0\n __filemap_remove_folio+0x38/0x1c0\n filemap_remove_folio+0x41/0xd0\n remove_inode_hugepages+0x142/0x250\n hugetlbfs_fallocate+0x471/0x5a0\n vfs_fallocate+0x149/0x380\n\nHold folio lock before checking if the folio is mapped to avold race with\nmigration.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.8.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40006",
"url": "https://www.suse.com/security/cve/CVE-2025-40006"
},
{
"category": "external",
"summary": "SUSE Bug 1252342 for CVE-2025-40006",
"url": "https://bugzilla.suse.com/1252342"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.8.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.7,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.8.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-19T16:46:47Z",
"details": "moderate"
}
],
"title": "CVE-2025-40006"
},
{
"cve": "CVE-2025-40021",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40021"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\ntracing: dynevent: Add a missing lockdown check on dynevent\n\nSince dynamic_events interface on tracefs is compatible with\nkprobe_events and uprobe_events, it should also check the lockdown\nstatus and reject if it is set.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.8.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40021",
"url": "https://www.suse.com/security/cve/CVE-2025-40021"
},
{
"category": "external",
"summary": "SUSE Bug 1252681 for CVE-2025-40021",
"url": "https://bugzilla.suse.com/1252681"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.8.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.8.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-19T16:46:47Z",
"details": "moderate"
}
],
"title": "CVE-2025-40021"
},
{
"cve": "CVE-2025-40024",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40024"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nvhost: Take a reference on the task in struct vhost_task.\n\nvhost_task_create() creates a task and keeps a reference to its\ntask_struct. That task may exit early via a signal and its task_struct\nwill be released.\nA pending vhost_task_wake() will then attempt to wake the task and\naccess a task_struct which is no longer there.\n\nAcquire a reference on the task_struct while creating the thread and\nrelease the reference while the struct vhost_task itself is removed.\nIf the task exits early due to a signal, then the vhost_task_wake() will\nstill access a valid task_struct. The wake is safe and will be skipped\nin this case.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.8.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40024",
"url": "https://www.suse.com/security/cve/CVE-2025-40024"
},
{
"category": "external",
"summary": "SUSE Bug 1252686 for CVE-2025-40024",
"url": "https://bugzilla.suse.com/1252686"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.8.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.8.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-19T16:46:47Z",
"details": "moderate"
}
],
"title": "CVE-2025-40024"
},
{
"cve": "CVE-2025-40027",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40027"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnet/9p: fix double req put in p9_fd_cancelled\n\nSyzkaller reports a KASAN issue as below:\n\ngeneral protection fault, probably for non-canonical address 0xfbd59c0000000021: 0000 [#1] PREEMPT SMP KASAN NOPTI\nKASAN: maybe wild-memory-access in range [0xdead000000000108-0xdead00000000010f]\nCPU: 0 PID: 5083 Comm: syz-executor.2 Not tainted 6.1.134-syzkaller-00037-g855bd1d7d838 #0\nHardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014\nRIP: 0010:__list_del include/linux/list.h:114 [inline]\nRIP: 0010:__list_del_entry include/linux/list.h:137 [inline]\nRIP: 0010:list_del include/linux/list.h:148 [inline]\nRIP: 0010:p9_fd_cancelled+0xe9/0x200 net/9p/trans_fd.c:734\n\nCall Trace:\n \u003cTASK\u003e\n p9_client_flush+0x351/0x440 net/9p/client.c:614\n p9_client_rpc+0xb6b/0xc70 net/9p/client.c:734\n p9_client_version net/9p/client.c:920 [inline]\n p9_client_create+0xb51/0x1240 net/9p/client.c:1027\n v9fs_session_init+0x1f0/0x18f0 fs/9p/v9fs.c:408\n v9fs_mount+0xba/0xcb0 fs/9p/vfs_super.c:126\n legacy_get_tree+0x108/0x220 fs/fs_context.c:632\n vfs_get_tree+0x8e/0x300 fs/super.c:1573\n do_new_mount fs/namespace.c:3056 [inline]\n path_mount+0x6a6/0x1e90 fs/namespace.c:3386\n do_mount fs/namespace.c:3399 [inline]\n __do_sys_mount fs/namespace.c:3607 [inline]\n __se_sys_mount fs/namespace.c:3584 [inline]\n __x64_sys_mount+0x283/0x300 fs/namespace.c:3584\n do_syscall_x64 arch/x86/entry/common.c:51 [inline]\n do_syscall_64+0x35/0x80 arch/x86/entry/common.c:81\n entry_SYSCALL_64_after_hwframe+0x6e/0xd8\n\nThis happens because of a race condition between:\n\n- The 9p client sending an invalid flush request and later cleaning it up;\n- The 9p client in p9_read_work() canceled all pending requests.\n\n Thread 1 Thread 2\n ...\n p9_client_create()\n ...\n p9_fd_create()\n ...\n p9_conn_create()\n ...\n // start Thread 2\n INIT_WORK(\u0026m-\u003erq, p9_read_work);\n p9_read_work()\n ...\n p9_client_rpc()\n ...\n ...\n p9_conn_cancel()\n ...\n spin_lock(\u0026m-\u003ereq_lock);\n ...\n p9_fd_cancelled()\n ...\n ...\n spin_unlock(\u0026m-\u003ereq_lock);\n // status rewrite\n p9_client_cb(m-\u003eclient, req, REQ_STATUS_ERROR)\n // first remove\n list_del(\u0026req-\u003ereq_list);\n ...\n\n spin_lock(\u0026m-\u003ereq_lock)\n ...\n // second remove\n list_del(\u0026req-\u003ereq_list);\n spin_unlock(\u0026m-\u003ereq_lock)\n ...\n\nCommit 74d6a5d56629 (\"9p/trans_fd: Fix concurrency del of req_list in\np9_fd_cancelled/p9_read_work\") fixes a concurrency issue in the 9p filesystem\nclient where the req_list could be deleted simultaneously by both\np9_read_work and p9_fd_cancelled functions, but for the case where req-\u003estatus\nequals REQ_STATUS_RCVD.\n\nUpdate the check for req-\u003estatus in p9_fd_cancelled to skip processing not\njust received requests, but anything that is not SENT, as whatever\nchanged the state from SENT also removed the request from its list.\n\nFound by Linux Verification Center (linuxtesting.org) with Syzkaller.\n\n[updated the check from status == RECV || status == ERROR to status != SENT]",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.8.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40027",
"url": "https://www.suse.com/security/cve/CVE-2025-40027"
},
{
"category": "external",
"summary": "SUSE Bug 1252763 for CVE-2025-40027",
"url": "https://bugzilla.suse.com/1252763"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.8.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.8.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-19T16:46:47Z",
"details": "moderate"
}
],
"title": "CVE-2025-40027"
},
{
"cve": "CVE-2025-40031",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40031"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\ntee: fix register_shm_helper()\n\nIn register_shm_helper(), fix incorrect error handling for a call to\niov_iter_extract_pages(). A case is missing for when\niov_iter_extract_pages() only got some pages and return a number larger\nthan 0, but not the requested amount.\n\nThis fixes a possible NULL pointer dereference following a bad input from\nioctl(TEE_IOC_SHM_REGISTER) where parts of the buffer isn\u0027t mapped.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.8.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40031",
"url": "https://www.suse.com/security/cve/CVE-2025-40031"
},
{
"category": "external",
"summary": "SUSE Bug 1252779 for CVE-2025-40031",
"url": "https://bugzilla.suse.com/1252779"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.8.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.8.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-19T16:46:47Z",
"details": "moderate"
}
],
"title": "CVE-2025-40031"
},
{
"cve": "CVE-2025-40033",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40033"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nremoteproc: pru: Fix potential NULL pointer dereference in pru_rproc_set_ctable()\n\npru_rproc_set_ctable() accessed rproc-\u003epriv before the IS_ERR_OR_NULL\ncheck, which could lead to a null pointer dereference. Move the pru\nassignment, ensuring we never dereference a NULL rproc pointer.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.8.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40033",
"url": "https://www.suse.com/security/cve/CVE-2025-40033"
},
{
"category": "external",
"summary": "SUSE Bug 1252824 for CVE-2025-40033",
"url": "https://bugzilla.suse.com/1252824"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.8.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.8.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-19T16:46:47Z",
"details": "moderate"
}
],
"title": "CVE-2025-40033"
},
{
"cve": "CVE-2025-40038",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40038"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nKVM: SVM: Skip fastpath emulation on VM-Exit if next RIP isn\u0027t valid\n\nSkip the WRMSR and HLT fastpaths in SVM\u0027s VM-Exit handler if the next RIP\nisn\u0027t valid, e.g. because KVM is running with nrips=false. SVM must\ndecode and emulate to skip the instruction if the CPU doesn\u0027t provide the\nnext RIP, and getting the instruction bytes to decode requires reading\nguest memory. Reading guest memory through the emulator can fault, i.e.\ncan sleep, which is disallowed since the fastpath handlers run with IRQs\ndisabled.\n\n BUG: sleeping function called from invalid context at ./include/linux/uaccess.h:106\n in_atomic(): 1, irqs_disabled(): 1, non_block: 0, pid: 32611, name: qemu\n preempt_count: 1, expected: 0\n INFO: lockdep is turned off.\n irq event stamp: 30580\n hardirqs last enabled at (30579): [\u003cffffffffc08b2527\u003e] vcpu_run+0x1787/0x1db0 [kvm]\n hardirqs last disabled at (30580): [\u003cffffffffb4f62e32\u003e] __schedule+0x1e2/0xed0\n softirqs last enabled at (30570): [\u003cffffffffb4247a64\u003e] fpu_swap_kvm_fpstate+0x44/0x210\n softirqs last disabled at (30568): [\u003cffffffffb4247a64\u003e] fpu_swap_kvm_fpstate+0x44/0x210\n CPU: 298 UID: 0 PID: 32611 Comm: qemu Tainted: G U 6.16.0-smp--e6c618b51cfe-sleep #782 NONE\n Tainted: [U]=USER\n Hardware name: Google Astoria-Turin/astoria, BIOS 0.20241223.2-0 01/17/2025\n Call Trace:\n \u003cTASK\u003e\n dump_stack_lvl+0x7d/0xb0\n __might_resched+0x271/0x290\n __might_fault+0x28/0x80\n kvm_vcpu_read_guest_page+0x8d/0xc0 [kvm]\n kvm_fetch_guest_virt+0x92/0xc0 [kvm]\n __do_insn_fetch_bytes+0xf3/0x1e0 [kvm]\n x86_decode_insn+0xd1/0x1010 [kvm]\n x86_emulate_instruction+0x105/0x810 [kvm]\n __svm_skip_emulated_instruction+0xc4/0x140 [kvm_amd]\n handle_fastpath_invd+0xc4/0x1a0 [kvm]\n vcpu_run+0x11a1/0x1db0 [kvm]\n kvm_arch_vcpu_ioctl_run+0x5cc/0x730 [kvm]\n kvm_vcpu_ioctl+0x578/0x6a0 [kvm]\n __se_sys_ioctl+0x6d/0xb0\n do_syscall_64+0x8a/0x2c0\n entry_SYSCALL_64_after_hwframe+0x4b/0x53\n RIP: 0033:0x7f479d57a94b\n \u003c/TASK\u003e\n\nNote, this is essentially a reapply of commit 5c30e8101e8d (\"KVM: SVM:\nSkip WRMSR fastpath on VM-Exit if next RIP isn\u0027t valid\"), but with\ndifferent justification (KVM now grabs SRCU when skipping the instruction\nfor other reasons).",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.8.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40038",
"url": "https://www.suse.com/security/cve/CVE-2025-40038"
},
{
"category": "external",
"summary": "SUSE Bug 1252817 for CVE-2025-40038",
"url": "https://bugzilla.suse.com/1252817"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.8.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.8.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-19T16:46:47Z",
"details": "moderate"
}
],
"title": "CVE-2025-40038"
},
{
"cve": "CVE-2025-40047",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40047"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nio_uring/waitid: always prune wait queue entry in io_waitid_wait()\n\nFor a successful return, always remove our entry from the wait queue\nentry list. Previously this was skipped if a cancelation was in\nprogress, but this can race with another invocation of the wait queue\nentry callback.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.8.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40047",
"url": "https://www.suse.com/security/cve/CVE-2025-40047"
},
{
"category": "external",
"summary": "SUSE Bug 1252790 for CVE-2025-40047",
"url": "https://bugzilla.suse.com/1252790"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.8.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.7,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.8.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-19T16:46:47Z",
"details": "moderate"
}
],
"title": "CVE-2025-40047"
},
{
"cve": "CVE-2025-40053",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40053"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnet: dlink: handle copy_thresh allocation failure\n\nThe driver did not handle failure of `netdev_alloc_skb_ip_align()`.\nIf the allocation failed, dereferencing `skb-\u003eprotocol` could lead to\na NULL pointer dereference.\n\nThis patch tries to allocate `skb`. If the allocation fails, it falls\nback to the normal path.\n\nTested-on: D-Link DGE-550T Rev-A3",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.8.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40053",
"url": "https://www.suse.com/security/cve/CVE-2025-40053"
},
{
"category": "external",
"summary": "SUSE Bug 1252808 for CVE-2025-40053",
"url": "https://bugzilla.suse.com/1252808"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.8.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.8.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-19T16:46:47Z",
"details": "moderate"
}
],
"title": "CVE-2025-40053"
},
{
"cve": "CVE-2025-40055",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40055"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nocfs2: fix double free in user_cluster_connect()\n\nuser_cluster_disconnect() frees \"conn-\u003ecc_private\" which is \"lc\" but then\nthe error handling frees \"lc\" a second time. Set \"lc\" to NULL on this\npath to avoid a double free.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.8.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40055",
"url": "https://www.suse.com/security/cve/CVE-2025-40055"
},
{
"category": "external",
"summary": "SUSE Bug 1252821 for CVE-2025-40055",
"url": "https://bugzilla.suse.com/1252821"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.8.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.8.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-19T16:46:47Z",
"details": "moderate"
}
],
"title": "CVE-2025-40055"
},
{
"cve": "CVE-2025-40059",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40059"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\ncoresight: Fix incorrect handling for return value of devm_kzalloc\n\nThe return value of devm_kzalloc could be an null pointer,\nuse \"!desc.pdata\" to fix incorrect handling return value\nof devm_kzalloc.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.8.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40059",
"url": "https://www.suse.com/security/cve/CVE-2025-40059"
},
{
"category": "external",
"summary": "SUSE Bug 1252809 for CVE-2025-40059",
"url": "https://bugzilla.suse.com/1252809"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.8.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.8.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-19T16:46:47Z",
"details": "moderate"
}
],
"title": "CVE-2025-40059"
},
{
"cve": "CVE-2025-40064",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40064"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nsmc: Fix use-after-free in __pnet_find_base_ndev().\n\nsyzbot reported use-after-free of net_device in __pnet_find_base_ndev(),\nwhich was called during connect(). [0]\n\nsmc_pnet_find_ism_resource() fetches sk_dst_get(sk)-\u003edev and passes\ndown to pnet_find_base_ndev(), where RTNL is held. Then, UAF happened\nat __pnet_find_base_ndev() when the dev is first used.\n\nThis means dev had already been freed before acquiring RTNL in\npnet_find_base_ndev().\n\nWhile dev is going away, dst-\u003edev could be swapped with blackhole_netdev,\nand the dev\u0027s refcnt by dst will be released.\n\nWe must hold dev\u0027s refcnt before calling smc_pnet_find_ism_resource().\n\nAlso, smc_pnet_find_roce_resource() has the same problem.\n\nLet\u0027s use __sk_dst_get() and dst_dev_rcu() in the two functions.\n\n[0]:\nBUG: KASAN: use-after-free in __pnet_find_base_ndev+0x1b1/0x1c0 net/smc/smc_pnet.c:926\nRead of size 1 at addr ffff888036bac33a by task syz.0.3632/18609\n\nCPU: 1 UID: 0 PID: 18609 Comm: syz.0.3632 Not tainted syzkaller #0 PREEMPT(full)\nHardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/18/2025\nCall Trace:\n \u003cTASK\u003e\n dump_stack_lvl+0x189/0x250 lib/dump_stack.c:120\n print_address_description mm/kasan/report.c:378 [inline]\n print_report+0xca/0x240 mm/kasan/report.c:482\n kasan_report+0x118/0x150 mm/kasan/report.c:595\n __pnet_find_base_ndev+0x1b1/0x1c0 net/smc/smc_pnet.c:926\n pnet_find_base_ndev net/smc/smc_pnet.c:946 [inline]\n smc_pnet_find_ism_by_pnetid net/smc/smc_pnet.c:1103 [inline]\n smc_pnet_find_ism_resource+0xef/0x390 net/smc/smc_pnet.c:1154\n smc_find_ism_device net/smc/af_smc.c:1030 [inline]\n smc_find_proposal_devices net/smc/af_smc.c:1115 [inline]\n __smc_connect+0x372/0x1890 net/smc/af_smc.c:1545\n smc_connect+0x877/0xd90 net/smc/af_smc.c:1715\n __sys_connect_file net/socket.c:2086 [inline]\n __sys_connect+0x313/0x440 net/socket.c:2105\n __do_sys_connect net/socket.c:2111 [inline]\n __se_sys_connect net/socket.c:2108 [inline]\n __x64_sys_connect+0x7a/0x90 net/socket.c:2108\n do_syscall_x64 arch/x86/entry/syscall_64.c:63 [inline]\n do_syscall_64+0xfa/0x3b0 arch/x86/entry/syscall_64.c:94\n entry_SYSCALL_64_after_hwframe+0x77/0x7f\nRIP: 0033:0x7f47cbf8eba9\nCode: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 \u003c48\u003e 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48\nRSP: 002b:00007f47ccdb1038 EFLAGS: 00000246 ORIG_RAX: 000000000000002a\nRAX: ffffffffffffffda RBX: 00007f47cc1d5fa0 RCX: 00007f47cbf8eba9\nRDX: 0000000000000010 RSI: 0000200000000280 RDI: 000000000000000b\nRBP: 00007f47cc011e19 R08: 0000000000000000 R09: 0000000000000000\nR10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000\nR13: 00007f47cc1d6038 R14: 00007f47cc1d5fa0 R15: 00007ffc512f8aa8\n \u003c/TASK\u003e\n\nThe buggy address belongs to the physical page:\npage: refcount:0 mapcount:0 mapping:0000000000000000 index:0xffff888036bacd00 pfn:0x36bac\nflags: 0xfff00000000000(node=0|zone=1|lastcpupid=0x7ff)\nraw: 00fff00000000000 ffffea0001243d08 ffff8880b863fdc0 0000000000000000\nraw: ffff888036bacd00 0000000000000000 00000000ffffffff 0000000000000000\npage dumped because: kasan: bad access detected\npage_owner tracks the page as freed\npage last allocated via order 2, migratetype Unmovable, gfp_mask 0x446dc0(GFP_KERNEL_ACCOUNT|__GFP_ZERO|__GFP_NOWARN|__GFP_RETRY_MAYFAIL|__GFP_COMP), pid 16741, tgid 16741 (syz-executor), ts 343313197788, free_ts 380670750466\n set_page_owner include/linux/page_owner.h:32 [inline]\n post_alloc_hook+0x240/0x2a0 mm/page_alloc.c:1851\n prep_new_page mm/page_alloc.c:1859 [inline]\n get_page_from_freelist+0x21e4/0x22c0 mm/page_alloc.c:3858\n __alloc_frozen_pages_noprof+0x181/0x370 mm/page_alloc.c:5148\n alloc_pages_mpol+0x232/0x4a0 mm/mempolicy.c:2416\n ___kmalloc_large_node+0x5f/0x1b0 mm/slub.c:4317\n __kmalloc_large_node_noprof+0x18/0x90 mm/slub.c:4348\n __do_kmalloc_node mm/slub.c:4364 [inline]\n __kvmalloc_node\n---truncated---",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.8.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40064",
"url": "https://www.suse.com/security/cve/CVE-2025-40064"
},
{
"category": "external",
"summary": "SUSE Bug 1252845 for CVE-2025-40064",
"url": "https://bugzilla.suse.com/1252845"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.8.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.8.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-19T16:46:47Z",
"details": "moderate"
}
],
"title": "CVE-2025-40064"
},
{
"cve": "CVE-2025-40070",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40070"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\npps: fix warning in pps_register_cdev when register device fail\n\nSimilar to previous commit 2a934fdb01db (\"media: v4l2-dev: fix error\nhandling in __video_register_device()\"), the release hook should be set\nbefore device_register(). Otherwise, when device_register() return error\nand put_device() try to callback the release function, the below warning\nmay happen.\n\n ------------[ cut here ]------------\n WARNING: CPU: 1 PID: 4760 at drivers/base/core.c:2567 device_release+0x1bd/0x240 drivers/base/core.c:2567\n Modules linked in:\n CPU: 1 UID: 0 PID: 4760 Comm: syz.4.914 Not tainted 6.17.0-rc3+ #1 NONE\n RIP: 0010:device_release+0x1bd/0x240 drivers/base/core.c:2567\n Call Trace:\n \u003cTASK\u003e\n kobject_cleanup+0x136/0x410 lib/kobject.c:689\n kobject_release lib/kobject.c:720 [inline]\n kref_put include/linux/kref.h:65 [inline]\n kobject_put+0xe9/0x130 lib/kobject.c:737\n put_device+0x24/0x30 drivers/base/core.c:3797\n pps_register_cdev+0x2da/0x370 drivers/pps/pps.c:402\n pps_register_source+0x2f6/0x480 drivers/pps/kapi.c:108\n pps_tty_open+0x190/0x310 drivers/pps/clients/pps-ldisc.c:57\n tty_ldisc_open+0xa7/0x120 drivers/tty/tty_ldisc.c:432\n tty_set_ldisc+0x333/0x780 drivers/tty/tty_ldisc.c:563\n tiocsetd drivers/tty/tty_io.c:2429 [inline]\n tty_ioctl+0x5d1/0x1700 drivers/tty/tty_io.c:2728\n vfs_ioctl fs/ioctl.c:51 [inline]\n __do_sys_ioctl fs/ioctl.c:598 [inline]\n __se_sys_ioctl fs/ioctl.c:584 [inline]\n __x64_sys_ioctl+0x194/0x210 fs/ioctl.c:584\n do_syscall_x64 arch/x86/entry/syscall_64.c:63 [inline]\n do_syscall_64+0x5f/0x2a0 arch/x86/entry/syscall_64.c:94\n entry_SYSCALL_64_after_hwframe+0x76/0x7e\n \u003c/TASK\u003e\n\nBefore commit c79a39dc8d06 (\"pps: Fix a use-after-free\"),\npps_register_cdev() call device_create() to create pps-\u003edev, which will\ninit dev-\u003erelease to device_create_release(). Now the comment is outdated,\njust remove it.\n\nThanks for the reminder from Calvin Owens, \u0027kfree_pps\u0027 should be removed\nin pps_register_source() to avoid a double free in the failure case.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.8.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40070",
"url": "https://www.suse.com/security/cve/CVE-2025-40070"
},
{
"category": "external",
"summary": "SUSE Bug 1252836 for CVE-2025-40070",
"url": "https://bugzilla.suse.com/1252836"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.8.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.8.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-19T16:46:47Z",
"details": "moderate"
}
],
"title": "CVE-2025-40070"
},
{
"cve": "CVE-2025-40074",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40074"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nipv4: start using dst_dev_rcu()\n\nChange icmpv4_xrlim_allow(), ip_defrag() to prevent possible UAF.\n\nChange ipmr_prepare_xmit(), ipmr_queue_fwd_xmit(), ip_mr_output(),\nipv4_neigh_lookup() to use lockdep enabled dst_dev_rcu().",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.8.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40074",
"url": "https://www.suse.com/security/cve/CVE-2025-40074"
},
{
"category": "external",
"summary": "SUSE Bug 1252794 for CVE-2025-40074",
"url": "https://bugzilla.suse.com/1252794"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.8.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.8.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-19T16:46:47Z",
"details": "moderate"
}
],
"title": "CVE-2025-40074"
},
{
"cve": "CVE-2025-40075",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40075"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\ntcp_metrics: use dst_dev_net_rcu()\n\nReplace three dst_dev() with a lockdep enabled helper.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.8.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40075",
"url": "https://www.suse.com/security/cve/CVE-2025-40075"
},
{
"category": "external",
"summary": "SUSE Bug 1252795 for CVE-2025-40075",
"url": "https://bugzilla.suse.com/1252795"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.8.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.8.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-19T16:46:47Z",
"details": "moderate"
}
],
"title": "CVE-2025-40075"
},
{
"cve": "CVE-2025-40081",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40081"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nperf: arm_spe: Prevent overflow in PERF_IDX2OFF()\n\nCast nr_pages to unsigned long to avoid overflow when handling large\nAUX buffer sizes (\u003e= 2 GiB).",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.8.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40081",
"url": "https://www.suse.com/security/cve/CVE-2025-40081"
},
{
"category": "external",
"summary": "SUSE Bug 1252776 for CVE-2025-40081",
"url": "https://bugzilla.suse.com/1252776"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.8.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.8.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-19T16:46:47Z",
"details": "moderate"
}
],
"title": "CVE-2025-40081"
},
{
"cve": "CVE-2025-40083",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40083"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnet/sched: sch_qfq: Fix null-deref in agg_dequeue\n\nTo prevent a potential crash in agg_dequeue (net/sched/sch_qfq.c)\nwhen cl-\u003eqdisc-\u003eops-\u003epeek(cl-\u003eqdisc) returns NULL, we check the return\nvalue before using it, similar to the existing approach in sch_hfsc.c.\n\nTo avoid code duplication, the following changes are made:\n\n1. Changed qdisc_warn_nonwc(include/net/pkt_sched.h) into a static\ninline function.\n\n2. Moved qdisc_peek_len from net/sched/sch_hfsc.c to\ninclude/net/pkt_sched.h so that sch_qfq can reuse it.\n\n3. Applied qdisc_peek_len in agg_dequeue to avoid crashing.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.8.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40083",
"url": "https://www.suse.com/security/cve/CVE-2025-40083"
},
{
"category": "external",
"summary": "SUSE Bug 1252912 for CVE-2025-40083",
"url": "https://bugzilla.suse.com/1252912"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.8.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.8.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-19T16:46:47Z",
"details": "moderate"
}
],
"title": "CVE-2025-40083"
},
{
"cve": "CVE-2025-40086",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40086"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\ndrm/xe: Don\u0027t allow evicting of BOs in same VM in array of VM binds\n\nAn array of VM binds can potentially evict other buffer objects (BOs)\nwithin the same VM under certain conditions, which may lead to NULL\npointer dereferences later in the bind pipeline. To prevent this, clear\nthe allow_res_evict flag in the xe_bo_validate call.\n\nv2:\n - Invert polarity of no_res_evict (Thomas)\n - Add comment in code explaining issue (Thomas)\n\n(cherry picked from commit 8b9ba8d6d95fe75fed6b0480bb03da4b321bea08)",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.8.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40086",
"url": "https://www.suse.com/security/cve/CVE-2025-40086"
},
{
"category": "external",
"summary": "SUSE Bug 1252923 for CVE-2025-40086",
"url": "https://bugzilla.suse.com/1252923"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.8.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.1,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.8.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-19T16:46:47Z",
"details": "moderate"
}
],
"title": "CVE-2025-40086"
},
{
"cve": "CVE-2025-40098",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40098"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nALSA: hda: cs35l41: Fix NULL pointer dereference in cs35l41_get_acpi_mute_state()\n\nReturn value of a function acpi_evaluate_dsm() is dereferenced without\nchecking for NULL, but it is usually checked for this function.\n\nacpi_evaluate_dsm() may return NULL, when acpi_evaluate_object() returns\nacpi_status other than ACPI_SUCCESS, so add a check to prevent the crach.\n\nFound by Linux Verification Center (linuxtesting.org) with SVACE.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.8.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40098",
"url": "https://www.suse.com/security/cve/CVE-2025-40098"
},
{
"category": "external",
"summary": "SUSE Bug 1252917 for CVE-2025-40098",
"url": "https://bugzilla.suse.com/1252917"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.8.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.8.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-19T16:46:47Z",
"details": "moderate"
}
],
"title": "CVE-2025-40098"
},
{
"cve": "CVE-2025-40101",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40101"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nbtrfs: fix memory leaks when rejecting a non SINGLE data profile without an RST\n\nAt the end of btrfs_load_block_group_zone_info() the first thing we do\nis to ensure that if the mapping type is not a SINGLE one and there is\nno RAID stripe tree, then we return early with an error.\n\nDoing that, though, prevents the code from running the last calls from\nthis function which are about freeing memory allocated during its\nrun. Hence, in this case, instead of returning early, we set the ret\nvalue and fall through the rest of the cleanup code.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.8.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40101",
"url": "https://www.suse.com/security/cve/CVE-2025-40101"
},
{
"category": "external",
"summary": "SUSE Bug 1252901 for CVE-2025-40101",
"url": "https://bugzilla.suse.com/1252901"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.8.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.3,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.8.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-19T16:46:47Z",
"details": "low"
}
],
"title": "CVE-2025-40101"
},
{
"cve": "CVE-2025-40102",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40102"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nKVM: arm64: Prevent access to vCPU events before init\n\nAnother day, another syzkaller bug. KVM erroneously allows userspace to\npend vCPU events for a vCPU that hasn\u0027t been initialized yet, leading to\nKVM interpreting a bunch of uninitialized garbage for routing /\ninjecting the exception.\n\nIn one case the injection code and the hyp disagree on whether the vCPU\nhas a 32bit EL1 and put the vCPU into an illegal mode for AArch64,\ntripping the BUG() in exception_target_el() during the next injection:\n\n kernel BUG at arch/arm64/kvm/inject_fault.c:40!\n Internal error: Oops - BUG: 00000000f2000800 [#1] SMP\n CPU: 3 UID: 0 PID: 318 Comm: repro Not tainted 6.17.0-rc4-00104-g10fd0285305d #6 PREEMPT\n Hardware name: linux,dummy-virt (DT)\n pstate: 21402009 (nzCv daif +PAN -UAO -TCO +DIT -SSBS BTYPE=--)\n pc : exception_target_el+0x88/0x8c\n lr : pend_serror_exception+0x18/0x13c\n sp : ffff800082f03a10\n x29: ffff800082f03a10 x28: ffff0000cb132280 x27: 0000000000000000\n x26: 0000000000000000 x25: ffff0000c2a99c20 x24: 0000000000000000\n x23: 0000000000008000 x22: 0000000000000002 x21: 0000000000000004\n x20: 0000000000008000 x19: ffff0000c2a99c20 x18: 0000000000000000\n x17: 0000000000000000 x16: 0000000000000000 x15: 00000000200000c0\n x14: 0000000000000000 x13: 0000000000000000 x12: 0000000000000000\n x11: 0000000000000000 x10: 0000000000000000 x9 : 0000000000000000\n x8 : ffff800082f03af8 x7 : 0000000000000000 x6 : 0000000000000000\n x5 : ffff800080f621f0 x4 : 0000000000000000 x3 : 0000000000000000\n x2 : 000000000040009b x1 : 0000000000000003 x0 : ffff0000c2a99c20\n Call trace:\n exception_target_el+0x88/0x8c (P)\n kvm_inject_serror_esr+0x40/0x3b4\n __kvm_arm_vcpu_set_events+0xf0/0x100\n kvm_arch_vcpu_ioctl+0x180/0x9d4\n kvm_vcpu_ioctl+0x60c/0x9f4\n __arm64_sys_ioctl+0xac/0x104\n invoke_syscall+0x48/0x110\n el0_svc_common.constprop.0+0x40/0xe0\n do_el0_svc+0x1c/0x28\n el0_svc+0x34/0xf0\n el0t_64_sync_handler+0xa0/0xe4\n el0t_64_sync+0x198/0x19c\n Code: f946bc01 b4fffe61 9101e020 17fffff2 (d4210000)\n\nReject the ioctls outright as no sane VMM would call these before\nKVM_ARM_VCPU_INIT anyway. Even if it did the exception would\u0027ve been\nthrown away by the eventual reset of the vCPU\u0027s state.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.8.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40102",
"url": "https://www.suse.com/security/cve/CVE-2025-40102"
},
{
"category": "external",
"summary": "SUSE Bug 1252919 for CVE-2025-40102",
"url": "https://bugzilla.suse.com/1252919"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.8.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 0,
"baseSeverity": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.8.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-19T16:46:47Z",
"details": "moderate"
}
],
"title": "CVE-2025-40102"
},
{
"cve": "CVE-2025-40105",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40105"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nvfs: Don\u0027t leak disconnected dentries on umount\n\nWhen user calls open_by_handle_at() on some inode that is not cached, we\nwill create disconnected dentry for it. If such dentry is a directory,\nexportfs_decode_fh_raw() will then try to connect this dentry to the\ndentry tree through reconnect_path(). It may happen for various reasons\n(such as corrupted fs or race with rename) that the call to\nlookup_one_unlocked() in reconnect_one() will fail to find the dentry we\nare trying to reconnect and instead create a new dentry under the\nparent. Now this dentry will not be marked as disconnected although the\nparent still may well be disconnected (at least in case this\ninconsistency happened because the fs is corrupted and .. doesn\u0027t point\nto the real parent directory). This creates inconsistency in\ndisconnected flags but AFAICS it was mostly harmless. At least until\ncommit f1ee616214cb (\"VFS: don\u0027t keep disconnected dentries on d_anon\")\nwhich removed adding of most disconnected dentries to sb-\u003es_anon list.\nThus after this commit cleanup of disconnected dentries implicitely\nrelies on the fact that dput() will immediately reclaim such dentries.\nHowever when some leaf dentry isn\u0027t marked as disconnected, as in the\nscenario described above, the reclaim doesn\u0027t happen and the dentries\nare \"leaked\". Memory reclaim can eventually reclaim them but otherwise\nthey stay in memory and if umount comes first, we hit infamous \"Busy\ninodes after unmount\" bug. Make sure all dentries created under a\ndisconnected parent are marked as disconnected as well.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.8.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40105",
"url": "https://www.suse.com/security/cve/CVE-2025-40105"
},
{
"category": "external",
"summary": "SUSE Bug 1252928 for CVE-2025-40105",
"url": "https://bugzilla.suse.com/1252928"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.8.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.3,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.8.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-19T16:46:47Z",
"details": "low"
}
],
"title": "CVE-2025-40105"
},
{
"cve": "CVE-2025-40107",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40107"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\ncan: hi311x: fix null pointer dereference when resuming from sleep before interface was enabled\n\nThis issue is similar to the vulnerability in the `mcp251x` driver,\nwhich was fixed in commit 03c427147b2d (\"can: mcp251x: fix resume from\nsleep before interface was brought up\").\n\nIn the `hi311x` driver, when the device resumes from sleep, the driver\nschedules `priv-\u003erestart_work`. However, if the network interface was\nnot previously enabled, the `priv-\u003ewq` (workqueue) is not allocated and\ninitialized, leading to a null pointer dereference.\n\nTo fix this, we move the allocation and initialization of the workqueue\nfrom the `hi3110_open` function to the `hi3110_can_probe` function.\nThis ensures that the workqueue is properly initialized before it is\nused during device resume. And added logic to destroy the workqueue\nin the error handling paths of `hi3110_can_probe` and in the\n`hi3110_can_remove` function to prevent resource leaks.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.8.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40107",
"url": "https://www.suse.com/security/cve/CVE-2025-40107"
},
{
"category": "external",
"summary": "SUSE Bug 1253018 for CVE-2025-40107",
"url": "https://bugzilla.suse.com/1253018"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.8.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.8.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-19T16:46:47Z",
"details": "moderate"
}
],
"title": "CVE-2025-40107"
},
{
"cve": "CVE-2025-40109",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40109"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\ncrypto: rng - Ensure set_ent is always present\n\nEnsure that set_ent is always set since only drbg provides it.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.8.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40109",
"url": "https://www.suse.com/security/cve/CVE-2025-40109"
},
{
"category": "external",
"summary": "SUSE Bug 1253176 for CVE-2025-40109",
"url": "https://bugzilla.suse.com/1253176"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.8.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.8.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-19T16:46:47Z",
"details": "moderate"
}
],
"title": "CVE-2025-40109"
},
{
"cve": "CVE-2025-40110",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40110"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\ndrm/vmwgfx: Fix a null-ptr access in the cursor snooper\n\nCheck that the resource which is converted to a surface exists before\ntrying to use the cursor snooper on it.\n\nvmw_cmd_res_check allows explicit invalid (SVGA3D_INVALID_ID) identifiers\nbecause some svga commands accept SVGA3D_INVALID_ID to mean \"no surface\",\nunfortunately functions that accept the actual surfaces as objects might\n(and in case of the cursor snooper, do not) be able to handle null\nobjects. Make sure that we validate not only the identifier (via the\nvmw_cmd_res_check) but also check that the actual resource exists before\ntrying to do something with it.\n\nFixes unchecked null-ptr reference in the snooping code.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.8.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40110",
"url": "https://www.suse.com/security/cve/CVE-2025-40110"
},
{
"category": "external",
"summary": "SUSE Bug 1253275 for CVE-2025-40110",
"url": "https://bugzilla.suse.com/1253275"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.8.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.1,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.8.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-19T16:46:47Z",
"details": "moderate"
}
],
"title": "CVE-2025-40110"
},
{
"cve": "CVE-2025-40111",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40111"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\ndrm/vmwgfx: Fix Use-after-free in validation\n\nNodes stored in the validation duplicates hashtable come from an arena\nallocator that is cleared at the end of vmw_execbuf_process. All nodes\nare expected to be cleared in vmw_validation_drop_ht but this node escaped\nbecause its resource was destroyed prematurely.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.8.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40111",
"url": "https://www.suse.com/security/cve/CVE-2025-40111"
},
{
"category": "external",
"summary": "SUSE Bug 1253362 for CVE-2025-40111",
"url": "https://bugzilla.suse.com/1253362"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.8.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.7,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:L/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.8.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-19T16:46:47Z",
"details": "moderate"
}
],
"title": "CVE-2025-40111"
},
{
"cve": "CVE-2025-40115",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40115"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nscsi: mpt3sas: Fix crash in transport port remove by using ioc_info()\n\nDuring mpt3sas_transport_port_remove(), messages were logged with\ndev_printk() against \u0026mpt3sas_port-\u003eport-\u003edev. At this point the SAS\ntransport device may already be partially unregistered or freed, leading\nto a crash when accessing its struct device.\n\nUsing ioc_info(), which logs via the PCI device (ioc-\u003epdev-\u003edev),\nguaranteed to remain valid until driver removal.\n\n[83428.295776] Oops: general protection fault, probably for non-canonical address 0x6f702f323a33312d: 0000 [#1] SMP NOPTI\n[83428.295785] CPU: 145 UID: 0 PID: 113296 Comm: rmmod Kdump: loaded Tainted: G OE 6.16.0-rc1+ #1 PREEMPT(voluntary)\n[83428.295792] Tainted: [O]=OOT_MODULE, [E]=UNSIGNED_MODULE\n[83428.295795] Hardware name: Dell Inc. Precision 7875 Tower/, BIOS 89.1.67 02/23/2024\n[83428.295799] RIP: 0010:__dev_printk+0x1f/0x70\n[83428.295805] Code: 90 90 90 90 90 90 90 90 90 90 90 0f 1f 44 00 00 49 89 d1 48 85 f6 74 52 4c 8b 46 50 4d 85 c0 74 1f 48 8b 46 68 48 85 c0 74 22 \u003c48\u003e 8b 08 0f b6 7f 01 48 c7 c2 db e8 42 ad 83 ef 30 e9 7b f8 ff ff\n[83428.295813] RSP: 0018:ff85aeafc3137bb0 EFLAGS: 00010206\n[83428.295817] RAX: 6f702f323a33312d RBX: ff4290ee81292860 RCX: 5000cca25103be32\n[83428.295820] RDX: ff85aeafc3137bb8 RSI: ff4290eeb1966c00 RDI: ffffffffc1560845\n[83428.295823] RBP: ff85aeafc3137c18 R08: 74726f702f303a33 R09: ff85aeafc3137bb8\n[83428.295826] R10: ff85aeafc3137b18 R11: ff4290f5bd60fe68 R12: ff4290ee81290000\n[83428.295830] R13: ff4290ee6e345de0 R14: ff4290ee81290000 R15: ff4290ee6e345e30\n[83428.295833] FS: 00007fd9472a6740(0000) GS:ff4290f5ce96b000(0000) knlGS:0000000000000000\n[83428.295837] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033\n[83428.295840] CR2: 00007f242b4db238 CR3: 00000002372b8006 CR4: 0000000000771ef0\n[83428.295844] PKRU: 55555554\n[83428.295846] Call Trace:\n[83428.295848] \u003cTASK\u003e\n[83428.295850] _dev_printk+0x5c/0x80\n[83428.295857] ? srso_alias_return_thunk+0x5/0xfbef5\n[83428.295863] mpt3sas_transport_port_remove+0x1c7/0x420 [mpt3sas]\n[83428.295882] _scsih_remove_device+0x21b/0x280 [mpt3sas]\n[83428.295894] ? _scsih_expander_node_remove+0x108/0x140 [mpt3sas]\n[83428.295906] ? srso_alias_return_thunk+0x5/0xfbef5\n[83428.295910] mpt3sas_device_remove_by_sas_address.part.0+0x8f/0x110 [mpt3sas]\n[83428.295921] _scsih_expander_node_remove+0x129/0x140 [mpt3sas]\n[83428.295933] _scsih_expander_node_remove+0x6a/0x140 [mpt3sas]\n[83428.295944] scsih_remove+0x3f0/0x4a0 [mpt3sas]\n[83428.295957] pci_device_remove+0x3b/0xb0\n[83428.295962] device_release_driver_internal+0x193/0x200\n[83428.295968] driver_detach+0x44/0x90\n[83428.295971] bus_remove_driver+0x69/0xf0\n[83428.295975] pci_unregister_driver+0x2a/0xb0\n[83428.295979] _mpt3sas_exit+0x1f/0x300 [mpt3sas]\n[83428.295991] __do_sys_delete_module.constprop.0+0x174/0x310\n[83428.295997] ? srso_alias_return_thunk+0x5/0xfbef5\n[83428.296000] ? __x64_sys_getdents64+0x9a/0x110\n[83428.296005] ? srso_alias_return_thunk+0x5/0xfbef5\n[83428.296009] ? syscall_trace_enter+0xf6/0x1b0\n[83428.296014] do_syscall_64+0x7b/0x2c0\n[83428.296019] ? srso_alias_return_thunk+0x5/0xfbef5\n[83428.296023] entry_SYSCALL_64_after_hwframe+0x76/0x7e",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.8.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40115",
"url": "https://www.suse.com/security/cve/CVE-2025-40115"
},
{
"category": "external",
"summary": "SUSE Bug 1253318 for CVE-2025-40115",
"url": "https://bugzilla.suse.com/1253318"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.8.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.8.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-19T16:46:47Z",
"details": "moderate"
}
],
"title": "CVE-2025-40115"
},
{
"cve": "CVE-2025-40116",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40116"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nusb: host: max3421-hcd: Fix error pointer dereference in probe cleanup\n\nThe kthread_run() function returns error pointers so the\nmax3421_hcd-\u003espi_thread pointer can be either error pointers or NULL.\nCheck for both before dereferencing it.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.8.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40116",
"url": "https://www.suse.com/security/cve/CVE-2025-40116"
},
{
"category": "external",
"summary": "SUSE Bug 1253324 for CVE-2025-40116",
"url": "https://bugzilla.suse.com/1253324"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.8.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.8.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-19T16:46:47Z",
"details": "moderate"
}
],
"title": "CVE-2025-40116"
},
{
"cve": "CVE-2025-40118",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40118"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nscsi: pm80xx: Fix array-index-out-of-of-bounds on rmmod\n\nSince commit f7b705c238d1 (\"scsi: pm80xx: Set phy_attached to zero when\ndevice is gone\") UBSAN reports:\n\n UBSAN: array-index-out-of-bounds in drivers/scsi/pm8001/pm8001_sas.c:786:17\n index 28 is out of range for type \u0027pm8001_phy [16]\u0027\n\non rmmod when using an expander.\n\nFor a direct attached device, attached_phy contains the local phy id.\nFor a device behind an expander, attached_phy contains the remote phy\nid, not the local phy id.\n\nI.e. while pm8001_ha will have pm8001_ha-\u003echip-\u003en_phy local phys, for a\ndevice behind an expander, attached_phy can be much larger than\npm8001_ha-\u003echip-\u003en_phy (depending on the amount of phys of the\nexpander).\n\nE.g. on my system pm8001_ha has 8 phys with phy ids 0-7. One of the\nports has an expander connected. The expander has 31 phys with phy ids\n0-30.\n\nThe pm8001_ha-\u003ephy array only contains the phys of the HBA. It does not\ncontain the phys of the expander. Thus, it is wrong to use attached_phy\nto index the pm8001_ha-\u003ephy array for a device behind an expander.\n\nThus, we can only clear phy_attached for devices that are directly\nattached.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.8.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40118",
"url": "https://www.suse.com/security/cve/CVE-2025-40118"
},
{
"category": "external",
"summary": "SUSE Bug 1253363 for CVE-2025-40118",
"url": "https://bugzilla.suse.com/1253363"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.8.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.1,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.8.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-19T16:46:47Z",
"details": "moderate"
}
],
"title": "CVE-2025-40118"
},
{
"cve": "CVE-2025-40120",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40120"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnet: usb: asix: hold PM usage ref to avoid PM/MDIO + RTNL deadlock\n\nPrevent USB runtime PM (autosuspend) for AX88772* in bind.\n\nusbnet enables runtime PM (autosuspend) by default, so disabling it via\nthe usb_driver flag is ineffective. On AX88772B, autosuspend shows no\nmeasurable power saving with current driver (no link partner, admin\nup/down). The ~0.453 W -\u003e ~0.248 W drop on v6.1 comes from phylib powering\nthe PHY off on admin-down, not from USB autosuspend.\n\nThe real hazard is that with runtime PM enabled, ndo_open() (under RTNL)\nmay synchronously trigger autoresume (usb_autopm_get_interface()) into\nasix_resume() while the USB PM lock is held. Resume paths then invoke\nphylink/phylib and MDIO, which also expect RTNL, leading to possible\ndeadlocks or PM lock vs MDIO wake issues.\n\nTo avoid this, keep the device runtime-PM active by taking a usage\nreference in ax88772_bind() and dropping it in unbind(). A non-zero PM\nusage count blocks runtime suspend regardless of userspace policy\n(.../power/control - pm_runtime_allow/forbid), making this approach\nrobust against sysfs overrides.\n\nHolding a runtime-PM usage ref does not affect system-wide suspend;\nsystem sleep/resume callbacks continue to run as before.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.8.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40120",
"url": "https://www.suse.com/security/cve/CVE-2025-40120"
},
{
"category": "external",
"summary": "SUSE Bug 1253360 for CVE-2025-40120",
"url": "https://bugzilla.suse.com/1253360"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.8.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.8.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-19T16:46:47Z",
"details": "moderate"
}
],
"title": "CVE-2025-40120"
},
{
"cve": "CVE-2025-40121",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40121"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nASoC: Intel: bytcr_rt5651: Fix invalid quirk input mapping\n\nWhen an invalid value is passed via quirk option, currently\nbytcr_rt5640 driver just ignores and leaves as is, which may lead to\nunepxected results like OOB access.\n\nThis patch adds the sanity check and corrects the input mapping to the\ncertain default value if an invalid value is passed.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.8.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40121",
"url": "https://www.suse.com/security/cve/CVE-2025-40121"
},
{
"category": "external",
"summary": "SUSE Bug 1253367 for CVE-2025-40121",
"url": "https://bugzilla.suse.com/1253367"
},
{
"category": "external",
"summary": "SUSE Bug 1253430 for CVE-2025-40121",
"url": "https://bugzilla.suse.com/1253430"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.8.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.8.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-19T16:46:47Z",
"details": "moderate"
}
],
"title": "CVE-2025-40121"
},
{
"cve": "CVE-2025-40127",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40127"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nhwrng: ks-sa - fix division by zero in ks_sa_rng_init\n\nFix division by zero in ks_sa_rng_init caused by missing clock\npointer initialization. The clk_get_rate() call is performed on\nan uninitialized clk pointer, resulting in division by zero when\ncalculating delay values.\n\nAdd clock initialization code before using the clock.\n\n\n drivers/char/hw_random/ks-sa-rng.c | 7 +++++++\n 1 file changed, 7 insertions(+)",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.8.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40127",
"url": "https://www.suse.com/security/cve/CVE-2025-40127"
},
{
"category": "external",
"summary": "SUSE Bug 1253369 for CVE-2025-40127",
"url": "https://bugzilla.suse.com/1253369"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.8.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.8.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-19T16:46:47Z",
"details": "moderate"
}
],
"title": "CVE-2025-40127"
},
{
"cve": "CVE-2025-40129",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40129"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nsunrpc: fix null pointer dereference on zero-length checksum\n\nIn xdr_stream_decode_opaque_auth(), zero-length checksum.len causes\nchecksum.data to be set to NULL. This triggers a NPD when accessing\nchecksum.data in gss_krb5_verify_mic_v2(). This patch ensures that\nthe value of checksum.len is not less than XDR_UNIT.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.8.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40129",
"url": "https://www.suse.com/security/cve/CVE-2025-40129"
},
{
"category": "external",
"summary": "SUSE Bug 1253472 for CVE-2025-40129",
"url": "https://bugzilla.suse.com/1253472"
},
{
"category": "external",
"summary": "SUSE Bug 1253473 for CVE-2025-40129",
"url": "https://bugzilla.suse.com/1253473"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.8.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.8.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-19T16:46:47Z",
"details": "important"
}
],
"title": "CVE-2025-40129"
},
{
"cve": "CVE-2025-40132",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40132"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nASoC: Intel: sof_sdw: Prevent jump to NULL add_sidecar callback\n\nIn create_sdw_dailink() check that sof_end-\u003ecodec_info-\u003eadd_sidecar\nis not NULL before calling it.\n\nThe original code assumed that if include_sidecar is true, the codec\non that link has an add_sidecar callback. But there could be other\ncodecs on the same link that do not have an add_sidecar callback.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.8.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40132",
"url": "https://www.suse.com/security/cve/CVE-2025-40132"
},
{
"category": "external",
"summary": "SUSE Bug 1253330 for CVE-2025-40132",
"url": "https://bugzilla.suse.com/1253330"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.8.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.8.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-19T16:46:47Z",
"details": "moderate"
}
],
"title": "CVE-2025-40132"
},
{
"cve": "CVE-2025-40133",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40133"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nmptcp: Use __sk_dst_get() and dst_dev_rcu() in mptcp_active_enable().\n\nmptcp_active_enable() is called from subflow_finish_connect(),\nwhich is icsk-\u003eicsk_af_ops-\u003esk_rx_dst_set() and it\u0027s not always\nunder RCU.\n\nUsing sk_dst_get(sk)-\u003edev could trigger UAF.\n\nLet\u0027s use __sk_dst_get() and dst_dev_rcu().",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.8.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40133",
"url": "https://www.suse.com/security/cve/CVE-2025-40133"
},
{
"category": "external",
"summary": "SUSE Bug 1253328 for CVE-2025-40133",
"url": "https://bugzilla.suse.com/1253328"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.8.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.8.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-19T16:46:47Z",
"details": "moderate"
}
],
"title": "CVE-2025-40133"
},
{
"cve": "CVE-2025-40134",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40134"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\ndm: fix NULL pointer dereference in __dm_suspend()\n\nThere is a race condition between dm device suspend and table load that\ncan lead to null pointer dereference. The issue occurs when suspend is\ninvoked before table load completes:\n\nBUG: kernel NULL pointer dereference, address: 0000000000000054\nOops: 0000 [#1] PREEMPT SMP PTI\nCPU: 6 PID: 6798 Comm: dmsetup Not tainted 6.6.0-g7e52f5f0ca9b #62\nHardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.16.1-2.fc37 04/01/2014\nRIP: 0010:blk_mq_wait_quiesce_done+0x0/0x50\nCall Trace:\n \u003cTASK\u003e\n blk_mq_quiesce_queue+0x2c/0x50\n dm_stop_queue+0xd/0x20\n __dm_suspend+0x130/0x330\n dm_suspend+0x11a/0x180\n dev_suspend+0x27e/0x560\n ctl_ioctl+0x4cf/0x850\n dm_ctl_ioctl+0xd/0x20\n vfs_ioctl+0x1d/0x50\n __se_sys_ioctl+0x9b/0xc0\n __x64_sys_ioctl+0x19/0x30\n x64_sys_call+0x2c4a/0x4620\n do_syscall_64+0x9e/0x1b0\n\nThe issue can be triggered as below:\n\nT1 \t\t\t\t\t\tT2\ndm_suspend\t\t\t\t\ttable_load\n__dm_suspend\t\t\t\t\tdm_setup_md_queue\n\t\t\t\t\t\tdm_mq_init_request_queue\n\t\t\t\t\t\tblk_mq_init_allocated_queue\n\t\t\t\t\t\t=\u003e q-\u003emq_ops = set-\u003eops; (1)\ndm_stop_queue / dm_wait_for_completion\n=\u003e q-\u003etag_set NULL pointer!\t(2)\n\t\t\t\t\t\t=\u003e q-\u003etag_set = set; (3)\n\nFix this by checking if a valid table (map) exists before performing\nrequest-based suspend and waiting for target I/O. When map is NULL,\nskip these table-dependent suspend steps.\n\nEven when map is NULL, no I/O can reach any target because there is\nno table loaded; I/O submitted in this state will fail early in the\nDM layer. Skipping the table-dependent suspend logic in this case\nis safe and avoids NULL pointer dereferences.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.8.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40134",
"url": "https://www.suse.com/security/cve/CVE-2025-40134"
},
{
"category": "external",
"summary": "SUSE Bug 1253386 for CVE-2025-40134",
"url": "https://bugzilla.suse.com/1253386"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.8.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.7,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.8.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-19T16:46:47Z",
"details": "moderate"
}
],
"title": "CVE-2025-40134"
},
{
"cve": "CVE-2025-40135",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40135"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nipv6: use RCU in ip6_xmit()\n\nUse RCU in ip6_xmit() in order to use dst_dev_rcu() to prevent\npossible UAF.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.8.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40135",
"url": "https://www.suse.com/security/cve/CVE-2025-40135"
},
{
"category": "external",
"summary": "SUSE Bug 1253342 for CVE-2025-40135",
"url": "https://bugzilla.suse.com/1253342"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.8.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.1,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.8.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-19T16:46:47Z",
"details": "moderate"
}
],
"title": "CVE-2025-40135"
},
{
"cve": "CVE-2025-40139",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40139"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nsmc: Use __sk_dst_get() and dst_dev_rcu() in in smc_clc_prfx_set().\n\nsmc_clc_prfx_set() is called during connect() and not under RCU\nnor RTNL.\n\nUsing sk_dst_get(sk)-\u003edev could trigger UAF.\n\nLet\u0027s use __sk_dst_get() and dev_dst_rcu() under rcu_read_lock()\nafter kernel_getsockname().\n\nNote that the returned value of smc_clc_prfx_set() is not used\nin the caller.\n\nWhile at it, we change the 1st arg of smc_clc_prfx_set[46]_rcu()\nnot to touch dst there.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.8.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40139",
"url": "https://www.suse.com/security/cve/CVE-2025-40139"
},
{
"category": "external",
"summary": "SUSE Bug 1253409 for CVE-2025-40139",
"url": "https://bugzilla.suse.com/1253409"
},
{
"category": "external",
"summary": "SUSE Bug 1253411 for CVE-2025-40139",
"url": "https://bugzilla.suse.com/1253411"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.8.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.8.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-19T16:46:47Z",
"details": "important"
}
],
"title": "CVE-2025-40139"
},
{
"cve": "CVE-2025-40140",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40140"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnet: usb: Remove disruptive netif_wake_queue in rtl8150_set_multicast\n\nsyzbot reported WARNING in rtl8150_start_xmit/usb_submit_urb.\nThis is the sequence of events that leads to the warning:\n\nrtl8150_start_xmit() {\n\tnetif_stop_queue();\n\tusb_submit_urb(dev-\u003etx_urb);\n}\n\nrtl8150_set_multicast() {\n\tnetif_stop_queue();\n\tnetif_wake_queue();\t\t\u003c-- wakes up TX queue before URB is done\n}\n\nrtl8150_start_xmit() {\n\tnetif_stop_queue();\n\tusb_submit_urb(dev-\u003etx_urb);\t\u003c-- double submission\n}\n\nrtl8150_set_multicast being the ndo_set_rx_mode callback should not be\ncalling netif_stop_queue and notif_start_queue as these handle\nTX queue synchronization.\n\nThe net core function dev_set_rx_mode handles the synchronization\nfor rtl8150_set_multicast making it safe to remove these locks.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.8.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40140",
"url": "https://www.suse.com/security/cve/CVE-2025-40140"
},
{
"category": "external",
"summary": "SUSE Bug 1253349 for CVE-2025-40140",
"url": "https://bugzilla.suse.com/1253349"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.8.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.3,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.8.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-19T16:46:47Z",
"details": "low"
}
],
"title": "CVE-2025-40140"
},
{
"cve": "CVE-2025-40141",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40141"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nBluetooth: ISO: Fix possible UAF on iso_conn_free\n\nThis attempt to fix similar issue to sco_conn_free where if the\nconn-\u003esk is not set to NULL may lead to UAF on iso_conn_free.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.8.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40141",
"url": "https://www.suse.com/security/cve/CVE-2025-40141"
},
{
"category": "external",
"summary": "SUSE Bug 1253352 for CVE-2025-40141",
"url": "https://bugzilla.suse.com/1253352"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.8.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.8.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-19T16:46:47Z",
"details": "moderate"
}
],
"title": "CVE-2025-40141"
},
{
"cve": "CVE-2025-40142",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40142"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nALSA: pcm: Disable bottom softirqs as part of spin_lock_irq() on PREEMPT_RT\n\nsnd_pcm_group_lock_irq() acquires a spinlock_t and disables interrupts\nvia spin_lock_irq(). This also implicitly disables the handling of\nsoftirqs such as TIMER_SOFTIRQ.\nOn PREEMPT_RT softirqs are preemptible and spin_lock_irq() does not\ndisable them. That means a timer can be invoked during spin_lock_irq()\non the same CPU. Due to synchronisations reasons local_bh_disable() has\na per-CPU lock named softirq_ctrl.lock which synchronizes individual\nsoftirq against each other.\nsyz-bot managed to trigger a lockdep report where softirq_ctrl.lock is\nacquired in hrtimer_cancel() in addition to hrtimer_run_softirq(). This\nis a possible deadlock.\n\nThe softirq_ctrl.lock can not be made part of spin_lock_irq() as this\nwould lead to too much synchronisation against individual threads on the\nsystem. To avoid the possible deadlock, softirqs must be manually\ndisabled before the lock is acquired.\n\nDisable softirqs before the lock is acquired on PREEMPT_RT.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.8.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40142",
"url": "https://www.suse.com/security/cve/CVE-2025-40142"
},
{
"category": "external",
"summary": "SUSE Bug 1253348 for CVE-2025-40142",
"url": "https://bugzilla.suse.com/1253348"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.8.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.7,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.8.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-19T16:46:47Z",
"details": "moderate"
}
],
"title": "CVE-2025-40142"
},
{
"cve": "CVE-2025-40149",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40149"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\ntls: Use __sk_dst_get() and dst_dev_rcu() in get_netdev_for_sock().\n\nget_netdev_for_sock() is called during setsockopt(),\nso not under RCU.\n\nUsing sk_dst_get(sk)-\u003edev could trigger UAF.\n\nLet\u0027s use __sk_dst_get() and dst_dev_rcu().\n\nNote that the only -\u003endo_sk_get_lower_dev() user is\nbond_sk_get_lower_dev(), which uses RCU.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.8.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40149",
"url": "https://www.suse.com/security/cve/CVE-2025-40149"
},
{
"category": "external",
"summary": "SUSE Bug 1253355 for CVE-2025-40149",
"url": "https://bugzilla.suse.com/1253355"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.8.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.8.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-19T16:46:47Z",
"details": "moderate"
}
],
"title": "CVE-2025-40149"
},
{
"cve": "CVE-2025-40153",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40153"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nmm: hugetlb: avoid soft lockup when mprotect to large memory area\n\nWhen calling mprotect() to a large hugetlb memory area in our customer\u0027s\nworkload (~300GB hugetlb memory), soft lockup was observed:\n\nwatchdog: BUG: soft lockup - CPU#98 stuck for 23s! [t2_new_sysv:126916]\n\nCPU: 98 PID: 126916 Comm: t2_new_sysv Kdump: loaded Not tainted 6.17-rc7\nHardware name: GIGACOMPUTING R2A3-T40-AAV1/Jefferson CIO, BIOS 5.4.4.1 07/15/2025\npstate: 20400009 (nzCv daif +PAN -UAO -TCO -DIT -SSBS BTYPE=--)\npc : mte_clear_page_tags+0x14/0x24\nlr : mte_sync_tags+0x1c0/0x240\nsp : ffff80003150bb80\nx29: ffff80003150bb80 x28: ffff00739e9705a8 x27: 0000ffd2d6a00000\nx26: 0000ff8e4bc00000 x25: 00e80046cde00f45 x24: 0000000000022458\nx23: 0000000000000000 x22: 0000000000000004 x21: 000000011b380000\nx20: ffff000000000000 x19: 000000011b379f40 x18: 0000000000000000\nx17: 0000000000000000 x16: 0000000000000000 x15: 0000000000000000\nx14: 0000000000000000 x13: 0000000000000000 x12: 0000000000000000\nx11: 0000000000000000 x10: 0000000000000000 x9 : ffffc875e0aa5e2c\nx8 : 0000000000000000 x7 : 0000000000000000 x6 : 0000000000000000\nx5 : fffffc01ce7a5c00 x4 : 00000000046cde00 x3 : fffffc0000000000\nx2 : 0000000000000004 x1 : 0000000000000040 x0 : ffff0046cde7c000\n\nCall trace:\n mte_clear_page_tags+0x14/0x24\n set_huge_pte_at+0x25c/0x280\n hugetlb_change_protection+0x220/0x430\n change_protection+0x5c/0x8c\n mprotect_fixup+0x10c/0x294\n do_mprotect_pkey.constprop.0+0x2e0/0x3d4\n __arm64_sys_mprotect+0x24/0x44\n invoke_syscall+0x50/0x160\n el0_svc_common+0x48/0x144\n do_el0_svc+0x30/0xe0\n el0_svc+0x30/0xf0\n el0t_64_sync_handler+0xc4/0x148\n el0t_64_sync+0x1a4/0x1a8\n\nSoft lockup is not triggered with THP or base page because there is\ncond_resched() called for each PMD size.\n\nAlthough the soft lockup was triggered by MTE, it should be not MTE\nspecific. The other processing which takes long time in the loop may\ntrigger soft lockup too.\n\nSo add cond_resched() for hugetlb to avoid soft lockup.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.8.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40153",
"url": "https://www.suse.com/security/cve/CVE-2025-40153"
},
{
"category": "external",
"summary": "SUSE Bug 1253408 for CVE-2025-40153",
"url": "https://bugzilla.suse.com/1253408"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.8.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.3,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.8.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-19T16:46:47Z",
"details": "low"
}
],
"title": "CVE-2025-40153"
},
{
"cve": "CVE-2025-40154",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40154"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nASoC: Intel: bytcr_rt5640: Fix invalid quirk input mapping\n\nWhen an invalid value is passed via quirk option, currently\nbytcr_rt5640 driver only shows an error message but leaves as is.\nThis may lead to unepxected results like OOB access.\n\nThis patch corrects the input mapping to the certain default value if\nan invalid value is passed.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.8.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40154",
"url": "https://www.suse.com/security/cve/CVE-2025-40154"
},
{
"category": "external",
"summary": "SUSE Bug 1253431 for CVE-2025-40154",
"url": "https://bugzilla.suse.com/1253431"
},
{
"category": "external",
"summary": "SUSE Bug 1253432 for CVE-2025-40154",
"url": "https://bugzilla.suse.com/1253432"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.8.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.8.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-19T16:46:47Z",
"details": "moderate"
}
],
"title": "CVE-2025-40154"
},
{
"cve": "CVE-2025-40156",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40156"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nPM / devfreq: mtk-cci: Fix potential error pointer dereference in probe()\n\nThe drv-\u003esram_reg pointer could be set to ERR_PTR(-EPROBE_DEFER) which\nwould lead to a error pointer dereference. Use IS_ERR_OR_NULL() to check\nthat the pointer is valid.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.8.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40156",
"url": "https://www.suse.com/security/cve/CVE-2025-40156"
},
{
"category": "external",
"summary": "SUSE Bug 1253428 for CVE-2025-40156",
"url": "https://bugzilla.suse.com/1253428"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.8.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.8.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-19T16:46:47Z",
"details": "moderate"
}
],
"title": "CVE-2025-40156"
},
{
"cve": "CVE-2025-40157",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40157"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nEDAC/i10nm: Skip DIMM enumeration on a disabled memory controller\n\nWhen loading the i10nm_edac driver on some Intel Granite Rapids servers,\na call trace may appear as follows:\n\n UBSAN: shift-out-of-bounds in drivers/edac/skx_common.c:453:16\n shift exponent -66 is negative\n ...\n __ubsan_handle_shift_out_of_bounds+0x1e3/0x390\n skx_get_dimm_info.cold+0x47/0xd40 [skx_edac_common]\n i10nm_get_dimm_config+0x23e/0x390 [i10nm_edac]\n skx_register_mci+0x159/0x220 [skx_edac_common]\n i10nm_init+0xcb0/0x1ff0 [i10nm_edac]\n ...\n\nThis occurs because some BIOS may disable a memory controller if there\naren\u0027t any memory DIMMs populated on this memory controller. The DIMMMTR\nregister of this disabled memory controller contains the invalid value\n~0, resulting in the call trace above.\n\nFix this call trace by skipping DIMM enumeration on a disabled memory\ncontroller.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.8.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40157",
"url": "https://www.suse.com/security/cve/CVE-2025-40157"
},
{
"category": "external",
"summary": "SUSE Bug 1253423 for CVE-2025-40157",
"url": "https://bugzilla.suse.com/1253423"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.8.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.2,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:L/I:L/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.8.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-19T16:46:47Z",
"details": "moderate"
}
],
"title": "CVE-2025-40157"
},
{
"cve": "CVE-2025-40158",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40158"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nipv6: use RCU in ip6_output()\n\nUse RCU in ip6_output() in order to use dst_dev_rcu() to prevent\npossible UAF.\n\nWe can remove rcu_read_lock()/rcu_read_unlock() pairs\nfrom ip6_finish_output2().",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.8.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40158",
"url": "https://www.suse.com/security/cve/CVE-2025-40158"
},
{
"category": "external",
"summary": "SUSE Bug 1253402 for CVE-2025-40158",
"url": "https://bugzilla.suse.com/1253402"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.8.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.8.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-19T16:46:47Z",
"details": "moderate"
}
],
"title": "CVE-2025-40158"
},
{
"cve": "CVE-2025-40159",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40159"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nxsk: Harden userspace-supplied xdp_desc validation\n\nTurned out certain clearly invalid values passed in xdp_desc from\nuserspace can pass xp_{,un}aligned_validate_desc() and then lead\nto UBs or just invalid frames to be queued for xmit.\n\ndesc-\u003elen close to ``U32_MAX`` with a non-zero pool-\u003etx_metadata_len\ncan cause positive integer overflow and wraparound, the same way low\nenough desc-\u003eaddr with a non-zero pool-\u003etx_metadata_len can cause\nnegative integer overflow. Both scenarios can then pass the\nvalidation successfully.\nThis doesn\u0027t happen with valid XSk applications, but can be used\nto perform attacks.\n\nAlways promote desc-\u003elen to ``u64`` first to exclude positive\noverflows of it. Use explicit check_{add,sub}_overflow() when\nvalidating desc-\u003eaddr (which is ``u64`` already).\n\nbloat-o-meter reports a little growth of the code size:\n\nadd/remove: 0/0 grow/shrink: 2/1 up/down: 60/-16 (44)\nFunction old new delta\nxskq_cons_peek_desc 299 330 +31\nxsk_tx_peek_release_desc_batch 973 1002 +29\nxsk_generic_xmit 3148 3132 -16\n\nbut hopefully this doesn\u0027t hurt the performance much.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.8.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40159",
"url": "https://www.suse.com/security/cve/CVE-2025-40159"
},
{
"category": "external",
"summary": "SUSE Bug 1253403 for CVE-2025-40159",
"url": "https://bugzilla.suse.com/1253403"
},
{
"category": "external",
"summary": "SUSE Bug 1253404 for CVE-2025-40159",
"url": "https://bugzilla.suse.com/1253404"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.8.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.8.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-19T16:46:47Z",
"details": "important"
}
],
"title": "CVE-2025-40159"
},
{
"cve": "CVE-2025-40161",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40161"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nmailbox: zynqmp-ipi: Fix SGI cleanup on unbind\n\nThe driver incorrectly determines SGI vs SPI interrupts by checking IRQ\nnumber \u003c 16, which fails with dynamic IRQ allocation. During unbind,\nthis causes improper SGI cleanup leading to kernel crash.\n\nAdd explicit irq_type field to pdata for reliable identification of SGI\ninterrupts (type-2) and only clean up SGI resources when appropriate.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.8.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40161",
"url": "https://www.suse.com/security/cve/CVE-2025-40161"
},
{
"category": "external",
"summary": "SUSE Bug 1253410 for CVE-2025-40161",
"url": "https://bugzilla.suse.com/1253410"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.8.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.1,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.8.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-19T16:46:47Z",
"details": "moderate"
}
],
"title": "CVE-2025-40161"
},
{
"cve": "CVE-2025-40162",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40162"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nASoC: amd/sdw_utils: avoid NULL deref when devm_kasprintf() fails\n\ndevm_kasprintf() may return NULL on memory allocation failure,\nbut the debug message prints cpus-\u003edai_name before checking it.\nMove the dev_dbg() call after the NULL check to prevent potential\nNULL pointer dereference.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.8.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40162",
"url": "https://www.suse.com/security/cve/CVE-2025-40162"
},
{
"category": "external",
"summary": "SUSE Bug 1253422 for CVE-2025-40162",
"url": "https://bugzilla.suse.com/1253422"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.8.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.8.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-19T16:46:47Z",
"details": "moderate"
}
],
"title": "CVE-2025-40162"
},
{
"cve": "CVE-2025-40164",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40164"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nusbnet: Fix using smp_processor_id() in preemptible code warnings\n\nSyzbot reported the following warning:\n\nBUG: using smp_processor_id() in preemptible [00000000] code: dhcpcd/2879\ncaller is usbnet_skb_return+0x74/0x490 drivers/net/usb/usbnet.c:331\nCPU: 1 UID: 0 PID: 2879 Comm: dhcpcd Not tainted 6.15.0-rc4-syzkaller-00098-g615dca38c2ea #0 PREEMPT(voluntary)\nCall Trace:\n \u003cTASK\u003e\n __dump_stack lib/dump_stack.c:94 [inline]\n dump_stack_lvl+0x16c/0x1f0 lib/dump_stack.c:120\n check_preemption_disabled+0xd0/0xe0 lib/smp_processor_id.c:49\n usbnet_skb_return+0x74/0x490 drivers/net/usb/usbnet.c:331\n usbnet_resume_rx+0x4b/0x170 drivers/net/usb/usbnet.c:708\n usbnet_change_mtu+0x1be/0x220 drivers/net/usb/usbnet.c:417\n __dev_set_mtu net/core/dev.c:9443 [inline]\n netif_set_mtu_ext+0x369/0x5c0 net/core/dev.c:9496\n netif_set_mtu+0xb0/0x160 net/core/dev.c:9520\n dev_set_mtu+0xae/0x170 net/core/dev_api.c:247\n dev_ifsioc+0xa31/0x18d0 net/core/dev_ioctl.c:572\n dev_ioctl+0x223/0x10e0 net/core/dev_ioctl.c:821\n sock_do_ioctl+0x19d/0x280 net/socket.c:1204\n sock_ioctl+0x42f/0x6a0 net/socket.c:1311\n vfs_ioctl fs/ioctl.c:51 [inline]\n __do_sys_ioctl fs/ioctl.c:906 [inline]\n __se_sys_ioctl fs/ioctl.c:892 [inline]\n __x64_sys_ioctl+0x190/0x200 fs/ioctl.c:892\n do_syscall_x64 arch/x86/entry/syscall_64.c:63 [inline]\n do_syscall_64+0xcd/0x260 arch/x86/entry/syscall_64.c:94\n entry_SYSCALL_64_after_hwframe+0x77/0x7f\n\nFor historical and portability reasons, the netif_rx() is usually\nrun in the softirq or interrupt context, this commit therefore add\nlocal_bh_disable/enable() protection in the usbnet_resume_rx().",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.8.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40164",
"url": "https://www.suse.com/security/cve/CVE-2025-40164"
},
{
"category": "external",
"summary": "SUSE Bug 1253407 for CVE-2025-40164",
"url": "https://bugzilla.suse.com/1253407"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.8.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.7,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.8.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-19T16:46:47Z",
"details": "moderate"
}
],
"title": "CVE-2025-40164"
},
{
"cve": "CVE-2025-40165",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40165"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nmedia: nxp: imx8-isi: m2m: Fix streaming cleanup on release\n\nIf streamon/streamoff calls are imbalanced, such as when exiting an\napplication with Ctrl+C when streaming, the m2m usage_count will never\nreach zero and the ISI channel won\u0027t be freed. Besides from that, if the\ninput line width is more than 2K, it will trigger a WARN_ON():\n\n[ 59.222120] ------------[ cut here ]------------\n[ 59.226758] WARNING: drivers/media/platform/nxp/imx8-isi/imx8-isi-hw.c:631 at mxc_isi_channel_chain+0xa4/0x120, CPU#4: v4l2-ctl/654\n[ 59.238569] Modules linked in: ap1302\n[ 59.242231] CPU: 4 UID: 0 PID: 654 Comm: v4l2-ctl Not tainted 6.16.0-rc4-next-20250704-06511-gff0e002d480a-dirty #258 PREEMPT\n[ 59.253597] Hardware name: NXP i.MX95 15X15 board (DT)\n[ 59.258720] pstate: 80400009 (Nzcv daif +PAN -UAO -TCO -DIT -SSBS BTYPE=--)\n[ 59.265669] pc : mxc_isi_channel_chain+0xa4/0x120\n[ 59.270358] lr : mxc_isi_channel_chain+0x44/0x120\n[ 59.275047] sp : ffff8000848c3b40\n[ 59.278348] x29: ffff8000848c3b40 x28: ffff0000859b4c98 x27: ffff800081939f00\n[ 59.285472] x26: 000000000000000a x25: ffff0000859b4cb8 x24: 0000000000000001\n[ 59.292597] x23: ffff0000816f4760 x22: ffff0000816f4258 x21: ffff000084ceb780\n[ 59.299720] x20: ffff000084342ff8 x19: ffff000084340000 x18: 0000000000000000\n[ 59.306845] x17: 0000000000000000 x16: 0000000000000000 x15: 0000ffffdb369e1c\n[ 59.313969] x14: 0000000000000000 x13: 0000000000000000 x12: 0000000000000000\n[ 59.321093] x11: 0000000000000000 x10: 0000000000000000 x9 : 0000000000000000\n[ 59.328217] x8 : ffff8000848c3d48 x7 : ffff800081930b30 x6 : ffff800081930b30\n[ 59.335340] x5 : ffff0000859b6000 x4 : ffff80008193ae80 x3 : ffff800081022420\n[ 59.342464] x2 : ffff0000852f6900 x1 : 0000000000000001 x0 : ffff000084341000\n[ 59.349590] Call trace:\n[ 59.352025] mxc_isi_channel_chain+0xa4/0x120 (P)\n[ 59.356722] mxc_isi_m2m_streamon+0x160/0x20c\n[ 59.361072] v4l_streamon+0x24/0x30\n[ 59.364556] __video_do_ioctl+0x40c/0x4a0\n[ 59.368560] video_usercopy+0x2bc/0x690\n[ 59.372382] video_ioctl2+0x18/0x24\n[ 59.375857] v4l2_ioctl+0x40/0x60\n[ 59.379168] __arm64_sys_ioctl+0xac/0x104\n[ 59.383172] invoke_syscall+0x48/0x104\n[ 59.386916] el0_svc_common.constprop.0+0xc0/0xe0\n[ 59.391613] do_el0_svc+0x1c/0x28\n[ 59.394915] el0_svc+0x34/0xf4\n[ 59.397966] el0t_64_sync_handler+0xa0/0xe4\n[ 59.402143] el0t_64_sync+0x198/0x19c\n[ 59.405801] ---[ end trace 0000000000000000 ]---\n\nAddress this issue by moving the streaming preparation and cleanup to\nthe vb2 .prepare_streaming() and .unprepare_streaming() operations. This\nalso simplifies the driver by allowing direct usage of the\nv4l2_m2m_ioctl_streamon() and v4l2_m2m_ioctl_streamoff() helpers.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.8.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40165",
"url": "https://www.suse.com/security/cve/CVE-2025-40165"
},
{
"category": "external",
"summary": "SUSE Bug 1253405 for CVE-2025-40165",
"url": "https://bugzilla.suse.com/1253405"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.8.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.7,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.8.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-19T16:46:47Z",
"details": "moderate"
}
],
"title": "CVE-2025-40165"
},
{
"cve": "CVE-2025-40166",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40166"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\ndrm/xe/guc: Check GuC running state before deregistering exec queue\n\nIn normal operation, a registered exec queue is disabled and\nderegistered through the GuC, and freed only after the GuC confirms\ncompletion. However, if the driver is forced to unbind while the exec\nqueue is still running, the user may call exec_destroy() after the GuC\nhas already been stopped and CT communication disabled.\n\nIn this case, the driver cannot receive a response from the GuC,\npreventing proper cleanup of exec queue resources. Fix this by directly\nreleasing the resources when GuC is not running.\n\nHere is the failure dmesg log:\n\"\n[ 468.089581] ---[ end trace 0000000000000000 ]---\n[ 468.089608] pci 0000:03:00.0: [drm] *ERROR* GT0: GUC ID manager unclean (1/65535)\n[ 468.090558] pci 0000:03:00.0: [drm] GT0: total 65535\n[ 468.090562] pci 0000:03:00.0: [drm] GT0: used 1\n[ 468.090564] pci 0000:03:00.0: [drm] GT0: range 1..1 (1)\n[ 468.092716] ------------[ cut here ]------------\n[ 468.092719] WARNING: CPU: 14 PID: 4775 at drivers/gpu/drm/xe/xe_ttm_vram_mgr.c:298 ttm_vram_mgr_fini+0xf8/0x130 [xe]\n\"\n\nv2: use xe_uc_fw_is_running() instead of xe_guc_ct_enabled().\n As CT may go down and come back during VF migration.\n\n(cherry picked from commit 9b42321a02c50a12b2beb6ae9469606257fbecea)",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.8.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40166",
"url": "https://www.suse.com/security/cve/CVE-2025-40166"
},
{
"category": "external",
"summary": "SUSE Bug 1253433 for CVE-2025-40166",
"url": "https://bugzilla.suse.com/1253433"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.8.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.8.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-19T16:46:47Z",
"details": "moderate"
}
],
"title": "CVE-2025-40166"
},
{
"cve": "CVE-2025-40168",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40168"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nsmc: Use __sk_dst_get() and dst_dev_rcu() in smc_clc_prfx_match().\n\nsmc_clc_prfx_match() is called from smc_listen_work() and\nnot under RCU nor RTNL.\n\nUsing sk_dst_get(sk)-\u003edev could trigger UAF.\n\nLet\u0027s use __sk_dst_get() and dst_dev_rcu().\n\nNote that the returned value of smc_clc_prfx_match() is not\nused in the caller.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.8.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40168",
"url": "https://www.suse.com/security/cve/CVE-2025-40168"
},
{
"category": "external",
"summary": "SUSE Bug 1253427 for CVE-2025-40168",
"url": "https://bugzilla.suse.com/1253427"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.8.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.8.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-19T16:46:47Z",
"details": "moderate"
}
],
"title": "CVE-2025-40168"
},
{
"cve": "CVE-2025-40169",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40169"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nbpf: Reject negative offsets for ALU ops\n\nWhen verifying BPF programs, the check_alu_op() function validates\ninstructions with ALU operations. The \u0027offset\u0027 field in these\ninstructions is a signed 16-bit integer.\n\nThe existing check \u0027insn-\u003eoff \u003e 1\u0027 was intended to ensure the offset is\neither 0, or 1 for BPF_MOD/BPF_DIV. However, because \u0027insn-\u003eoff\u0027 is\nsigned, this check incorrectly accepts all negative values (e.g., -1).\n\nThis commit tightens the validation by changing the condition to\n\u0027(insn-\u003eoff != 0 \u0026\u0026 insn-\u003eoff != 1)\u0027. This ensures that any value\nother than the explicitly permitted 0 and 1 is rejected, hardening the\nverifier against malformed BPF programs.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.8.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40169",
"url": "https://www.suse.com/security/cve/CVE-2025-40169"
},
{
"category": "external",
"summary": "SUSE Bug 1253416 for CVE-2025-40169",
"url": "https://bugzilla.suse.com/1253416"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.8.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.8,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.8.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-19T16:46:47Z",
"details": "moderate"
}
],
"title": "CVE-2025-40169"
},
{
"cve": "CVE-2025-40171",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40171"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnvmet-fc: move lsop put work to nvmet_fc_ls_req_op\n\nIt\u0027s possible for more than one async command to be in flight from\n__nvmet_fc_send_ls_req. For each command, a tgtport reference is taken.\n\nIn the current code, only one put work item is queued at a time, which\nresults in a leaked reference.\n\nTo fix this, move the work item to the nvmet_fc_ls_req_op struct, which\nalready tracks all resources related to the command.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.8.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40171",
"url": "https://www.suse.com/security/cve/CVE-2025-40171"
},
{
"category": "external",
"summary": "SUSE Bug 1253412 for CVE-2025-40171",
"url": "https://bugzilla.suse.com/1253412"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.8.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.8.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-19T16:46:47Z",
"details": "moderate"
}
],
"title": "CVE-2025-40171"
},
{
"cve": "CVE-2025-40172",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40172"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\naccel/qaic: Treat remaining == 0 as error in find_and_map_user_pages()\n\nCurrently, if find_and_map_user_pages() takes a DMA xfer request from the\nuser with a length field set to 0, or in a rare case, the host receives\nQAIC_TRANS_DMA_XFER_CONT from the device where resources-\u003exferred_dma_size\nis equal to the requested transaction size, the function will return 0\nbefore allocating an sgt or setting the fields of the dma_xfer struct.\nIn that case, encode_addr_size_pairs() will try to access the sgt which\nwill lead to a general protection fault.\n\nReturn an EINVAL in case the user provides a zero-sized ALP, or the device\nrequests continuation after all of the bytes have been transferred.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.8.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40172",
"url": "https://www.suse.com/security/cve/CVE-2025-40172"
},
{
"category": "external",
"summary": "SUSE Bug 1253424 for CVE-2025-40172",
"url": "https://bugzilla.suse.com/1253424"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.8.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.8.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-19T16:46:47Z",
"details": "moderate"
}
],
"title": "CVE-2025-40172"
},
{
"cve": "CVE-2025-40173",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40173"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnet/ip6_tunnel: Prevent perpetual tunnel growth\n\nSimilarly to ipv4 tunnel, ipv6 version updates dev-\u003eneeded_headroom, too.\nWhile ipv4 tunnel headroom adjustment growth was limited in\ncommit 5ae1e9922bbd (\"net: ip_tunnel: prevent perpetual headroom growth\"),\nipv6 tunnel yet increases the headroom without any ceiling.\n\nReflect ipv4 tunnel headroom adjustment limit on ipv6 version.\n\nCredits to Francesco Ruggeri, who was originally debugging this issue\nand wrote local Arista-specific patch and a reproducer.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.8.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40173",
"url": "https://www.suse.com/security/cve/CVE-2025-40173"
},
{
"category": "external",
"summary": "SUSE Bug 1253421 for CVE-2025-40173",
"url": "https://bugzilla.suse.com/1253421"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.8.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.7,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.8.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-19T16:46:47Z",
"details": "moderate"
}
],
"title": "CVE-2025-40173"
},
{
"cve": "CVE-2025-40175",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40175"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nidpf: cleanup remaining SKBs in PTP flows\n\nWhen the driver requests Tx timestamp value, one of the first steps is\nto clone SKB using skb_get. It increases the reference counter for that\nSKB to prevent unexpected freeing by another component.\nHowever, there may be a case where the index is requested, SKB is\nassigned and never consumed by PTP flows - for example due to reset during\nrunning PTP apps.\n\nAdd a check in release timestamping function to verify if the SKB\nassigned to Tx timestamp latch was freed, and release remaining SKBs.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.8.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40175",
"url": "https://www.suse.com/security/cve/CVE-2025-40175"
},
{
"category": "external",
"summary": "SUSE Bug 1253426 for CVE-2025-40175",
"url": "https://bugzilla.suse.com/1253426"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.8.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.7,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.8.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-19T16:46:47Z",
"details": "moderate"
}
],
"title": "CVE-2025-40175"
},
{
"cve": "CVE-2025-40176",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40176"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\ntls: wait for pending async decryptions if tls_strp_msg_hold fails\n\nAsync decryption calls tls_strp_msg_hold to create a clone of the\ninput skb to hold references to the memory it uses. If we fail to\nallocate that clone, proceeding with async decryption can lead to\nvarious issues (UAF on the skb, writing into userspace memory after\nthe recv() call has returned).\n\nIn this case, wait for all pending decryption requests.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.8.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40176",
"url": "https://www.suse.com/security/cve/CVE-2025-40176"
},
{
"category": "external",
"summary": "SUSE Bug 1253425 for CVE-2025-40176",
"url": "https://bugzilla.suse.com/1253425"
},
{
"category": "external",
"summary": "SUSE Bug 1254100 for CVE-2025-40176",
"url": "https://bugzilla.suse.com/1254100"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.8.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.8.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-19T16:46:47Z",
"details": "important"
}
],
"title": "CVE-2025-40176"
},
{
"cve": "CVE-2025-40177",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40177"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\naccel/qaic: Fix bootlog initialization ordering\n\nAs soon as we queue MHI buffers to receive the bootlog from the device,\nwe could be receiving data. Therefore all the resources needed to\nprocess that data need to be setup prior to queuing the buffers.\n\nWe currently initialize some of the resources after queuing the buffers\nwhich creates a race between the probe() and any data that comes back\nfrom the device. If the uninitialized resources are accessed, we could\nsee page faults.\n\nFix the init ordering to close the race.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.8.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40177",
"url": "https://www.suse.com/security/cve/CVE-2025-40177"
},
{
"category": "external",
"summary": "SUSE Bug 1253443 for CVE-2025-40177",
"url": "https://bugzilla.suse.com/1253443"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.8.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.8.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-19T16:46:47Z",
"details": "moderate"
}
],
"title": "CVE-2025-40177"
},
{
"cve": "CVE-2025-40178",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40178"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\npid: Add a judgment for ns null in pid_nr_ns\n\n__task_pid_nr_ns\n ns = task_active_pid_ns(current);\n pid_nr_ns(rcu_dereference(*task_pid_ptr(task, type)), ns);\n if (pid \u0026\u0026 ns-\u003elevel \u003c= pid-\u003elevel) {\n\nSometimes null is returned for task_active_pid_ns. Then it will trigger kernel panic in pid_nr_ns.\n\nFor example:\n\tUnable to handle kernel NULL pointer dereference at virtual address 0000000000000058\n\tMem abort info:\n\tESR = 0x0000000096000007\n\tEC = 0x25: DABT (current EL), IL = 32 bits\n\tSET = 0, FnV = 0\n\tEA = 0, S1PTW = 0\n\tFSC = 0x07: level 3 translation fault\n\tData abort info:\n\tISV = 0, ISS = 0x00000007, ISS2 = 0x00000000\n\tCM = 0, WnR = 0, TnD = 0, TagAccess = 0\n\tGCS = 0, Overlay = 0, DirtyBit = 0, Xs = 0\n\tuser pgtable: 4k pages, 39-bit VAs, pgdp=00000002175aa000\n\t[0000000000000058] pgd=08000002175ab003, p4d=08000002175ab003, pud=08000002175ab003, pmd=08000002175be003, pte=0000000000000000\n\tpstate: 834000c5 (Nzcv daIF +PAN -UAO +TCO +DIT -SSBS BTYPE=--)\n\tpc : __task_pid_nr_ns+0x74/0xd0\n\tlr : __task_pid_nr_ns+0x24/0xd0\n\tsp : ffffffc08001bd10\n\tx29: ffffffc08001bd10 x28: ffffffd4422b2000 x27: 0000000000000001\n\tx26: ffffffd442821168 x25: ffffffd442821000 x24: 00000f89492eab31\n\tx23: 00000000000000c0 x22: ffffff806f5693c0 x21: ffffff806f5693c0\n\tx20: 0000000000000001 x19: 0000000000000000 x18: 0000000000000000\n\tx17: 00000000529c6ef0 x16: 00000000529c6ef0 x15: 00000000023a1adc\n\tx14: 0000000000000003 x13: 00000000007ef6d8 x12: 001167c391c78800\n\tx11: 00ffffffffffffff x10: 0000000000000000 x9 : 0000000000000001\n\tx8 : ffffff80816fa3c0 x7 : 0000000000000000 x6 : 49534d702d535449\n\tx5 : ffffffc080c4c2c0 x4 : ffffffd43ee128c8 x3 : ffffffd43ee124dc\n\tx2 : 0000000000000000 x1 : 0000000000000001 x0 : ffffff806f5693c0\n\tCall trace:\n\t__task_pid_nr_ns+0x74/0xd0\n\t...\n\t__handle_irq_event_percpu+0xd4/0x284\n\thandle_irq_event+0x48/0xb0\n\thandle_fasteoi_irq+0x160/0x2d8\n\tgeneric_handle_domain_irq+0x44/0x60\n\tgic_handle_irq+0x4c/0x114\n\tcall_on_irq_stack+0x3c/0x74\n\tdo_interrupt_handler+0x4c/0x84\n\tel1_interrupt+0x34/0x58\n\tel1h_64_irq_handler+0x18/0x24\n\tel1h_64_irq+0x68/0x6c\n\taccount_kernel_stack+0x60/0x144\n\texit_task_stack_account+0x1c/0x80\n\tdo_exit+0x7e4/0xaf8\n\t...\n\tget_signal+0x7bc/0x8d8\n\tdo_notify_resume+0x128/0x828\n\tel0_svc+0x6c/0x70\n\tel0t_64_sync_handler+0x68/0xbc\n\tel0t_64_sync+0x1a8/0x1ac\n\tCode: 35fffe54 911a02a8 f9400108 b4000128 (b9405a69)\n\t---[ end trace 0000000000000000 ]---\n\tKernel panic - not syncing: Oops: Fatal exception in interrupt",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.8.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40178",
"url": "https://www.suse.com/security/cve/CVE-2025-40178"
},
{
"category": "external",
"summary": "SUSE Bug 1253463 for CVE-2025-40178",
"url": "https://bugzilla.suse.com/1253463"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.8.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.8.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-19T16:46:47Z",
"details": "moderate"
}
],
"title": "CVE-2025-40178"
},
{
"cve": "CVE-2025-40180",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40180"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nmailbox: zynqmp-ipi: Fix out-of-bounds access in mailbox cleanup loop\n\nThe cleanup loop was starting at the wrong array index, causing\nout-of-bounds access.\nStart the loop at the correct index for zero-indexed arrays to prevent\naccessing memory beyond the allocated array bounds.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.8.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40180",
"url": "https://www.suse.com/security/cve/CVE-2025-40180"
},
{
"category": "external",
"summary": "SUSE Bug 1253440 for CVE-2025-40180",
"url": "https://bugzilla.suse.com/1253440"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.8.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.8.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-19T16:46:47Z",
"details": "moderate"
}
],
"title": "CVE-2025-40180"
},
{
"cve": "CVE-2025-40183",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40183"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nbpf: Fix metadata_dst leak __bpf_redirect_neigh_v{4,6}\n\nCilium has a BPF egress gateway feature which forces outgoing K8s Pod\ntraffic to pass through dedicated egress gateways which then SNAT the\ntraffic in order to interact with stable IPs outside the cluster.\n\nThe traffic is directed to the gateway via vxlan tunnel in collect md\nmode. A recent BPF change utilized the bpf_redirect_neigh() helper to\nforward packets after the arrival and decap on vxlan, which turned out\nover time that the kmalloc-256 slab usage in kernel was ever-increasing.\n\nThe issue was that vxlan allocates the metadata_dst object and attaches\nit through a fake dst entry to the skb. The latter was never released\nthough given bpf_redirect_neigh() was merely setting the new dst entry\nvia skb_dst_set() without dropping an existing one first.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.8.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40183",
"url": "https://www.suse.com/security/cve/CVE-2025-40183"
},
{
"category": "external",
"summary": "SUSE Bug 1253441 for CVE-2025-40183",
"url": "https://bugzilla.suse.com/1253441"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.8.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.8.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-19T16:46:47Z",
"details": "moderate"
}
],
"title": "CVE-2025-40183"
},
{
"cve": "CVE-2025-40185",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40185"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nice: ice_adapter: release xa entry on adapter allocation failure\n\nWhen ice_adapter_new() fails, the reserved XArray entry created by\nxa_insert() is not released. This causes subsequent insertions at\nthe same index to return -EBUSY, potentially leading to\nNULL pointer dereferences.\n\nReorder the operations as suggested by Przemek Kitszel:\n1. Check if adapter already exists (xa_load)\n2. Reserve the XArray slot (xa_reserve)\n3. Allocate the adapter (ice_adapter_new)\n4. Store the adapter (xa_store)",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.8.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40185",
"url": "https://www.suse.com/security/cve/CVE-2025-40185"
},
{
"category": "external",
"summary": "SUSE Bug 1253394 for CVE-2025-40185",
"url": "https://bugzilla.suse.com/1253394"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.8.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.8.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-19T16:46:47Z",
"details": "moderate"
}
],
"title": "CVE-2025-40185"
},
{
"cve": "CVE-2025-40186",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40186"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\ntcp: Don\u0027t call reqsk_fastopen_remove() in tcp_conn_request().\n\nsyzbot reported the splat below in tcp_conn_request(). [0]\n\nIf a listener is close()d while a TFO socket is being processed in\ntcp_conn_request(), inet_csk_reqsk_queue_add() does not set reqsk-\u003esk\nand calls inet_child_forget(), which calls tcp_disconnect() for the\nTFO socket.\n\nAfter the cited commit, tcp_disconnect() calls reqsk_fastopen_remove(),\nwhere reqsk_put() is called due to !reqsk-\u003esk.\n\nThen, reqsk_fastopen_remove() in tcp_conn_request() decrements the\nlast req-\u003ersk_refcnt and frees reqsk, and __reqsk_free() at the\ndrop_and_free label causes the refcount underflow for the listener\nand double-free of the reqsk.\n\nLet\u0027s remove reqsk_fastopen_remove() in tcp_conn_request().\n\nNote that other callers make sure tp-\u003efastopen_rsk is not NULL.\n\n[0]:\nrefcount_t: underflow; use-after-free.\nWARNING: CPU: 12 PID: 5563 at lib/refcount.c:28 refcount_warn_saturate (lib/refcount.c:28)\nModules linked in:\nCPU: 12 UID: 0 PID: 5563 Comm: syz-executor Not tainted syzkaller #0 PREEMPT(full)\nHardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025\nRIP: 0010:refcount_warn_saturate (lib/refcount.c:28)\nCode: ab e8 8e b4 98 ff 0f 0b c3 cc cc cc cc cc 80 3d a4 e4 d6 01 00 75 9c c6 05 9b e4 d6 01 01 48 c7 c7 e8 df fb ab e8 6a b4 98 ff \u003c0f\u003e 0b e9 03 5b 76 00 cc 80 3d 7d e4 d6 01 00 0f 85 74 ff ff ff c6\nRSP: 0018:ffffa79fc0304a98 EFLAGS: 00010246\nRAX: d83af4db1c6b3900 RBX: ffff9f65c7a69020 RCX: d83af4db1c6b3900\nRDX: 0000000000000000 RSI: 00000000ffff7fff RDI: ffffffffac78a280\nRBP: 000000009d781b60 R08: 0000000000007fff R09: ffffffffac6ca280\nR10: 0000000000017ffd R11: 0000000000000004 R12: ffff9f65c7b4f100\nR13: ffff9f65c7d23c00 R14: ffff9f65c7d26000 R15: ffff9f65c7a64ef8\nFS: 00007f9f962176c0(0000) GS:ffff9f65fcf00000(0000) knlGS:0000000000000000\nCS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033\nCR2: 0000200000000180 CR3: 000000000dbbe006 CR4: 0000000000372ef0\nCall Trace:\n \u003cIRQ\u003e\n tcp_conn_request (./include/linux/refcount.h:400 ./include/linux/refcount.h:432 ./include/linux/refcount.h:450 ./include/net/sock.h:1965 ./include/net/request_sock.h:131 net/ipv4/tcp_input.c:7301)\n tcp_rcv_state_process (net/ipv4/tcp_input.c:6708)\n tcp_v6_do_rcv (net/ipv6/tcp_ipv6.c:1670)\n tcp_v6_rcv (net/ipv6/tcp_ipv6.c:1906)\n ip6_protocol_deliver_rcu (net/ipv6/ip6_input.c:438)\n ip6_input (net/ipv6/ip6_input.c:500)\n ipv6_rcv (net/ipv6/ip6_input.c:311)\n __netif_receive_skb (net/core/dev.c:6104)\n process_backlog (net/core/dev.c:6456)\n __napi_poll (net/core/dev.c:7506)\n net_rx_action (net/core/dev.c:7569 net/core/dev.c:7696)\n handle_softirqs (kernel/softirq.c:579)\n do_softirq (kernel/softirq.c:480)\n \u003c/IRQ\u003e",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.8.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40186",
"url": "https://www.suse.com/security/cve/CVE-2025-40186"
},
{
"category": "external",
"summary": "SUSE Bug 1253438 for CVE-2025-40186",
"url": "https://bugzilla.suse.com/1253438"
},
{
"category": "external",
"summary": "SUSE Bug 1253439 for CVE-2025-40186",
"url": "https://bugzilla.suse.com/1253439"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.8.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.8.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-19T16:46:47Z",
"details": "important"
}
],
"title": "CVE-2025-40186"
},
{
"cve": "CVE-2025-40187",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40187"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnet/sctp: fix a null dereference in sctp_disposition sctp_sf_do_5_1D_ce()\n\nIf new_asoc-\u003epeer.adaptation_ind=0 and sctp_ulpevent_make_authkey=0\nand sctp_ulpevent_make_authkey() returns 0, then the variable\nai_ev remains zero and the zero will be dereferenced\nin the sctp_ulpevent_free() function.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.8.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40187",
"url": "https://www.suse.com/security/cve/CVE-2025-40187"
},
{
"category": "external",
"summary": "SUSE Bug 1253647 for CVE-2025-40187",
"url": "https://bugzilla.suse.com/1253647"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.8.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.1,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.8.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-19T16:46:47Z",
"details": "moderate"
}
],
"title": "CVE-2025-40187"
},
{
"cve": "CVE-2025-40188",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40188"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\npwm: berlin: Fix wrong register in suspend/resume\n\nThe \u0027enable\u0027 register should be BERLIN_PWM_EN rather than\nBERLIN_PWM_ENABLE, otherwise, the driver accesses wrong address, there\nwill be cpu exception then kernel panic during suspend/resume.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.8.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40188",
"url": "https://www.suse.com/security/cve/CVE-2025-40188"
},
{
"category": "external",
"summary": "SUSE Bug 1253449 for CVE-2025-40188",
"url": "https://bugzilla.suse.com/1253449"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.8.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.8.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-19T16:46:47Z",
"details": "moderate"
}
],
"title": "CVE-2025-40188"
},
{
"cve": "CVE-2025-40192",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40192"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nRevert \"ipmi: fix msg stack when IPMI is disconnected\"\n\nThis reverts commit c608966f3f9c2dca596967501d00753282b395fc.\n\nThis patch has a subtle bug that can cause the IPMI driver to go into an\ninfinite loop if the BMC misbehaves in a certain way. Apparently\ncertain BMCs do misbehave this way because several reports have come in\nrecently about this.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.8.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40192",
"url": "https://www.suse.com/security/cve/CVE-2025-40192"
},
{
"category": "external",
"summary": "SUSE Bug 1253622 for CVE-2025-40192",
"url": "https://bugzilla.suse.com/1253622"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.8.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.8.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-19T16:46:47Z",
"details": "moderate"
}
],
"title": "CVE-2025-40192"
},
{
"cve": "CVE-2025-40194",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40194"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\ncpufreq: intel_pstate: Fix object lifecycle issue in update_qos_request()\n\nThe cpufreq_cpu_put() call in update_qos_request() takes place too early\nbecause the latter subsequently calls freq_qos_update_request() that\nindirectly accesses the policy object in question through the QoS request\nobject passed to it.\n\nFortunately, update_qos_request() is called under intel_pstate_driver_lock,\nso this issue does not matter for changing the intel_pstate operation\nmode, but it theoretically can cause a crash to occur on CPU device hot\nremoval (which currently can only happen in virt, but it is formally\nsupported nevertheless).\n\nAddress this issue by modifying update_qos_request() to drop the\nreference to the policy later.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.8.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40194",
"url": "https://www.suse.com/security/cve/CVE-2025-40194"
},
{
"category": "external",
"summary": "SUSE Bug 1253445 for CVE-2025-40194",
"url": "https://bugzilla.suse.com/1253445"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.8.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.7,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.8.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-19T16:46:47Z",
"details": "moderate"
}
],
"title": "CVE-2025-40194"
},
{
"cve": "CVE-2025-40196",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40196"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nfs: quota: create dedicated workqueue for quota_release_work\n\nThere is a kernel panic due to WARN_ONCE when panic_on_warn is set.\n\nThis issue occurs when writeback is triggered due to sync call for an\nopened file(ie, writeback reason is WB_REASON_SYNC). When f2fs balance\nis needed at sync path, flush for quota_release_work is triggered.\nBy default quota_release_work is queued to \"events_unbound\" queue which\ndoes not have WQ_MEM_RECLAIM flag. During f2fs balance \"writeback\"\nworkqueue tries to flush quota_release_work causing kernel panic due to\nMEM_RECLAIM flag mismatch errors.\n\nThis patch creates dedicated workqueue with WQ_MEM_RECLAIM flag\nfor work quota_release_work.\n\n------------[ cut here ]------------\nWARNING: CPU: 4 PID: 14867 at kernel/workqueue.c:3721 check_flush_dependency+0x13c/0x148\nCall trace:\n check_flush_dependency+0x13c/0x148\n __flush_work+0xd0/0x398\n flush_delayed_work+0x44/0x5c\n dquot_writeback_dquots+0x54/0x318\n f2fs_do_quota_sync+0xb8/0x1a8\n f2fs_write_checkpoint+0x3cc/0x99c\n f2fs_gc+0x190/0x750\n f2fs_balance_fs+0x110/0x168\n f2fs_write_single_data_page+0x474/0x7dc\n f2fs_write_data_pages+0x7d0/0xd0c\n do_writepages+0xe0/0x2f4\n __writeback_single_inode+0x44/0x4ac\n writeback_sb_inodes+0x30c/0x538\n wb_writeback+0xf4/0x440\n wb_workfn+0x128/0x5d4\n process_scheduled_works+0x1c4/0x45c\n worker_thread+0x32c/0x3e8\n kthread+0x11c/0x1b0\n ret_from_fork+0x10/0x20\nKernel panic - not syncing: kernel: panic_on_warn set ...",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.8.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40196",
"url": "https://www.suse.com/security/cve/CVE-2025-40196"
},
{
"category": "external",
"summary": "SUSE Bug 1253624 for CVE-2025-40196",
"url": "https://bugzilla.suse.com/1253624"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.8.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.3,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.8.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-19T16:46:47Z",
"details": "low"
}
],
"title": "CVE-2025-40196"
},
{
"cve": "CVE-2025-40197",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40197"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nmedia: mc: Clear minor number before put device\n\nThe device minor should not be cleared after the device is released.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.8.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40197",
"url": "https://www.suse.com/security/cve/CVE-2025-40197"
},
{
"category": "external",
"summary": "SUSE Bug 1253450 for CVE-2025-40197",
"url": "https://bugzilla.suse.com/1253450"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.8.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.8.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-19T16:46:47Z",
"details": "moderate"
}
],
"title": "CVE-2025-40197"
},
{
"cve": "CVE-2025-40198",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40198"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\next4: avoid potential buffer over-read in parse_apply_sb_mount_options()\n\nUnlike other strings in the ext4 superblock, we rely on tune2fs to\nmake sure s_mount_opts is NUL terminated. Harden\nparse_apply_sb_mount_options() by treating s_mount_opts as a potential\n__nonstring.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.8.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40198",
"url": "https://www.suse.com/security/cve/CVE-2025-40198"
},
{
"category": "external",
"summary": "SUSE Bug 1253453 for CVE-2025-40198",
"url": "https://bugzilla.suse.com/1253453"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.8.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.8.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-19T16:46:47Z",
"details": "moderate"
}
],
"title": "CVE-2025-40198"
},
{
"cve": "CVE-2025-40200",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40200"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nSquashfs: reject negative file sizes in squashfs_read_inode()\n\nSyskaller reports a \"WARNING in ovl_copy_up_file\" in overlayfs.\n\nThis warning is ultimately caused because the underlying Squashfs file\nsystem returns a file with a negative file size.\n\nThis commit checks for a negative file size and returns EINVAL.\n\n[phillip@squashfs.org.uk: only need to check 64 bit quantity]",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.8.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40200",
"url": "https://www.suse.com/security/cve/CVE-2025-40200"
},
{
"category": "external",
"summary": "SUSE Bug 1253448 for CVE-2025-40200",
"url": "https://bugzilla.suse.com/1253448"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.8.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.8.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-19T16:46:47Z",
"details": "moderate"
}
],
"title": "CVE-2025-40200"
},
{
"cve": "CVE-2025-40201",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40201"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nkernel/sys.c: fix the racy usage of task_lock(tsk-\u003egroup_leader) in sys_prlimit64() paths\n\nThe usage of task_lock(tsk-\u003egroup_leader) in sys_prlimit64()-\u003edo_prlimit()\npath is very broken.\n\nsys_prlimit64() does get_task_struct(tsk) but this only protects task_struct\nitself. If tsk != current and tsk is not a leader, this process can exit/exec\nand task_lock(tsk-\u003egroup_leader) may use the already freed task_struct.\n\nAnother problem is that sys_prlimit64() can race with mt-exec which changes\n-\u003egroup_leader. In this case do_prlimit() may take the wrong lock, or (worse)\n-\u003egroup_leader may change between task_lock() and task_unlock().\n\nChange sys_prlimit64() to take tasklist_lock when necessary. This is not\nnice, but I don\u0027t see a better fix for -stable.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.8.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40201",
"url": "https://www.suse.com/security/cve/CVE-2025-40201"
},
{
"category": "external",
"summary": "SUSE Bug 1253455 for CVE-2025-40201",
"url": "https://bugzilla.suse.com/1253455"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.8.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.8.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-19T16:46:47Z",
"details": "moderate"
}
],
"title": "CVE-2025-40201"
},
{
"cve": "CVE-2025-40202",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40202"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nipmi: Rework user message limit handling\n\nThe limit on the number of user messages had a number of issues,\nimproper counting in some cases and a use after free.\n\nRestructure how this is all done to handle more in the receive message\nallocation routine, so all refcouting and user message limit counts\nare done in that routine. It\u0027s a lot cleaner and safer.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.8.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40202",
"url": "https://www.suse.com/security/cve/CVE-2025-40202"
},
{
"category": "external",
"summary": "SUSE Bug 1253451 for CVE-2025-40202",
"url": "https://bugzilla.suse.com/1253451"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.8.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.8.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-19T16:46:47Z",
"details": "moderate"
}
],
"title": "CVE-2025-40202"
},
{
"cve": "CVE-2025-40203",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40203"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nlistmount: don\u0027t call path_put() under namespace semaphore\n\nMassage listmount() and make sure we don\u0027t call path_put() under the\nnamespace semaphore. If we put the last reference we\u0027re fscked.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.8.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40203",
"url": "https://www.suse.com/security/cve/CVE-2025-40203"
},
{
"category": "external",
"summary": "SUSE Bug 1253457 for CVE-2025-40203",
"url": "https://bugzilla.suse.com/1253457"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.8.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.8.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-19T16:46:47Z",
"details": "moderate"
}
],
"title": "CVE-2025-40203"
},
{
"cve": "CVE-2025-40204",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40204"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nsctp: Fix MAC comparison to be constant-time\n\nTo prevent timing attacks, MACs need to be compared in constant time.\nUse the appropriate helper function for this.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.8.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40204",
"url": "https://www.suse.com/security/cve/CVE-2025-40204"
},
{
"category": "external",
"summary": "SUSE Bug 1253436 for CVE-2025-40204",
"url": "https://bugzilla.suse.com/1253436"
},
{
"category": "external",
"summary": "SUSE Bug 1253437 for CVE-2025-40204",
"url": "https://bugzilla.suse.com/1253437"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.8.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.8.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-19T16:46:47Z",
"details": "important"
}
],
"title": "CVE-2025-40204"
},
{
"cve": "CVE-2025-40205",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40205"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nbtrfs: avoid potential out-of-bounds in btrfs_encode_fh()\n\nThe function btrfs_encode_fh() does not properly account for the three\ncases it handles.\n\nBefore writing to the file handle (fh), the function only returns to the\nuser BTRFS_FID_SIZE_NON_CONNECTABLE (5 dwords, 20 bytes) or\nBTRFS_FID_SIZE_CONNECTABLE (8 dwords, 32 bytes).\n\nHowever, when a parent exists and the root ID of the parent and the\ninode are different, the function writes BTRFS_FID_SIZE_CONNECTABLE_ROOT\n(10 dwords, 40 bytes).\n\nIf *max_len is not large enough, this write goes out of bounds because\nBTRFS_FID_SIZE_CONNECTABLE_ROOT is greater than\nBTRFS_FID_SIZE_CONNECTABLE originally returned.\n\nThis results in an 8-byte out-of-bounds write at\nfid-\u003eparent_root_objectid = parent_root_id.\n\nA previous attempt to fix this issue was made but was lost.\n\nhttps://lore.kernel.org/all/4CADAEEC020000780001B32C@vpn.id2.novell.com/\n\nAlthough this issue does not seem to be easily triggerable, it is a\npotential memory corruption bug that should be fixed. This patch\nresolves the issue by ensuring the function returns the appropriate size\nfor all three cases and validates that *max_len is large enough before\nwriting any data.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.8.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40205",
"url": "https://www.suse.com/security/cve/CVE-2025-40205"
},
{
"category": "external",
"summary": "SUSE Bug 1253456 for CVE-2025-40205",
"url": "https://bugzilla.suse.com/1253456"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.8.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.8.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-19T16:46:47Z",
"details": "moderate"
}
],
"title": "CVE-2025-40205"
},
{
"cve": "CVE-2025-40206",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40206"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnetfilter: nft_objref: validate objref and objrefmap expressions\n\nReferencing a synproxy stateful object from OUTPUT hook causes kernel\ncrash due to infinite recursive calls:\n\nBUG: TASK stack guard page was hit at 000000008bda5b8c (stack is 000000003ab1c4a5..00000000494d8b12)\n[...]\nCall Trace:\n __find_rr_leaf+0x99/0x230\n fib6_table_lookup+0x13b/0x2d0\n ip6_pol_route+0xa4/0x400\n fib6_rule_lookup+0x156/0x240\n ip6_route_output_flags+0xc6/0x150\n __nf_ip6_route+0x23/0x50\n synproxy_send_tcp_ipv6+0x106/0x200\n synproxy_send_client_synack_ipv6+0x1aa/0x1f0\n nft_synproxy_do_eval+0x263/0x310\n nft_do_chain+0x5a8/0x5f0 [nf_tables\n nft_do_chain_inet+0x98/0x110\n nf_hook_slow+0x43/0xc0\n __ip6_local_out+0xf0/0x170\n ip6_local_out+0x17/0x70\n synproxy_send_tcp_ipv6+0x1a2/0x200\n synproxy_send_client_synack_ipv6+0x1aa/0x1f0\n[...]\n\nImplement objref and objrefmap expression validate functions.\n\nCurrently, only NFT_OBJECT_SYNPROXY object type requires validation.\nThis will also handle a jump to a chain using a synproxy object from the\nOUTPUT hook.\n\nNow when trying to reference a synproxy object in the OUTPUT hook, nft\nwill produce the following error:\n\nsynproxy_crash.nft: Error: Could not process rule: Operation not supported\n synproxy name mysynproxy\n ^^^^^^^^^^^^^^^^^^^^^^^^",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.8.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40206",
"url": "https://www.suse.com/security/cve/CVE-2025-40206"
},
{
"category": "external",
"summary": "SUSE Bug 1253393 for CVE-2025-40206",
"url": "https://bugzilla.suse.com/1253393"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.8.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.1,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.8.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-19T16:46:47Z",
"details": "moderate"
}
],
"title": "CVE-2025-40206"
},
{
"cve": "CVE-2025-40207",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40207"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nmedia: v4l2-subdev: Fix alloc failure check in v4l2_subdev_call_state_try()\n\nv4l2_subdev_call_state_try() macro allocates a subdev state with\n__v4l2_subdev_state_alloc(), but does not check the returned value. If\n__v4l2_subdev_state_alloc fails, it returns an ERR_PTR, and that would\ncause v4l2_subdev_call_state_try() to crash.\n\nAdd proper error handling to v4l2_subdev_call_state_try().",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.8.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40207",
"url": "https://www.suse.com/security/cve/CVE-2025-40207"
},
{
"category": "external",
"summary": "SUSE Bug 1253395 for CVE-2025-40207",
"url": "https://bugzilla.suse.com/1253395"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.8.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.8.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-19T16:46:47Z",
"details": "moderate"
}
],
"title": "CVE-2025-40207"
}
]
}
SUSE-SU-2025:4516-1
Vulnerability from csaf_suse - Published: 2025-12-23 16:27 - Updated: 2025-12-23 16:27Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Security update for the Linux Kernel",
"title": "Title of the patch"
},
{
"category": "description",
"text": "The SUSE Linux Enterprise 15 SP7 RT kernel was updated to receive various security bugfixes.\n\n\nThe following security bugs were fixed:\n\n- CVE-2022-50253: bpf: make sure skb-\u003elen != 0 when redirecting to a tunneling device (bsc#1249912).\n- CVE-2023-53676: scsi: target: iscsi: Fix buffer overflow in lio_target_nacl_info_show() (bsc#1251786).\n- CVE-2025-21710: tcp: correct handling of extreme memory squeeze (bsc#1237888).\n- CVE-2025-37916: pds_core: remove write-after-free of client_id (bsc#1243474).\n- CVE-2025-38359: s390/mm: Fix in_atomic() handling in do_secure_storage_access() (bsc#1247076).\n- CVE-2025-39788: scsi: ufs: exynos: Fix programming of HCI_UTRL_NEXUS_TYPE (bsc#1249547).\n- CVE-2025-39805: net: macb: fix unregister_netdev call order in macb_remove() (bsc#1249982).\n- CVE-2025-39819: fs/smb: Fix inconsistent refcnt update (bsc#1250176).\n- CVE-2025-39822: io_uring/kbuf: fix signedness in this_len calculation (bsc#1250034).\n- CVE-2025-39859: ptp: ocp: fix use-after-free bugs causing by ptp_ocp_watchdog (bsc#1250252).\n- CVE-2025-39944: octeontx2-pf: Fix use-after-free bugs in otx2_sync_tstamp() (bsc#1251120).\n- CVE-2025-39980: nexthop: Forbid FDB status change while nexthop is in a group (bsc#1252063).\n- CVE-2025-40001: scsi: mvsas: Fix use-after-free bugs in mvs_work_queue (bsc#1252303).\n- CVE-2025-40021: tracing: dynevent: Add a missing lockdown check on dynevent (bsc#1252681).\n- CVE-2025-40027: net/9p: fix double req put in p9_fd_cancelled (bsc#1252763).\n- CVE-2025-40030: pinctrl: check the return value of pinmux_ops::get_function_name() (bsc#1252773).\n- CVE-2025-40038: KVM: SVM: Skip fastpath emulation on VM-Exit if next RIP isn\u0027t valid (bsc#1252817).\n- CVE-2025-40040: mm/ksm: fix flag-dropping behavior in ksm_madvise (bsc#1252780).\n- CVE-2025-40047: io_uring/waitid: always prune wait queue entry in io_waitid_wait() (bsc#1252790).\n- CVE-2025-40048: uio_hv_generic: Let userspace take care of interrupt mask (bsc#1252862).\n- CVE-2025-40055: ocfs2: fix double free in user_cluster_connect() (bsc#1252821).\n- CVE-2025-40059: coresight: Fix incorrect handling for return value of devm_kzalloc (bsc#1252809).\n- CVE-2025-40064: smc: Fix use-after-free in __pnet_find_base_ndev() (bsc#1252845).\n- CVE-2025-40070: pps: fix warning in pps_register_cdev when register device fail (bsc#1252836).\n- CVE-2025-40074: ipv4: start using dst_dev_rcu() (bsc#1252794).\n- CVE-2025-40075: tcp_metrics: use dst_dev_net_rcu() (bsc#1252795).\n- CVE-2025-40080: nbd: restrict sockets to TCP and UDP (bsc#1252774).\n- CVE-2025-40083: net/sched: sch_qfq: Fix null-deref in agg_dequeue (bsc#1252912).\n- CVE-2025-40086: drm/xe: Don\u0027t allow evicting of BOs in same VM in array of VM binds (bsc#1252923).\n- CVE-2025-40098: ALSA: hda: cs35l41: Fix NULL pointer dereference in cs35l41_get_acpi_mute_state() (bsc#1252917).\n- CVE-2025-40105: vfs: Don\u0027t leak disconnected dentries on umount (bsc#1252928).\n- CVE-2025-40139: smc: Use __sk_dst_get() and dst_dev_rcu() in in smc_clc_prfx_set() (bsc#1253409).\n- CVE-2025-40149: tls: Use __sk_dst_get() and dst_dev_rcu() in get_netdev_for_sock() (bsc#1253355).\n- CVE-2025-40159: xsk: Harden userspace-supplied xdp_desc validation (bsc#1253403).\n- CVE-2025-40168: smc: Use __sk_dst_get() and dst_dev_rcu() in smc_clc_prfx_match() (bsc#1253427).\n- CVE-2025-40169: bpf: Reject negative offsets for ALU ops (bsc#1253416).\n- CVE-2025-40173: net/ip6_tunnel: Prevent perpetual tunnel growth (bsc#1253421).\n- CVE-2025-40176: tls: wait for pending async decryptions if tls_strp_msg_hold fails (bsc#1253425).\n- CVE-2025-40185: ice: ice_adapter: release xa entry on adapter allocation failure (bsc#1253394).\n- CVE-2025-40204: sctp: Fix MAC comparison to be constant-time (bsc#1253436).\n- CVE-2025-40206: Add missing bugzilla reference to net fix (bsc#1250237 bsc#1253393).\n\nThe following non-security bugs were fixed:\n\n- ACPI: CPPC: Check _CPC validity for only the online CPUs (git-fixes).\n- ACPI: CPPC: Limit perf ctrs in PCC check only to online CPUs (git-fixes).\n- ACPI: CPPC: Perform fast check switch only for online CPUs (git-fixes).\n- ACPI: PRM: Skip handlers with NULL handler_address or NULL VA (stable-fixes).\n- ACPI: SBS: Fix present test in acpi_battery_read() (git-fixes).\n- ACPI: property: Return present device nodes only on fwnode interface (stable-fixes).\n- ACPI: scan: Add Intel CVS ACPI HIDs to acpi_ignore_dep_ids (stable-fixes).\n- ACPICA: Update dsmethod.c to get rid of unused variable warning (stable-fixes).\n- ACPICA: dispatcher: Use acpi_ds_clear_operands() in acpi_ds_call_control_method() (stable-fixes).\n- ALSA: hda: Fix missing pointer check in hda_component_manager_init function (git-fixes).\n- ALSA: serial-generic: remove shared static buffer (stable-fixes).\n- ALSA: usb-audio: Add validation of UAC2/UAC3 effect units (stable-fixes).\n- ALSA: usb-audio: Fix NULL pointer dereference in snd_usb_mixer_controls_badd (git-fixes).\n- ALSA: usb-audio: Fix potential overflow of PCM transfer buffer (stable-fixes).\n- ALSA: usb-audio: add mono main switch to Presonus S1824c (stable-fixes).\n- ALSA: usb-audio: apply quirk for MOONDROP Quark2 (stable-fixes).\n- ALSA: usb-audio: do not log messages meant for 1810c when initializing 1824c (git-fixes).\n- ASoC: codecs: va-macro: fix resource leak in probe error path (git-fixes).\n- ASoC: cs4271: Fix regulator leak on probe failure (git-fixes).\n- ASoC: max98090/91: fixed max98091 ALSA widget powering up/down (stable-fixes).\n- ASoC: meson: aiu-encoder-i2s: fix bit clock polarity (stable-fixes).\n- ASoC: qcom: sc8280xp: explicitly set S16LE format in sc8280xp_be_hw_params_fixup() (stable-fixes).\n- ASoC: stm32: sai: manage context in set_sysclk callback (stable-fixes).\n- ASoC: tas2781: fix getting the wrong device number (git-fixes).\n- ASoC: tlv320aic3x: Fix class-D initialization for tlv320aic3007 (stable-fixes).\n- Bluetooth: 6lowpan: Do not hold spin lock over sleeping functions (git-fixes).\n- Bluetooth: 6lowpan: add missing l2cap_chan_lock() (git-fixes).\n- Bluetooth: 6lowpan: fix BDADDR_LE vs ADDR_LE_DEV address type confusion (git-fixes).\n- Bluetooth: 6lowpan: reset link-local header on ipv6 recv path (git-fixes).\n- Bluetooth: L2CAP: export l2cap_chan_hold for modules (stable-fixes).\n- Bluetooth: MGMT: Fix OOB access in parse_adv_monitor_pattern() (git-fixes).\n- Bluetooth: MGMT: cancel mesh send timer when hdev removed (git-fixes).\n- Bluetooth: SCO: Fix UAF on sco_conn_free (stable-fixes).\n- Bluetooth: bcsp: receive data only if registered (stable-fixes).\n- Bluetooth: btrtl: Fix memory leak in rtlbt_parse_firmware_v2() (git-fixes).\n- Bluetooth: btusb: Check for unexpected bytes when defragmenting HCI frames (stable-fixes).\n- Bluetooth: btusb: reorder cleanup in btusb_disconnect to avoid UAF (git-fixes).\n- Bluetooth: hci_event: validate skb length for unknown CC opcode (git-fixes).\n- Documentation: ACPI: i2c-muxes: fix I2C device references (git-fixes).\n- Drivers: hv: vmbus: Add utility function for querying ring size (git-fixes).\n- Fix \u0027drm/xe: Do not allow evicting of BOs in same VM in array of VM binds\u0027 (bsc#1252923).\n- HID: amd_sfh: Stop sensor before starting (git-fixes).\n- HID: hid-ntrig: Prevent memory leak in ntrig_report_version() (git-fixes).\n- HID: quirks: avoid Cooler Master MM712 dongle wakeup bug (stable-fixes).\n- HID: quirks: work around VID/PID conflict for 0x4c4a/0x4155 (git-fixes).\n- HID: uclogic: Fix potential memory leak in error path (git-fixes).\n- Input: atmel_mxt_ts - allow reset GPIO to sleep (stable-fixes).\n- Input: imx_sc_key - fix memory corruption on unload (git-fixes).\n- Input: pegasus-notetaker - fix potential out-of-bounds access (git-fixes).\n- KVM: Pass new routing entries and irqfd when updating IRTEs (git-fixes).\n- KVM: SEV: Enforce minimum GHCB version requirement for SEV-SNP guests (git-fixes).\n- KVM: SVM: Delete IRTE link from previous vCPU before setting new IRTE (git-fixes).\n- KVM: SVM: Delete IRTE link from previous vCPU irrespective of new routing (git-fixes).\n- KVM: SVM: Emulate PERF_CNTR_GLOBAL_STATUS_SET for PerfMonV2 (git-fixes).\n- KVM: SVM: Mark VMCB_LBR dirty when MSR_IA32_DEBUGCTLMSR is updated (git-fixes).\n- KVM: SVM: Re-load current, not host, TSC_AUX on #VMEXIT from SEV-ES guest (git-fixes).\n- KVM: SVM: Track per-vCPU IRTEs using kvm_kernel_irqfd structure (git-fixes).\n- KVM: SVM: WARN if an invalid posted interrupt IRTE entry is added (git-fixes).\n- KVM: VMX: Allow guest to set DEBUGCTL.RTM_DEBUG if RTM is supported (git-fixes).\n- KVM: VMX: Apply MMIO Stale Data mitigation if KVM maps MMIO into the guest (git-fixes).\n- KVM: VMX: Fix check for valid GVA on an EPT violation (git-fixes).\n- KVM: VMX: Preserve host\u0027s DEBUGCTLMSR_FREEZE_IN_SMM while running the guest (git-fixes).\n- KVM: VMX: Wrap all accesses to IA32_DEBUGCTL with getter/setter APIs (git-fixes).\n- KVM: nVMX: Check vmcs12-\u003eguest_ia32_debugctl on nested VM-Enter (git-fixes).\n- KVM: s390: improve interrupt cpu for wakeup (bsc#1235463).\n- KVM: s390: kABI backport for \u0027last_sleep_cpu\u0027 (bsc#1252352).\n- KVM: x86/mmu: Locally cache whether a PFN is host MMIO when making a SPTE (git-fixes).\n- KVM: x86: Add helper to retrieve current value of user return MSR (git-fixes).\n- KVM: x86: Convert vcpu_run()\u0027s immediate exit param into a generic bitmap (git-fixes).\n- KVM: x86: Do not treat ENTER and LEAVE as branches, because they are not (git-fixes).\n- KVM: x86: Drop kvm_x86_ops.set_dr6() in favor of a new KVM_RUN flag (git-fixes).\n- KVM: x86: Have all vendor neutral sub-configs depend on KVM_X86, not just KVM (git-fixes).\n- NFS4: Fix state renewals missing after boot (git-fixes).\n- NFS: check if suid/sgid was cleared after a write as needed (git-fixes).\n- NFSD: Never cache a COMPOUND when the SEQUENCE operation fails (git-fixes).\n- NFSD: Skip close replay processing if XDR encoding fails (git-fixes).\n- NFSD: free copynotify stateid in nfs4_free_ol_stateid() (git-fixes).\n- NFSv4.1: fix mount hang after CREATE_SESSION failure (git-fixes).\n- NFSv4: handle ERR_GRACE on delegation recalls (git-fixes).\n- PCI/P2PDMA: Fix incorrect pointer usage in devm_kfree() call (stable-fixes).\n- PCI/PM: Skip resuming to D0 if device is disconnected (stable-fixes).\n- PCI: Disable MSI on RDC PCI to PCIe bridges (stable-fixes).\n- PCI: cadence: Check for the existence of cdns_pcie::ops before using it (stable-fixes).\n- PCI: dwc: Verify the single eDMA IRQ in dw_pcie_edma_irq_verify() (stable-fixes).\n- PCI: j721e: Fix incorrect error message in probe() (git-fixes).\n- PCI: rcar-host: Convert struct rcar_msi mask_lock into raw spinlock (git-fixes).\n- PCI: tegra194: Reset BARs when running in PCIe endpoint mode (git-fixes).\n- RDMA/bnxt_re: Do not fail destroy QP and cleanup debugfs earlier (git-fixes)\n- RDMA/bnxt_re: Fix a potential memory leak in destroy_gsi_sqp (git-fixes)\n- RDMA/hns: Fix recv CQ and QP cache affinity (git-fixes).\n- RDMA/hns: Fix the modification of max_send_sge (git-fixes).\n- RDMA/hns: Fix wrong WQE data when QP wraps around (git-fixes).\n- RDMA/irdma: Fix SD index calculation (git-fixes).\n- RDMA/irdma: Set irdma_cq cq_num field during CQ create (git-fixes)\n- Revert \u0027drm/tegra: dsi: Clear enable register if powered by bootloader\u0027 (git-fixes).\n- Revert \u0027wifi: ath10k: avoid unnecessary wait for service ready message\u0027 (git-fixes).\n- accel/habanalabs/gaudi2: fix BMON disable configuration (stable-fixes).\n- accel/habanalabs/gaudi2: read preboot status after recovering from dirty state (stable-fixes).\n- accel/habanalabs: return ENOMEM if less than requested pages were pinned (stable-fixes).\n- accel/habanalabs: support mapping cb with vmalloc-backed coherent memory (stable-fixes).\n- acpi,srat: Fix incorrect device handle check for Generic Initiator (git-fixes).\n- acpi/hmat: Fix lockdep warning for hmem_register_resource() (git-fixes).\n- amd/amdkfd: resolve a race in amdgpu_amdkfd_device_fini_sw (stable-fixes).\n- ata: libata-scsi: Add missing scsi_device_put() in ata_scsi_dev_rescan() (git-fixes).\n- block: avoid possible overflow for chunk_sectors check in blk_stack_limits() (git-fixes).\n- block: fix kobject double initialization in add_disk (git-fixes).\n- bpf: Fix test verif_scale_strobemeta_subprogs failure due to llvm19 (bsc#1252368).\n- bpf: improve error message for unsupported helper (bsc#1252370).\n- btrfs: abort transaction on failure to add link to inode (git-fixes).\n- btrfs: avoid page_lockend underflow in btrfs_punch_hole_lock_range() (git-fix).\n- btrfs: avoid using fixed char array size for tree names (git-fix).\n- btrfs: do not update last_log_commit when logging inode due to a new name (git-fixes).\n- btrfs: fix COW handling in run_delalloc_nocow() (git-fix).\n- btrfs: fix inode leak on failure to add link to inode (git-fixes).\n- btrfs: make btrfs_clear_delalloc_extent() free delalloc reserve (git-fix).\n- btrfs: mark dirty extent range for out of bound prealloc extents (git-fixes).\n- btrfs: qgroup: correctly model root qgroup rsv in convert (git-fix).\n- btrfs: rename err to ret in btrfs_link() (git-fixes).\n- btrfs: run btrfs_error_commit_super() early (git-fix).\n- btrfs: scrub: put bio after errors in scrub_raid56_parity_stripe() (git-fixes).\n- btrfs: send: fix duplicated rmdir operations when using extrefs (git-fixes).\n- btrfs: set inode flag BTRFS_INODE_COPY_EVERYTHING when logging new name (git-fixes).\n- btrfs: simplify error handling logic for btrfs_link() (git-fixes).\n- btrfs: tree-checker: add dev extent item checks (git-fix).\n- btrfs: tree-checker: add type and sequence check for inline backrefs (git-fix).\n- btrfs: tree-checker: fix the wrong output of data backref objectid (git-fix).\n- btrfs: tree-checker: reject BTRFS_FT_UNKNOWN dir type (git-fix).\n- btrfs: tree-checker: validate dref root and objectid (git-fix).\n- btrfs: use smp_mb__after_atomic() when forcing COW in create_pending_snapshot() (git-fixes).\n- cgroup/cpuset: Remove remote_partition_check() \u0026 make update_cpumasks_hier() handle remote partition (bsc#1241166).\n- char: misc: Does not request module for miscdevice with dynamic minor (stable-fixes).\n- char: misc: Make misc_register() reentry for miscdevice who wants dynamic minor (stable-fixes).\n- char: misc: restrict the dynamic range to exclude reserved minors (stable-fixes).\n- cpuset: Use new excpus for nocpu error check when enabling root partition (bsc#1241166).\n- cpuset: fix failure to enable isolated partition when containing isolcpus (bsc#1241166).\n- cramfs: Verify inode mode when loading from disk (git-fixes).\n- crypto: aspeed - fix double free caused by devm (git-fixes).\n- crypto: aspeed-acry - Convert to platform remove callback returning void (stable-fixes).\n- crypto: hisilicon/qm - Fix device reference leak in qm_get_qos_value (git-fixes).\n- crypto: iaa - Do not clobber req-\u003ebase.data (git-fixes).\n- crypto: qat - use kcalloc() in qat_uclo_map_objs_from_mof() (stable-fixes).\n- dmaengine: dw-edma: Set status for callback_result (stable-fixes).\n- dmaengine: mv_xor: match alloc_wc and free_wc (stable-fixes).\n- drm/amd/amdgpu: Release xcp drm memory after unplug (stable-fixes).\n- drm/amd/display/dml2: Guard dml21_map_dc_state_into_dml_display_cfg with DC_FP_START (stable-fixes).\n- drm/amd/display: Add AVI infoframe copy in copy_stream_update_to_stream (stable-fixes).\n- drm/amd/display: Add fallback path for YCBCR422 (stable-fixes).\n- drm/amd/display: Allow VRR params change if unsynced with the stream (git-fixes).\n- drm/amd/display: Disable VRR on DCE 6 (stable-fixes).\n- drm/amd/display: Enable mst when it\u0027s detected but yet to be initialized (git-fixes).\n- drm/amd/display: Fix DVI-D/HDMI adapters (stable-fixes).\n- drm/amd/display: Fix NULL deref in debugfs odm_combine_segments (git-fixes).\n- drm/amd/display: Fix black screen with HDMI outputs (git-fixes).\n- drm/amd/display: Fix for test crash due to power gating (stable-fixes).\n- drm/amd/display: Fix incorrect return of vblank enable on unconfigured crtc (stable-fixes).\n- drm/amd/display: Fix pbn_div Calculation Error (stable-fixes).\n- drm/amd/display: Increase AUX Intra-Hop Done Max Wait Duration (stable-fixes).\n- drm/amd/display: Increase minimum clock for TMDS 420 with pipe splitting (stable-fixes).\n- drm/amd/display: Init dispclk from bootup clock for DCN314 (stable-fixes).\n- drm/amd/display: Move setup_stream_attribute (stable-fixes).\n- drm/amd/display: Reject modes with too high pixel clock on DCE6-10 (git-fixes).\n- drm/amd/display: Reset apply_eamless_boot_optimization when dpms_off (stable-fixes).\n- drm/amd/display: Set up pixel encoding for YCBCR422 (stable-fixes).\n- drm/amd/display: Support HW cursor 180 rot for any number of pipe splits (stable-fixes).\n- drm/amd/display: Wait until OTG enable state is cleared (stable-fixes).\n- drm/amd/display: add more cyan skillfish devices (stable-fixes).\n- drm/amd/display: change dc stream color settings only in atomic commit (stable-fixes).\n- drm/amd/display: ensure committing streams is seamless (stable-fixes).\n- drm/amd/display: fix condition for setting timing_adjust_pending (stable-fixes).\n- drm/amd/display: fix dml ms order of operations (stable-fixes).\n- drm/amd/display: incorrect conditions for failing dto calculations (stable-fixes).\n- drm/amd/display: update color on atomic commit time (stable-fixes).\n- drm/amd/display: update dpp/disp clock from smu clock table (stable-fixes).\n- drm/amd/pm: Disable MCLK switching on SI at high pixel clocks (stable-fixes).\n- drm/amd/pm: Use cached metrics data on aldebaran (stable-fixes).\n- drm/amd/pm: Use cached metrics data on arcturus (stable-fixes).\n- drm/amd: Avoid evicting resources at S5 (stable-fixes).\n- drm/amd: Check that VPE has reached DPM0 in idle handler (stable-fixes).\n- drm/amd: Fix suspend failure with secure display TA (git-fixes).\n- drm/amd: add more cyan skillfish PCI ids (stable-fixes).\n- drm/amdgpu/atom: Check kcalloc() for WS buffer in amdgpu_atom_execute_table_locked() (stable-fixes).\n- drm/amdgpu/jpeg: Hold pg_lock before jpeg poweroff (stable-fixes).\n- drm/amdgpu/smu: Handle S0ix for vangogh (stable-fixes).\n- drm/amdgpu: Allow kfd CRIU with no buffer objects (stable-fixes).\n- drm/amdgpu: Check vcn sram load return value (stable-fixes).\n- drm/amdgpu: Correct the counts of nr_banks and nr_errors (stable-fixes).\n- drm/amdgpu: Fix NULL pointer dereference in VRAM logic for APU devices (stable-fixes).\n- drm/amdgpu: Fix function header names in amdgpu_connectors.c (git-fixes).\n- drm/amdgpu: Fix unintended error log in VCN5_0_0 (git-fixes).\n- drm/amdgpu: Respect max pixel clock for HDMI and DVI-D (v2) (stable-fixes).\n- drm/amdgpu: Skip poison aca bank from UE channel (stable-fixes).\n- drm/amdgpu: Use memdup_array_user in amdgpu_cs_wait_fences_ioctl (stable-fixes).\n- drm/amdgpu: add range check for RAS bad page address (stable-fixes).\n- drm/amdgpu: add support for cyan skillfish gpu_info (stable-fixes).\n- drm/amdgpu: disable peer-to-peer access for DCC-enabled GC12 VRAM surfaces (stable-fixes).\n- drm/amdgpu: do not enable SMU on cyan skillfish (stable-fixes).\n- drm/amdgpu: fix nullptr err of vm_handle_moved (stable-fixes).\n- drm/amdgpu: hide VRAM sysfs attributes on GPUs without VRAM (stable-fixes).\n- drm/amdgpu: reject gang submissions under SRIOV (stable-fixes).\n- drm/amdgpu: remove two invalid BUG_ON()s (stable-fixes).\n- drm/amdkfd: Handle lack of READ permissions in SVM mapping (stable-fixes).\n- drm/amdkfd: Tie UNMAP_LATENCY to queue_preemption (stable-fixes).\n- drm/amdkfd: fix vram allocation failure for a special case (stable-fixes).\n- drm/amdkfd: relax checks for over allocation of save area (stable-fixes).\n- drm/amdkfd: return -ENOTTY for unsupported IOCTLs (stable-fixes).\n- drm/ast: Blank with VGACR17 sync enable, always clear VGACRB6 sync off (git-fixes).\n- drm/bridge: cdns-dsi: Do not fail on MIPI_DSI_MODE_VIDEO_BURST (stable-fixes).\n- drm/bridge: cdns-dsi: Fix REG_WAKEUP_TIME value (stable-fixes).\n- drm/bridge: display-connector: do not set OP_DETECT for DisplayPorts (stable-fixes).\n- drm/exynos: exynos7_drm_decon: remove ctx-\u003esuspended (git-fixes).\n- drm/i915/dp_mst: Work around Thunderbolt sink disconnect after SINK_COUNT_ESI read (stable-fixes).\n- drm/i915: Avoid lock inversion when pinning to GGTT on CHV/BXT+VTD (git-fixes).\n- drm/i915: Fix conversion between clock ticks and nanoseconds (git-fixes).\n- drm/mediatek: Add pm_runtime support for GCE power control (git-fixes).\n- drm/mediatek: Disable AFBC support on Mediatek DRM driver (git-fixes).\n- drm/msm/a6xx: Fix PDC sleep sequence (git-fixes).\n- drm/msm/dsi/phy: Toggle back buffer resync after preparing PLL (stable-fixes).\n- drm/msm/dsi/phy_7nm: Fix missing initial VCO rate (stable-fixes).\n- drm/msm/registers: Generate _HI/LO builders for reg64 (stable-fixes).\n- drm/msm: make sure to not queue up recovery more than once (stable-fixes).\n- drm/nouveau: replace snprintf() with scnprintf() in nvkm_snprintbf() (stable-fixes).\n- drm/panthor: Serialize GPU cache flush operations (stable-fixes).\n- drm/panthor: check bo offset alignment in vm bind (stable-fixes).\n- drm/sched: Fix deadlock in drm_sched_entity_kill_jobs_cb (git-fixes).\n- drm/sched: Optimise drm_sched_entity_push_job (stable-fixes).\n- drm/sched: avoid killing parent entity on child SIGKILL (stable-fixes).\n- drm/tegra: Add call to put_pid() (git-fixes).\n- drm/tegra: dc: Fix reference leak in tegra_dc_couple() (git-fixes).\n- drm/tidss: Set crtc modesetting parameters with adjusted mode (stable-fixes).\n- drm/tidss: Use the crtc_* timings when programming the HW (stable-fixes).\n- drm/vmwgfx: Validate command header size against SVGA_CMD_MAX_DATASIZE (git-fixes).\n- drm/xe/guc: Add more GuC load error status codes (stable-fixes).\n- drm/xe/guc: Increase GuC crash dump buffer size (stable-fixes).\n- drm/xe/guc: Return an error code if the GuC load fails (stable-fixes).\n- drm/xe/guc: Set upper limit of H2G retries over CTB (stable-fixes).\n- drm/xe/guc: Synchronize Dead CT worker with unbind (git-fixes).\n- drm/xe: Do clean shutdown also when using flr (git-fixes).\n- drm/xe: Do not wake device during a GT reset (git-fixes).\n- drm/xe: Fix oops in xe_gem_fault when running core_hotunplug test (stable-fixes).\n- drm/xe: Move declarations under conditional branch (stable-fixes).\n- drm/xe: Remove duplicate DRM_EXEC selection from Kconfig (git-fixes).\n- drm: panel-backlight-quirks: Make EDID match optional (stable-fixes).\n- exfat: limit log print for IO error (git-fixes).\n- extcon: adc-jack: Cleanup wakeup source only if it was enabled (git-fixes).\n- extcon: adc-jack: Fix wakeup source leaks on device unbind (stable-fixes).\n- fbcon: Set fb_display[i]-\u003emode to NULL when the mode is released (stable-fixes).\n- fbdev: Add bounds checking in bit_putcs to fix vmalloc-out-of-bounds (stable-fixes).\n- fbdev: bitblit: bound-check glyph index in bit_putcs* (stable-fixes).\n- fbdev: pvr2fb: Fix leftover reference to ONCHIP_NR_DMA_CHANNELS (stable-fixes).\n- hwmon: (asus-ec-sensors) increase timeout for locking ACPI mutex (stable-fixes).\n- hwmon: (dell-smm) Add support for Dell OptiPlex 7040 (stable-fixes).\n- hwmon: (k10temp) Add device ID for Strix Halo (stable-fixes).\n- hwmon: (k10temp) Add thermal support for AMD Family 1Ah-based models (stable-fixes).\n- hwmon: (sbtsi_temp) AMD CPU extended temperature range support (stable-fixes).\n- hwmon: sy7636a: add alias (stable-fixes).\n- hyperv: Remove the spurious null directive line (git-fixes).\n- iio: adc: imx93_adc: load calibrated values even calibration failed (stable-fixes).\n- iio: adc: spear_adc: mask SPEAR_ADC_STATUS channel and avg sample before setting register (stable-fixes).\n- ima: do not clear IMA_DIGSIG flag when setting or removing non-IMA xattr (stable-fixes).\n- iommu/amd: Return an error if vCPU affinity is set for non-vCPU IRTE (git-fixes).\n- isdn: mISDN: hfcsusb: fix memory leak in hfcsusb_probe() (git-fixes).\n- ixgbe: fix memory leak and use-after-free in ixgbe_recovery_probe() (git-fixes).\n- jfs: Verify inode mode when loading from disk (git-fixes).\n- jfs: fix uninitialized waitqueue in transaction manager (git-fixes).\n- kABI fix for KVM: VMX: Apply MMIO Stale Data mitigation if KVM maps MMIO into the guest (git-fixes) (git-fixes).\n- kabi/severities: drop xfer_to_guest_mode_handle_work.\n- lib/crypto: curve25519-hacl64: Fix older clang KASAN workaround for GCC (git-fixes).\n- md/raid1: fix data lost for writemostly rdev (git-fixes).\n- md: fix mssing blktrace bio split events (git-fixes).\n- media: adv7180: Add missing lock in suspend callback (stable-fixes).\n- media: adv7180: Do not write format to device in set_fmt (stable-fixes).\n- media: adv7180: Only validate format in querystd (stable-fixes).\n- media: amphion: Delete v4l2_fh synchronously in .release() (stable-fixes).\n- media: fix uninitialized symbol warnings (stable-fixes).\n- media: i2c: Kconfig: Ensure a dependency on HAVE_CLK for VIDEO_CAMERA_SENSOR (stable-fixes).\n- media: i2c: og01a1b: Specify monochrome media bus format instead of Bayer (stable-fixes).\n- media: imon: make send_packet() more robust (stable-fixes).\n- media: ov08x40: Fix the horizontal flip control (stable-fixes).\n- media: redrat3: use int type to store negative error codes (stable-fixes).\n- media: uvcvideo: Use heuristic to find stream entity (git-fixes).\n- media: videobuf2: forbid remove_bufs when legacy fileio is active (git-fixes).\n- memstick: Add timeout to prevent indefinite waiting (stable-fixes).\n- mfd: da9063: Split chip variant reading in two bus transactions (stable-fixes).\n- mfd: madera: Work around false-positive -Wininitialized warning (stable-fixes).\n- mfd: stmpe-i2c: Add missing MODULE_LICENSE (stable-fixes).\n- mfd: stmpe: Remove IRQ domain upon removal (stable-fixes).\n- minixfs: Verify inode mode when loading from disk (git-fixes).\n- mm/mm_init: fix hash table order logging in alloc_large_system_hash() (git-fixes).\n- mm/secretmem: fix use-after-free race in fault handler (git-fixes).\n- mmc: host: renesas_sdhi: Fix the actual clock (stable-fixes).\n- mmc: sdhci-msm: Enable tuning for SDR50 mode for SD card (stable-fixes).\n- mmc: sdhci-of-dwcmshc: Change DLL_STRBIN_TAPNUM_DEFAULT to 0x4 (git-fixes).\n- mtd: onenand: Pass correct pointer to IRQ handler (git-fixes).\n- mtd: rawnand: cadence: fix DMA device NULL pointer dereference (git-fixes).\n- mtdchar: fix integer overflow in read/write ioctls (git-fixes).\n- net/mana: fix warning in the writer of client oob (git-fixes).\n- net/smc: Remove validation of reserved bits in CLC Decline message (bsc#1253779).\n- net: nfc: nci: Increase NCI_DATA_TIMEOUT to 3000 ms (stable-fixes).\n- net: phy: clear link parameters on admin link down (stable-fixes).\n- net: phy: fixed_phy: let fixed_phy_unregister free the phy_device (stable-fixes).\n- net: phy: marvell: Fix 88e1510 downshift counter errata (stable-fixes).\n- net: tcp: send zero-window ACK when no memory (bsc#1253779).\n- net: usb: qmi_wwan: initialize MAC header offset in qmimux_rx_fixup (git-fixes).\n- nfs4_setup_readdir(): insufficient locking for -\u003ed_parent-\u003ed_inode dereferencing (git-fixes).\n- nouveau/firmware: Add missing kfree() of nvkm_falcon_fw::boot (git-fixes).\n- nvme-auth: add hkdf_expand_label() (bsc#1247683).\n- nvme-auth: use hkdf_expand_label() (bsc#1247683).\n- perf script: add --addr2line option (bsc#1247509).\n- phy: cadence: cdns-dphy: Enable lower resolutions in dphy (stable-fixes).\n- phy: renesas: r8a779f0-ether-serdes: add new step added to latest datasheet (stable-fixes).\n- phy: rockchip: phy-rockchip-inno-csidphy: allow writes to grf register 0 (stable-fixes).\n- pinctrl: s32cc: fix uninitialized memory in s32_pinctrl_desc (git-fixes).\n- pinctrl: s32cc: initialize gpio_pin_config::list after kmalloc() (git-fixes).\n- pinctrl: single: fix bias pull up/down handling in pin_config_set (stable-fixes).\n- platform/x86/intel/speed_select_if: Convert PCIBIOS_* return codes to errnos (git-fixes).\n- power: supply: qcom_battmgr: add OOI chemistry (stable-fixes).\n- power: supply: qcom_battmgr: handle charging state change notifications (stable-fixes).\n- power: supply: sbs-charger: Support multiple devices (stable-fixes).\n- powerpc: export MIN RMA size (bsc#1236743 ltc#211409).\n- powerpc: increase MIN RMA size for CAS negotiation (bsc#1236743 ltc#211409 bsc#1252269 ltc#215957).\n- regulator: fixed: fix GPIO descriptor leak on register failure (git-fixes).\n- rtc: rx8025: fix incorrect register reference (git-fixes).\n- s390/mm,fault: simplify kfence fault handling (bsc#1247076).\n- scsi: Fix sas_user_scan() to handle wildcard and multi-channel scans (git-fixes).\n- scsi: aacraid: Stop using PCI_IRQ_AFFINITY (git-fixes).\n- scsi: core: sysfs: Correct sysfs attributes access rights (git-fixes).\n- scsi: hpsa: Fix potential memory leak in hpsa_big_passthru_ioctl() (git-fixes).\n- scsi: libfc: Prevent integer overflow in fc_fcp_recv_data() (git-fixes).\n- scsi: mpi3mr: Correctly handle ATA device errors (git-fixes).\n- scsi: mpi3mr: Drop unnecessary volatile from __iomem pointers (git-fixes).\n- scsi: mpt3sas: Correctly handle ATA device errors (git-fixes).\n- scsi: mpt3sas: Fix crash in transport port remove by using ioc_info() (git-fixes).\n- scsi: pm80xx: Fix array-index-out-of-of-bounds on rmmod (git-fixes).\n- scsi: storvsc: Prefer returning channel with the same CPU as on the I/O issuing CPU (bsc#1252267).\n- selftests/bpf: Check for timeout in perf_link test (bsc#1253648).\n- selftests/bpf: Close fd in error path in drop_on_reuseport (git-fixes).\n- selftests/bpf: Close obj in error path in xdp_adjust_tail (git-fixes).\n- selftests/bpf: Fix missing ARRAY_SIZE() definition in bench.c (git-fixes).\n- selftests/bpf: Fix missing BUILD_BUG_ON() declaration (git-fixes).\n- selftests/bpf: Fix missing UINT_MAX definitions in benchmarks (git-fixes).\n- selftests/bpf: Fix string read in strncmp benchmark (git-fixes).\n- selftests/bpf: Mitigate sockmap_ktls disconnect_after_delete failure (git-fixes).\n- selftests/bpf: Remove sockmap_ktls disconnect_after_delete test (bsc#1252365).\n- selftests/bpf: Remove tests for zeroed-array kptr (bsc#1252366).\n- selftests/bpf: Use pid_t consistently in test_progs.c (git-fixes).\n- selftests/bpf: fix signedness bug in redir_partial() (git-fixes).\n- selftests/net/forwarding: add slowwait functions (bsc#1254235).\n- selftests/net/lib: no need to record ns name if it already exist (bsc#1254235).\n- selftests/net/lib: update busywait timeout value (bsc#1254235).\n- selftests/net: add lib.sh (bsc#1254235).\n- selftests/net: add variable NS_LIST for lib.sh (bsc#1254235).\n- selftests/net: use tc rule to filter the na packet (bsc#1254235).\n- selftests/run_kselftest.sh: Add `--skip` argument option (bsc#1254221).\n- selftests: forwarding.config.sample: Move overrides to lib.sh (bsc#1254235).\n- selftests: forwarding: Add a test for testing lib.sh functionality (bsc#1254235).\n- selftests: forwarding: Avoid failures to source net/lib.sh (bsc#1254235).\n- selftests: forwarding: Change inappropriate log_test_skip() calls (bsc#1254235).\n- selftests: forwarding: Convert log_test() to recognize RET values (bsc#1254235).\n- selftests: forwarding: Have RET track kselftest framework constants (bsc#1254235).\n- selftests: forwarding: Parametrize mausezahn delay (bsc#1254235).\n- selftests: forwarding: Redefine relative_path variable (bsc#1254235).\n- selftests: forwarding: Remove duplicated lib.sh content (bsc#1254235).\n- selftests: forwarding: Support for performance sensitive tests (bsc#1254235).\n- selftests: lib: Define more kselftest exit codes (bsc#1254235).\n- selftests: lib: tc_rule_stats_get(): Move default to argument definition (bsc#1254235).\n- selftests: net: List helper scripts in TEST_FILES Makefile variable (bsc#1254235).\n- selftests: net: Unify code of busywait() and slowwait() (bsc#1254235).\n- selftests: net: add helper for checking if nettest is available (bsc#1254235).\n- selftests: net: lib: Do not overwrite error messages (bsc#1254235).\n- selftests: net: lib: Move logging from forwarding/lib.sh here (bsc#1254235).\n- selftests: net: lib: avoid error removing empty netns name (bsc#1254235).\n- selftests: net: lib: do not set ns var as readonly (bsc#1254235).\n- selftests: net: lib: fix shift count out of range (bsc#1254235).\n- selftests: net: lib: ignore possible errors (bsc#1254235).\n- selftests: net: lib: kill PIDs before del netns (bsc#1254235).\n- selftests: net: lib: remove \u0027ns\u0027 var in setup_ns (bsc#1254235).\n- selftests: net: lib: remove ns from list after clean-up (bsc#1254235).\n- selftests: net: lib: set \u0027i\u0027 as local (bsc#1254235).\n- selftests: net: lib: support errexit with busywait (bsc#1254235).\n- selftests: net: libs: Change variable fallback syntax (bsc#1254235).\n- serial: 8250_exar: add support for Advantech 2 port card with Device ID 0x0018 (git-fixes).\n- serial: 8250_mtk: Enable baud clock and manage in runtime PM (git-fixes).\n- soc/tegra: fuse: Add Tegra114 nvmem cells and fuse lookups (stable-fixes).\n- soc: aspeed: socinfo: Add AST27xx silicon IDs (stable-fixes).\n- soc: qcom: smem: Fix endian-unaware access of num_entries (stable-fixes).\n- spi: Try to get ACPI GPIO IRQ earlier (git-fixes).\n- spi: loopback-test: Do not use %pK through printk (stable-fixes).\n- spi: rpc-if: Add resume support for RZ/G3E (stable-fixes).\n- strparser: Fix signed/unsigned mismatch bug (git-fixes).\n- tcp_bpf: Call sk_msg_free() when tcp_bpf_send_verdict() fails to allocate psock-\u003ecork (bsc#1250705).\n- thunderbolt: Use is_pciehp instead of is_hotplug_bridge (stable-fixes).\n- tools/cpupower: Fix incorrect size in cpuidle_state_disable() (stable-fixes).\n- tools/cpupower: fix error return value in cpupower_write_sysfs() (stable-fixes).\n- tools/hv: fcopy: Fix incorrect file path conversion (git-fixes).\n- tools/power x86_energy_perf_policy: Enhance HWP enable (stable-fixes).\n- tools/power x86_energy_perf_policy: Fix incorrect fopen mode usage (stable-fixes).\n- tools/power x86_energy_perf_policy: Prefer driver HWP limits (stable-fixes).\n- tools: lib: thermal: do not preserve owner in install (stable-fixes).\n- tools: lib: thermal: use pkg-config to locate libnl3 (stable-fixes).\n- uio_hv_generic: Query the ringbuffer size for device (git-fixes).\n- usb/core/quirks: Add Huawei ME906S to wakeup quirk (git-fixes).\n- usb: cdns3: gadget: Use-after-free during failed initialization and exit of cdnsp gadget (stable-fixes).\n- usb: gadget: f_fs: Fix epfile null pointer access after ep enable (stable-fixes).\n- usb: gadget: f_hid: Fix zero length packet transfer (stable-fixes).\n- usb: gadget: f_ncm: Fix MAC assignment NCM ethernet (stable-fixes).\n- usb: mon: Increase BUFF_MAX to 64 MiB to support multi-MB URBs (stable-fixes).\n- usb: xhci: plat: Facilitate using autosuspend for xhci plat devices (stable-fixes).\n- video: backlight: lp855x_bl: Set correct EPROM start for LP8556 (stable-fixes).\n- watchdog: s3c2410_wdt: Fix max_timeout being calculated larger (stable-fixes).\n- wifi: ath10k: Fix connection after GTK rekeying (stable-fixes).\n- wifi: ath11k: Add quirk entries for Thinkpad T14s Gen3 AMD (bsc#1254181).\n- wifi: ath11k: zero init info-\u003estatus in wmi_process_mgmt_tx_comp() (git-fixes).\n- wifi: ath12k: Increase DP_REO_CMD_RING_SIZE to 256 (stable-fixes).\n- wifi: iwlwifi: fw: Add ASUS to PPAG and TAS list (stable-fixes).\n- wifi: mac80211: Fix 6 GHz Band capabilities element advertisement in lower bands (stable-fixes).\n- wifi: mac80211: Fix HE capabilities element check (stable-fixes).\n- wifi: mac80211: Track NAN interface start/stop (stable-fixes).\n- wifi: mac80211: do not mark keys for inactive links as uploaded (stable-fixes).\n- wifi: mac80211: fix key tailroom accounting leak (git-fixes).\n- wifi: mac80211: reject address change while connecting (git-fixes).\n- wifi: mac80211: skip rate verification for not captured PSDUs (git-fixes).\n- wifi: mac80211_hwsim: Limit destroy_on_close radio removal to netgroup (git-fixes).\n- wifi: mt76: mt7921: Add 160MHz beamformee capability for mt7922 device (stable-fixes).\n- wifi: mt76: mt7996: Temporarily disable EPCS (stable-fixes).\n- wifi: mt76: mt7996: fix memory leak on mt7996_mcu_sta_key_tlv error (stable-fixes).\n- wifi: mwl8k: inject DSSS Parameter Set element into beacons if missing (git-fixes).\n- wifi: rtw88: sdio: use indirect IO for device registers before power-on (stable-fixes).\n- wifi: rtw89: print just once for unknown C2H events (stable-fixes).\n- wifi: zd1211rw: fix potential memory leak in __zd_usb_enable_rx() (git-fixes).\n- x86/CPU/AMD: Add RDSEED fix for Zen5 (git-fixes).\n- x86/CPU/AMD: Add additional fixed RDSEED microcode revisions (git-fixes).\n- x86/CPU/AMD: Add missing terminator for zen5_rdseed_microcode (git-fixes).\n- x86/CPU/AMD: Do the common init on future Zens too (git-fixes).\n- x86/amd_nb: Add new PCI IDs for AMD family 0x1a (stable-fixes).\n- x86/bugs: Fix reporting of LFENCE retpoline (git-fixes).\n- x86/bugs: Report correct retbleed mitigation status (git-fixes).\n- x86/vmscape: Add old Intel CPUs to affected list (git-fixes).\n- xe/oa: Fix query mode of operation for OAR/OAC (git-fixes).\n- xhci: dbc: Allow users to modify DbC poll interval via sysfs (stable-fixes).\n- xhci: dbc: Avoid event polling busyloop if pending rx transfers are inactive (git-fixes).\n- xhci: dbc: Improve performance by removing delay in transfer event polling (stable-fixes).\n- xhci: dbc: fix bogus 1024 byte prefix if ttyDBC read races with stall event (git-fixes).\n- xhci: dbc: poll at different rate depending on data transfer activity (stable-fixes).\n",
"title": "Description of the patch"
},
{
"category": "details",
"text": "SUSE-2025-4516,SUSE-SLE-Module-Live-Patching-15-SP7-2025-4516,SUSE-SLE-Module-RT-15-SP7-2025-4516",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2025_4516-1.json"
},
{
"category": "self",
"summary": "URL for SUSE-SU-2025:4516-1",
"url": "https://www.suse.com/support/update/announcement/2025/suse-su-20254516-1/"
},
{
"category": "self",
"summary": "E-Mail link for SUSE-SU-2025:4516-1",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-December/023646.html"
},
{
"category": "self",
"summary": "SUSE Bug 1235463",
"url": "https://bugzilla.suse.com/1235463"
},
{
"category": "self",
"summary": "SUSE Bug 1236743",
"url": "https://bugzilla.suse.com/1236743"
},
{
"category": "self",
"summary": "SUSE Bug 1237888",
"url": "https://bugzilla.suse.com/1237888"
},
{
"category": "self",
"summary": "SUSE Bug 1241166",
"url": "https://bugzilla.suse.com/1241166"
},
{
"category": "self",
"summary": "SUSE Bug 1243474",
"url": "https://bugzilla.suse.com/1243474"
},
{
"category": "self",
"summary": "SUSE Bug 1245193",
"url": "https://bugzilla.suse.com/1245193"
},
{
"category": "self",
"summary": "SUSE Bug 1247076",
"url": "https://bugzilla.suse.com/1247076"
},
{
"category": "self",
"summary": "SUSE Bug 1247500",
"url": "https://bugzilla.suse.com/1247500"
},
{
"category": "self",
"summary": "SUSE Bug 1247509",
"url": "https://bugzilla.suse.com/1247509"
},
{
"category": "self",
"summary": "SUSE Bug 1247683",
"url": "https://bugzilla.suse.com/1247683"
},
{
"category": "self",
"summary": "SUSE Bug 1249547",
"url": "https://bugzilla.suse.com/1249547"
},
{
"category": "self",
"summary": "SUSE Bug 1249912",
"url": "https://bugzilla.suse.com/1249912"
},
{
"category": "self",
"summary": "SUSE Bug 1249982",
"url": "https://bugzilla.suse.com/1249982"
},
{
"category": "self",
"summary": "SUSE Bug 1250034",
"url": "https://bugzilla.suse.com/1250034"
},
{
"category": "self",
"summary": "SUSE Bug 1250176",
"url": "https://bugzilla.suse.com/1250176"
},
{
"category": "self",
"summary": "SUSE Bug 1250237",
"url": "https://bugzilla.suse.com/1250237"
},
{
"category": "self",
"summary": "SUSE Bug 1250252",
"url": "https://bugzilla.suse.com/1250252"
},
{
"category": "self",
"summary": "SUSE Bug 1250705",
"url": "https://bugzilla.suse.com/1250705"
},
{
"category": "self",
"summary": "SUSE Bug 1251120",
"url": "https://bugzilla.suse.com/1251120"
},
{
"category": "self",
"summary": "SUSE Bug 1251786",
"url": "https://bugzilla.suse.com/1251786"
},
{
"category": "self",
"summary": "SUSE Bug 1252063",
"url": "https://bugzilla.suse.com/1252063"
},
{
"category": "self",
"summary": "SUSE Bug 1252267",
"url": "https://bugzilla.suse.com/1252267"
},
{
"category": "self",
"summary": "SUSE Bug 1252269",
"url": "https://bugzilla.suse.com/1252269"
},
{
"category": "self",
"summary": "SUSE Bug 1252303",
"url": "https://bugzilla.suse.com/1252303"
},
{
"category": "self",
"summary": "SUSE Bug 1252352",
"url": "https://bugzilla.suse.com/1252352"
},
{
"category": "self",
"summary": "SUSE Bug 1252353",
"url": "https://bugzilla.suse.com/1252353"
},
{
"category": "self",
"summary": "SUSE Bug 1252365",
"url": "https://bugzilla.suse.com/1252365"
},
{
"category": "self",
"summary": "SUSE Bug 1252366",
"url": "https://bugzilla.suse.com/1252366"
},
{
"category": "self",
"summary": "SUSE Bug 1252368",
"url": "https://bugzilla.suse.com/1252368"
},
{
"category": "self",
"summary": "SUSE Bug 1252370",
"url": "https://bugzilla.suse.com/1252370"
},
{
"category": "self",
"summary": "SUSE Bug 1252681",
"url": "https://bugzilla.suse.com/1252681"
},
{
"category": "self",
"summary": "SUSE Bug 1252763",
"url": "https://bugzilla.suse.com/1252763"
},
{
"category": "self",
"summary": "SUSE Bug 1252773",
"url": "https://bugzilla.suse.com/1252773"
},
{
"category": "self",
"summary": "SUSE Bug 1252774",
"url": "https://bugzilla.suse.com/1252774"
},
{
"category": "self",
"summary": "SUSE Bug 1252780",
"url": "https://bugzilla.suse.com/1252780"
},
{
"category": "self",
"summary": "SUSE Bug 1252790",
"url": "https://bugzilla.suse.com/1252790"
},
{
"category": "self",
"summary": "SUSE Bug 1252794",
"url": "https://bugzilla.suse.com/1252794"
},
{
"category": "self",
"summary": "SUSE Bug 1252795",
"url": "https://bugzilla.suse.com/1252795"
},
{
"category": "self",
"summary": "SUSE Bug 1252809",
"url": "https://bugzilla.suse.com/1252809"
},
{
"category": "self",
"summary": "SUSE Bug 1252817",
"url": "https://bugzilla.suse.com/1252817"
},
{
"category": "self",
"summary": "SUSE Bug 1252821",
"url": "https://bugzilla.suse.com/1252821"
},
{
"category": "self",
"summary": "SUSE Bug 1252836",
"url": "https://bugzilla.suse.com/1252836"
},
{
"category": "self",
"summary": "SUSE Bug 1252845",
"url": "https://bugzilla.suse.com/1252845"
},
{
"category": "self",
"summary": "SUSE Bug 1252862",
"url": "https://bugzilla.suse.com/1252862"
},
{
"category": "self",
"summary": "SUSE Bug 1252912",
"url": "https://bugzilla.suse.com/1252912"
},
{
"category": "self",
"summary": "SUSE Bug 1252917",
"url": "https://bugzilla.suse.com/1252917"
},
{
"category": "self",
"summary": "SUSE Bug 1252923",
"url": "https://bugzilla.suse.com/1252923"
},
{
"category": "self",
"summary": "SUSE Bug 1252928",
"url": "https://bugzilla.suse.com/1252928"
},
{
"category": "self",
"summary": "SUSE Bug 1253018",
"url": "https://bugzilla.suse.com/1253018"
},
{
"category": "self",
"summary": "SUSE Bug 1253176",
"url": "https://bugzilla.suse.com/1253176"
},
{
"category": "self",
"summary": "SUSE Bug 1253275",
"url": "https://bugzilla.suse.com/1253275"
},
{
"category": "self",
"summary": "SUSE Bug 1253318",
"url": "https://bugzilla.suse.com/1253318"
},
{
"category": "self",
"summary": "SUSE Bug 1253324",
"url": "https://bugzilla.suse.com/1253324"
},
{
"category": "self",
"summary": "SUSE Bug 1253349",
"url": "https://bugzilla.suse.com/1253349"
},
{
"category": "self",
"summary": "SUSE Bug 1253352",
"url": "https://bugzilla.suse.com/1253352"
},
{
"category": "self",
"summary": "SUSE Bug 1253355",
"url": "https://bugzilla.suse.com/1253355"
},
{
"category": "self",
"summary": "SUSE Bug 1253360",
"url": "https://bugzilla.suse.com/1253360"
},
{
"category": "self",
"summary": "SUSE Bug 1253362",
"url": "https://bugzilla.suse.com/1253362"
},
{
"category": "self",
"summary": "SUSE Bug 1253363",
"url": "https://bugzilla.suse.com/1253363"
},
{
"category": "self",
"summary": "SUSE Bug 1253367",
"url": "https://bugzilla.suse.com/1253367"
},
{
"category": "self",
"summary": "SUSE Bug 1253369",
"url": "https://bugzilla.suse.com/1253369"
},
{
"category": "self",
"summary": "SUSE Bug 1253393",
"url": "https://bugzilla.suse.com/1253393"
},
{
"category": "self",
"summary": "SUSE Bug 1253394",
"url": "https://bugzilla.suse.com/1253394"
},
{
"category": "self",
"summary": "SUSE Bug 1253395",
"url": "https://bugzilla.suse.com/1253395"
},
{
"category": "self",
"summary": "SUSE Bug 1253403",
"url": "https://bugzilla.suse.com/1253403"
},
{
"category": "self",
"summary": "SUSE Bug 1253407",
"url": "https://bugzilla.suse.com/1253407"
},
{
"category": "self",
"summary": "SUSE Bug 1253409",
"url": "https://bugzilla.suse.com/1253409"
},
{
"category": "self",
"summary": "SUSE Bug 1253412",
"url": "https://bugzilla.suse.com/1253412"
},
{
"category": "self",
"summary": "SUSE Bug 1253416",
"url": "https://bugzilla.suse.com/1253416"
},
{
"category": "self",
"summary": "SUSE Bug 1253421",
"url": "https://bugzilla.suse.com/1253421"
},
{
"category": "self",
"summary": "SUSE Bug 1253423",
"url": "https://bugzilla.suse.com/1253423"
},
{
"category": "self",
"summary": "SUSE Bug 1253424",
"url": "https://bugzilla.suse.com/1253424"
},
{
"category": "self",
"summary": "SUSE Bug 1253425",
"url": "https://bugzilla.suse.com/1253425"
},
{
"category": "self",
"summary": "SUSE Bug 1253427",
"url": "https://bugzilla.suse.com/1253427"
},
{
"category": "self",
"summary": "SUSE Bug 1253428",
"url": "https://bugzilla.suse.com/1253428"
},
{
"category": "self",
"summary": "SUSE Bug 1253431",
"url": "https://bugzilla.suse.com/1253431"
},
{
"category": "self",
"summary": "SUSE Bug 1253436",
"url": "https://bugzilla.suse.com/1253436"
},
{
"category": "self",
"summary": "SUSE Bug 1253438",
"url": "https://bugzilla.suse.com/1253438"
},
{
"category": "self",
"summary": "SUSE Bug 1253440",
"url": "https://bugzilla.suse.com/1253440"
},
{
"category": "self",
"summary": "SUSE Bug 1253441",
"url": "https://bugzilla.suse.com/1253441"
},
{
"category": "self",
"summary": "SUSE Bug 1253445",
"url": "https://bugzilla.suse.com/1253445"
},
{
"category": "self",
"summary": "SUSE Bug 1253448",
"url": "https://bugzilla.suse.com/1253448"
},
{
"category": "self",
"summary": "SUSE Bug 1253449",
"url": "https://bugzilla.suse.com/1253449"
},
{
"category": "self",
"summary": "SUSE Bug 1253453",
"url": "https://bugzilla.suse.com/1253453"
},
{
"category": "self",
"summary": "SUSE Bug 1253456",
"url": "https://bugzilla.suse.com/1253456"
},
{
"category": "self",
"summary": "SUSE Bug 1253472",
"url": "https://bugzilla.suse.com/1253472"
},
{
"category": "self",
"summary": "SUSE Bug 1253648",
"url": "https://bugzilla.suse.com/1253648"
},
{
"category": "self",
"summary": "SUSE Bug 1253779",
"url": "https://bugzilla.suse.com/1253779"
},
{
"category": "self",
"summary": "SUSE Bug 1254181",
"url": "https://bugzilla.suse.com/1254181"
},
{
"category": "self",
"summary": "SUSE Bug 1254221",
"url": "https://bugzilla.suse.com/1254221"
},
{
"category": "self",
"summary": "SUSE Bug 1254235",
"url": "https://bugzilla.suse.com/1254235"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-50253 page",
"url": "https://www.suse.com/security/cve/CVE-2022-50253/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2023-53676 page",
"url": "https://www.suse.com/security/cve/CVE-2023-53676/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-21710 page",
"url": "https://www.suse.com/security/cve/CVE-2025-21710/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-37916 page",
"url": "https://www.suse.com/security/cve/CVE-2025-37916/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-38359 page",
"url": "https://www.suse.com/security/cve/CVE-2025-38359/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-39788 page",
"url": "https://www.suse.com/security/cve/CVE-2025-39788/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-39805 page",
"url": "https://www.suse.com/security/cve/CVE-2025-39805/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-39819 page",
"url": "https://www.suse.com/security/cve/CVE-2025-39819/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-39822 page",
"url": "https://www.suse.com/security/cve/CVE-2025-39822/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-39859 page",
"url": "https://www.suse.com/security/cve/CVE-2025-39859/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-39944 page",
"url": "https://www.suse.com/security/cve/CVE-2025-39944/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-39980 page",
"url": "https://www.suse.com/security/cve/CVE-2025-39980/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40001 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40001/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40021 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40021/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40027 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40027/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40030 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40030/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40038 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40038/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40040 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40040/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40047 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40047/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40048 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40048/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40055 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40055/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40059 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40059/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40064 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40064/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40070 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40070/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40074 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40074/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40075 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40075/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40080 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40080/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40083 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40083/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40086 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40086/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40098 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40098/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40105 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40105/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40107 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40107/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40109 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40109/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40110 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40110/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40111 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40111/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40115 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40115/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40116 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40116/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40118 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40118/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40120 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40120/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40121 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40121/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40127 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40127/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40129 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40129/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40139 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40139/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40140 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40140/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40141 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40141/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40149 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40149/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40154 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40154/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40156 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40156/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40157 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40157/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40159 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40159/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40164 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40164/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40168 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40168/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40169 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40169/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40171 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40171/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40172 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40172/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40173 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40173/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40176 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40176/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40180 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40180/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40183 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40183/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40185 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40185/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40186 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40186/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40188 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40188/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40194 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40194/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40198 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40198/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40200 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40200/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40204 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40204/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40205 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40205/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40206 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40206/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40207 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40207/"
}
],
"title": "Security update for the Linux Kernel",
"tracking": {
"current_release_date": "2025-12-23T16:27:39Z",
"generator": {
"date": "2025-12-23T16:27:39Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "SUSE-SU-2025:4516-1",
"initial_release_date": "2025-12-23T16:27:39Z",
"revision_history": [
{
"date": "2025-12-23T16:27:39Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "kernel-devel-rt-6.4.0-150700.7.25.1.noarch",
"product": {
"name": "kernel-devel-rt-6.4.0-150700.7.25.1.noarch",
"product_id": "kernel-devel-rt-6.4.0-150700.7.25.1.noarch"
}
},
{
"category": "product_version",
"name": "kernel-source-rt-6.4.0-150700.7.25.1.noarch",
"product": {
"name": "kernel-source-rt-6.4.0-150700.7.25.1.noarch",
"product_id": "kernel-source-rt-6.4.0-150700.7.25.1.noarch"
}
}
],
"category": "architecture",
"name": "noarch"
},
{
"branches": [
{
"category": "product_version",
"name": "cluster-md-kmp-rt-6.4.0-150700.7.25.1.x86_64",
"product": {
"name": "cluster-md-kmp-rt-6.4.0-150700.7.25.1.x86_64",
"product_id": "cluster-md-kmp-rt-6.4.0-150700.7.25.1.x86_64"
}
},
{
"category": "product_version",
"name": "dlm-kmp-rt-6.4.0-150700.7.25.1.x86_64",
"product": {
"name": "dlm-kmp-rt-6.4.0-150700.7.25.1.x86_64",
"product_id": "dlm-kmp-rt-6.4.0-150700.7.25.1.x86_64"
}
},
{
"category": "product_version",
"name": "gfs2-kmp-rt-6.4.0-150700.7.25.1.x86_64",
"product": {
"name": "gfs2-kmp-rt-6.4.0-150700.7.25.1.x86_64",
"product_id": "gfs2-kmp-rt-6.4.0-150700.7.25.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-livepatch-6_4_0-150700_7_25-rt-1-150700.1.3.1.x86_64",
"product": {
"name": "kernel-livepatch-6_4_0-150700_7_25-rt-1-150700.1.3.1.x86_64",
"product_id": "kernel-livepatch-6_4_0-150700_7_25-rt-1-150700.1.3.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-rt-6.4.0-150700.7.25.1.x86_64",
"product": {
"name": "kernel-rt-6.4.0-150700.7.25.1.x86_64",
"product_id": "kernel-rt-6.4.0-150700.7.25.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-rt-devel-6.4.0-150700.7.25.1.x86_64",
"product": {
"name": "kernel-rt-devel-6.4.0-150700.7.25.1.x86_64",
"product_id": "kernel-rt-devel-6.4.0-150700.7.25.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-rt-extra-6.4.0-150700.7.25.1.x86_64",
"product": {
"name": "kernel-rt-extra-6.4.0-150700.7.25.1.x86_64",
"product_id": "kernel-rt-extra-6.4.0-150700.7.25.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-rt-livepatch-6.4.0-150700.7.25.1.x86_64",
"product": {
"name": "kernel-rt-livepatch-6.4.0-150700.7.25.1.x86_64",
"product_id": "kernel-rt-livepatch-6.4.0-150700.7.25.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-rt-livepatch-devel-6.4.0-150700.7.25.1.x86_64",
"product": {
"name": "kernel-rt-livepatch-devel-6.4.0-150700.7.25.1.x86_64",
"product_id": "kernel-rt-livepatch-devel-6.4.0-150700.7.25.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-rt-optional-6.4.0-150700.7.25.1.x86_64",
"product": {
"name": "kernel-rt-optional-6.4.0-150700.7.25.1.x86_64",
"product_id": "kernel-rt-optional-6.4.0-150700.7.25.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-rt-vdso-6.4.0-150700.7.25.1.x86_64",
"product": {
"name": "kernel-rt-vdso-6.4.0-150700.7.25.1.x86_64",
"product_id": "kernel-rt-vdso-6.4.0-150700.7.25.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-syms-rt-6.4.0-150700.7.25.1.x86_64",
"product": {
"name": "kernel-syms-rt-6.4.0-150700.7.25.1.x86_64",
"product_id": "kernel-syms-rt-6.4.0-150700.7.25.1.x86_64"
}
},
{
"category": "product_version",
"name": "kselftests-kmp-rt-6.4.0-150700.7.25.1.x86_64",
"product": {
"name": "kselftests-kmp-rt-6.4.0-150700.7.25.1.x86_64",
"product_id": "kselftests-kmp-rt-6.4.0-150700.7.25.1.x86_64"
}
},
{
"category": "product_version",
"name": "ocfs2-kmp-rt-6.4.0-150700.7.25.1.x86_64",
"product": {
"name": "ocfs2-kmp-rt-6.4.0-150700.7.25.1.x86_64",
"product_id": "ocfs2-kmp-rt-6.4.0-150700.7.25.1.x86_64"
}
},
{
"category": "product_version",
"name": "reiserfs-kmp-rt-6.4.0-150700.7.25.1.x86_64",
"product": {
"name": "reiserfs-kmp-rt-6.4.0-150700.7.25.1.x86_64",
"product_id": "reiserfs-kmp-rt-6.4.0-150700.7.25.1.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "SUSE Linux Enterprise Live Patching 15 SP7",
"product": {
"name": "SUSE Linux Enterprise Live Patching 15 SP7",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP7",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-module-live-patching:15:sp7"
}
}
},
{
"category": "product_name",
"name": "SUSE Real Time Module 15 SP7",
"product": {
"name": "SUSE Real Time Module 15 SP7",
"product_id": "SUSE Real Time Module 15 SP7",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-module-rt:15:sp7"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-6_4_0-150700_7_25-rt-1-150700.1.3.1.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP7",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_25-rt-1-150700.1.3.1.x86_64"
},
"product_reference": "kernel-livepatch-6_4_0-150700_7_25-rt-1-150700.1.3.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cluster-md-kmp-rt-6.4.0-150700.7.25.1.x86_64 as component of SUSE Real Time Module 15 SP7",
"product_id": "SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.25.1.x86_64"
},
"product_reference": "cluster-md-kmp-rt-6.4.0-150700.7.25.1.x86_64",
"relates_to_product_reference": "SUSE Real Time Module 15 SP7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dlm-kmp-rt-6.4.0-150700.7.25.1.x86_64 as component of SUSE Real Time Module 15 SP7",
"product_id": "SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.25.1.x86_64"
},
"product_reference": "dlm-kmp-rt-6.4.0-150700.7.25.1.x86_64",
"relates_to_product_reference": "SUSE Real Time Module 15 SP7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gfs2-kmp-rt-6.4.0-150700.7.25.1.x86_64 as component of SUSE Real Time Module 15 SP7",
"product_id": "SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.25.1.x86_64"
},
"product_reference": "gfs2-kmp-rt-6.4.0-150700.7.25.1.x86_64",
"relates_to_product_reference": "SUSE Real Time Module 15 SP7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-rt-6.4.0-150700.7.25.1.noarch as component of SUSE Real Time Module 15 SP7",
"product_id": "SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.25.1.noarch"
},
"product_reference": "kernel-devel-rt-6.4.0-150700.7.25.1.noarch",
"relates_to_product_reference": "SUSE Real Time Module 15 SP7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-6.4.0-150700.7.25.1.x86_64 as component of SUSE Real Time Module 15 SP7",
"product_id": "SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.25.1.x86_64"
},
"product_reference": "kernel-rt-6.4.0-150700.7.25.1.x86_64",
"relates_to_product_reference": "SUSE Real Time Module 15 SP7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-devel-6.4.0-150700.7.25.1.x86_64 as component of SUSE Real Time Module 15 SP7",
"product_id": "SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.25.1.x86_64"
},
"product_reference": "kernel-rt-devel-6.4.0-150700.7.25.1.x86_64",
"relates_to_product_reference": "SUSE Real Time Module 15 SP7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-source-rt-6.4.0-150700.7.25.1.noarch as component of SUSE Real Time Module 15 SP7",
"product_id": "SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.25.1.noarch"
},
"product_reference": "kernel-source-rt-6.4.0-150700.7.25.1.noarch",
"relates_to_product_reference": "SUSE Real Time Module 15 SP7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-rt-6.4.0-150700.7.25.1.x86_64 as component of SUSE Real Time Module 15 SP7",
"product_id": "SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.25.1.x86_64"
},
"product_reference": "kernel-syms-rt-6.4.0-150700.7.25.1.x86_64",
"relates_to_product_reference": "SUSE Real Time Module 15 SP7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ocfs2-kmp-rt-6.4.0-150700.7.25.1.x86_64 as component of SUSE Real Time Module 15 SP7",
"product_id": "SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.25.1.x86_64"
},
"product_reference": "ocfs2-kmp-rt-6.4.0-150700.7.25.1.x86_64",
"relates_to_product_reference": "SUSE Real Time Module 15 SP7"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2022-50253",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-50253"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nbpf: make sure skb-\u003elen != 0 when redirecting to a tunneling device\n\nsyzkaller managed to trigger another case where skb-\u003elen == 0\nwhen we enter __dev_queue_xmit:\n\nWARNING: CPU: 0 PID: 2470 at include/linux/skbuff.h:2576 skb_assert_len include/linux/skbuff.h:2576 [inline]\nWARNING: CPU: 0 PID: 2470 at include/linux/skbuff.h:2576 __dev_queue_xmit+0x2069/0x35e0 net/core/dev.c:4295\n\nCall Trace:\n dev_queue_xmit+0x17/0x20 net/core/dev.c:4406\n __bpf_tx_skb net/core/filter.c:2115 [inline]\n __bpf_redirect_no_mac net/core/filter.c:2140 [inline]\n __bpf_redirect+0x5fb/0xda0 net/core/filter.c:2163\n ____bpf_clone_redirect net/core/filter.c:2447 [inline]\n bpf_clone_redirect+0x247/0x390 net/core/filter.c:2419\n bpf_prog_48159a89cb4a9a16+0x59/0x5e\n bpf_dispatcher_nop_func include/linux/bpf.h:897 [inline]\n __bpf_prog_run include/linux/filter.h:596 [inline]\n bpf_prog_run include/linux/filter.h:603 [inline]\n bpf_test_run+0x46c/0x890 net/bpf/test_run.c:402\n bpf_prog_test_run_skb+0xbdc/0x14c0 net/bpf/test_run.c:1170\n bpf_prog_test_run+0x345/0x3c0 kernel/bpf/syscall.c:3648\n __sys_bpf+0x43a/0x6c0 kernel/bpf/syscall.c:5005\n __do_sys_bpf kernel/bpf/syscall.c:5091 [inline]\n __se_sys_bpf kernel/bpf/syscall.c:5089 [inline]\n __x64_sys_bpf+0x7c/0x90 kernel/bpf/syscall.c:5089\n do_syscall_64+0x54/0x70 arch/x86/entry/common.c:48\n entry_SYSCALL_64_after_hwframe+0x61/0xc6\n\nThe reproducer doesn\u0027t really reproduce outside of syzkaller\nenvironment, so I\u0027m taking a guess here. It looks like we\ndo generate correct ETH_HLEN-sized packet, but we redirect\nthe packet to the tunneling device. Before we do so, we\n__skb_pull l2 header and arrive again at skb-\u003elen == 0.\nDoesn\u0027t seem like we can do anything better than having\nan explicit check after __skb_pull?",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_25-rt-1-150700.1.3.1.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.25.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.25.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.25.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-50253",
"url": "https://www.suse.com/security/cve/CVE-2022-50253"
},
{
"category": "external",
"summary": "SUSE Bug 1249912 for CVE-2022-50253",
"url": "https://bugzilla.suse.com/1249912"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_25-rt-1-150700.1.3.1.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.25.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.25.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.25.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_25-rt-1-150700.1.3.1.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.25.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.25.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.25.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-23T16:27:39Z",
"details": "moderate"
}
],
"title": "CVE-2022-50253"
},
{
"cve": "CVE-2023-53676",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2023-53676"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nscsi: target: iscsi: Fix buffer overflow in lio_target_nacl_info_show()\n\nThe function lio_target_nacl_info_show() uses sprintf() in a loop to print\ndetails for every iSCSI connection in a session without checking for the\nbuffer length. With enough iSCSI connections it\u0027s possible to overflow the\nbuffer provided by configfs and corrupt the memory.\n\nThis patch replaces sprintf() with sysfs_emit_at() that checks for buffer\nboundries.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_25-rt-1-150700.1.3.1.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.25.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.25.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.25.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2023-53676",
"url": "https://www.suse.com/security/cve/CVE-2023-53676"
},
{
"category": "external",
"summary": "SUSE Bug 1251786 for CVE-2023-53676",
"url": "https://bugzilla.suse.com/1251786"
},
{
"category": "external",
"summary": "SUSE Bug 1251787 for CVE-2023-53676",
"url": "https://bugzilla.suse.com/1251787"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_25-rt-1-150700.1.3.1.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.25.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.25.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.25.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_25-rt-1-150700.1.3.1.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.25.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.25.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.25.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-23T16:27:39Z",
"details": "important"
}
],
"title": "CVE-2023-53676"
},
{
"cve": "CVE-2025-21710",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-21710"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\ntcp: correct handling of extreme memory squeeze\n\nTesting with iperf3 using the \"pasta\" protocol splicer has revealed\na problem in the way tcp handles window advertising in extreme memory\nsqueeze situations.\n\nUnder memory pressure, a socket endpoint may temporarily advertise\na zero-sized window, but this is not stored as part of the socket data.\nThe reasoning behind this is that it is considered a temporary setting\nwhich shouldn\u0027t influence any further calculations.\n\nHowever, if we happen to stall at an unfortunate value of the current\nwindow size, the algorithm selecting a new value will consistently fail\nto advertise a non-zero window once we have freed up enough memory.\nThis means that this side\u0027s notion of the current window size is\ndifferent from the one last advertised to the peer, causing the latter\nto not send any data to resolve the sitution.\n\nThe problem occurs on the iperf3 server side, and the socket in question\nis a completely regular socket with the default settings for the\nfedora40 kernel. We do not use SO_PEEK or SO_RCVBUF on the socket.\n\nThe following excerpt of a logging session, with own comments added,\nshows more in detail what is happening:\n\n// tcp_v4_rcv(-\u003e)\n// tcp_rcv_established(-\u003e)\n[5201\u003c-\u003e39222]: ==== Activating log @ net/ipv4/tcp_input.c/tcp_data_queue()/5257 ====\n[5201\u003c-\u003e39222]: tcp_data_queue(-\u003e)\n[5201\u003c-\u003e39222]: DROPPING skb [265600160..265665640], reason: SKB_DROP_REASON_PROTO_MEM\n [rcv_nxt 265600160, rcv_wnd 262144, snt_ack 265469200, win_now 131184]\n [copied_seq 259909392-\u003e260034360 (124968), unread 5565800, qlen 85, ofoq 0]\n [OFO queue: gap: 65480, len: 0]\n[5201\u003c-\u003e39222]: tcp_data_queue(\u003c-)\n[5201\u003c-\u003e39222]: __tcp_transmit_skb(-\u003e)\n [tp-\u003ercv_wup: 265469200, tp-\u003ercv_wnd: 262144, tp-\u003ercv_nxt 265600160]\n[5201\u003c-\u003e39222]: tcp_select_window(-\u003e)\n[5201\u003c-\u003e39222]: (inet_csk(sk)-\u003eicsk_ack.pending \u0026 ICSK_ACK_NOMEM) ? --\u003e TRUE\n [tp-\u003ercv_wup: 265469200, tp-\u003ercv_wnd: 262144, tp-\u003ercv_nxt 265600160]\n returning 0\n[5201\u003c-\u003e39222]: tcp_select_window(\u003c-)\n[5201\u003c-\u003e39222]: ADVERTISING WIN 0, ACK_SEQ: 265600160\n[5201\u003c-\u003e39222]: [__tcp_transmit_skb(\u003c-)\n[5201\u003c-\u003e39222]: tcp_rcv_established(\u003c-)\n[5201\u003c-\u003e39222]: tcp_v4_rcv(\u003c-)\n\n// Receive queue is at 85 buffers and we are out of memory.\n// We drop the incoming buffer, although it is in sequence, and decide\n// to send an advertisement with a window of zero.\n// We don\u0027t update tp-\u003ercv_wnd and tp-\u003ercv_wup accordingly, which means\n// we unconditionally shrink the window.\n\n[5201\u003c-\u003e39222]: tcp_recvmsg_locked(-\u003e)\n[5201\u003c-\u003e39222]: __tcp_cleanup_rbuf(-\u003e) tp-\u003ercv_wup: 265469200, tp-\u003ercv_wnd: 262144, tp-\u003ercv_nxt 265600160\n[5201\u003c-\u003e39222]: [new_win = 0, win_now = 131184, 2 * win_now = 262368]\n[5201\u003c-\u003e39222]: [new_win \u003e= (2 * win_now) ? --\u003e time_to_ack = 0]\n[5201\u003c-\u003e39222]: NOT calling tcp_send_ack()\n [tp-\u003ercv_wup: 265469200, tp-\u003ercv_wnd: 262144, tp-\u003ercv_nxt 265600160]\n[5201\u003c-\u003e39222]: __tcp_cleanup_rbuf(\u003c-)\n [rcv_nxt 265600160, rcv_wnd 262144, snt_ack 265469200, win_now 131184]\n [copied_seq 260040464-\u003e260040464 (0), unread 5559696, qlen 85, ofoq 0]\n returning 6104 bytes\n[5201\u003c-\u003e39222]: tcp_recvmsg_locked(\u003c-)\n\n// After each read, the algorithm for calculating the new receive\n// window in __tcp_cleanup_rbuf() finds it is too small to advertise\n// or to update tp-\u003ercv_wnd.\n// Meanwhile, the peer thinks the window is zero, and will not send\n// any more data to trigger an update from the interrupt mode side.\n\n[5201\u003c-\u003e39222]: tcp_recvmsg_locked(-\u003e)\n[5201\u003c-\u003e39222]: __tcp_cleanup_rbuf(-\u003e) tp-\u003ercv_wup: 265469200, tp-\u003ercv_wnd: 262144, tp-\u003ercv_nxt 265600160\n[5201\u003c-\u003e39222]: [new_win = 262144, win_now = 131184, 2 * win_n\n---truncated---",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_25-rt-1-150700.1.3.1.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.25.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.25.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.25.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-21710",
"url": "https://www.suse.com/security/cve/CVE-2025-21710"
},
{
"category": "external",
"summary": "SUSE Bug 1237888 for CVE-2025-21710",
"url": "https://bugzilla.suse.com/1237888"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_25-rt-1-150700.1.3.1.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.25.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.25.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.25.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_25-rt-1-150700.1.3.1.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.25.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.25.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.25.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-23T16:27:39Z",
"details": "moderate"
}
],
"title": "CVE-2025-21710"
},
{
"cve": "CVE-2025-37916",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-37916"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\npds_core: remove write-after-free of client_id\n\nA use-after-free error popped up in stress testing:\n\n[Mon Apr 21 21:21:33 2025] BUG: KFENCE: use-after-free write in pdsc_auxbus_dev_del+0xef/0x160 [pds_core]\n[Mon Apr 21 21:21:33 2025] Use-after-free write at 0x000000007013ecd1 (in kfence-#47):\n[Mon Apr 21 21:21:33 2025] pdsc_auxbus_dev_del+0xef/0x160 [pds_core]\n[Mon Apr 21 21:21:33 2025] pdsc_remove+0xc0/0x1b0 [pds_core]\n[Mon Apr 21 21:21:33 2025] pci_device_remove+0x24/0x70\n[Mon Apr 21 21:21:33 2025] device_release_driver_internal+0x11f/0x180\n[Mon Apr 21 21:21:33 2025] driver_detach+0x45/0x80\n[Mon Apr 21 21:21:33 2025] bus_remove_driver+0x83/0xe0\n[Mon Apr 21 21:21:33 2025] pci_unregister_driver+0x1a/0x80\n\nThe actual device uninit usually happens on a separate thread\nscheduled after this code runs, but there is no guarantee of order\nof thread execution, so this could be a problem. There\u0027s no\nactual need to clear the client_id at this point, so simply\nremove the offending code.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_25-rt-1-150700.1.3.1.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.25.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.25.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.25.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-37916",
"url": "https://www.suse.com/security/cve/CVE-2025-37916"
},
{
"category": "external",
"summary": "SUSE Bug 1243474 for CVE-2025-37916",
"url": "https://bugzilla.suse.com/1243474"
},
{
"category": "external",
"summary": "SUSE Bug 1243535 for CVE-2025-37916",
"url": "https://bugzilla.suse.com/1243535"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_25-rt-1-150700.1.3.1.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.25.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.25.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.25.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_25-rt-1-150700.1.3.1.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.25.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.25.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.25.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-23T16:27:39Z",
"details": "moderate"
}
],
"title": "CVE-2025-37916"
},
{
"cve": "CVE-2025-38359",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-38359"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\ns390/mm: Fix in_atomic() handling in do_secure_storage_access()\n\nKernel user spaces accesses to not exported pages in atomic context\nincorrectly try to resolve the page fault.\nWith debug options enabled call traces like this can be seen:\n\nBUG: sleeping function called from invalid context at kernel/locking/rwsem.c:1523\nin_atomic(): 1, irqs_disabled(): 0, non_block: 0, pid: 419074, name: qemu-system-s39\npreempt_count: 1, expected: 0\nRCU nest depth: 0, expected: 0\nINFO: lockdep is turned off.\nPreemption disabled at:\n[\u003c00000383ea47cfa2\u003e] copy_page_from_iter_atomic+0xa2/0x8a0\nCPU: 12 UID: 0 PID: 419074 Comm: qemu-system-s39\nTainted: G W 6.16.0-20250531.rc0.git0.69b3a602feac.63.fc42.s390x+debug #1 PREEMPT\nTainted: [W]=WARN\nHardware name: IBM 3931 A01 703 (LPAR)\nCall Trace:\n [\u003c00000383e990d282\u003e] dump_stack_lvl+0xa2/0xe8\n [\u003c00000383e99bf152\u003e] __might_resched+0x292/0x2d0\n [\u003c00000383eaa7c374\u003e] down_read+0x34/0x2d0\n [\u003c00000383e99432f8\u003e] do_secure_storage_access+0x108/0x360\n [\u003c00000383eaa724b0\u003e] __do_pgm_check+0x130/0x220\n [\u003c00000383eaa842e4\u003e] pgm_check_handler+0x114/0x160\n [\u003c00000383ea47d028\u003e] copy_page_from_iter_atomic+0x128/0x8a0\n([\u003c00000383ea47d016\u003e] copy_page_from_iter_atomic+0x116/0x8a0)\n [\u003c00000383e9c45eae\u003e] generic_perform_write+0x16e/0x310\n [\u003c00000383e9eb87f4\u003e] ext4_buffered_write_iter+0x84/0x160\n [\u003c00000383e9da0de4\u003e] vfs_write+0x1c4/0x460\n [\u003c00000383e9da123c\u003e] ksys_write+0x7c/0x100\n [\u003c00000383eaa7284e\u003e] __do_syscall+0x15e/0x280\n [\u003c00000383eaa8417e\u003e] system_call+0x6e/0x90\nINFO: lockdep is turned off.\n\nIt is not allowed to take the mmap_lock while in atomic context. Therefore\nhandle such a secure storage access fault as if the accessed page is not\nmapped: the uaccess function will return -EFAULT, and the caller has to\ndeal with this. Usually this means that the access is retried in process\ncontext, which allows to resolve the page fault (or in this case export the\npage).",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_25-rt-1-150700.1.3.1.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.25.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.25.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.25.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-38359",
"url": "https://www.suse.com/security/cve/CVE-2025-38359"
},
{
"category": "external",
"summary": "SUSE Bug 1247076 for CVE-2025-38359",
"url": "https://bugzilla.suse.com/1247076"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_25-rt-1-150700.1.3.1.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.25.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.25.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.25.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_25-rt-1-150700.1.3.1.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.25.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.25.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.25.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-23T16:27:39Z",
"details": "moderate"
}
],
"title": "CVE-2025-38359"
},
{
"cve": "CVE-2025-39788",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-39788"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nscsi: ufs: exynos: Fix programming of HCI_UTRL_NEXUS_TYPE\n\nOn Google gs101, the number of UTP transfer request slots (nutrs) is 32,\nand in this case the driver ends up programming the UTRL_NEXUS_TYPE\nincorrectly as 0.\n\nThis is because the left hand side of the shift is 1, which is of type\nint, i.e. 31 bits wide. Shifting by more than that width results in\nundefined behaviour.\n\nFix this by switching to the BIT() macro, which applies correct type\ncasting as required. This ensures the correct value is written to\nUTRL_NEXUS_TYPE (0xffffffff on gs101), and it also fixes a UBSAN shift\nwarning:\n\n UBSAN: shift-out-of-bounds in drivers/ufs/host/ufs-exynos.c:1113:21\n shift exponent 32 is too large for 32-bit type \u0027int\u0027\n\nFor consistency, apply the same change to the nutmrs / UTMRL_NEXUS_TYPE\nwrite.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_25-rt-1-150700.1.3.1.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.25.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.25.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.25.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-39788",
"url": "https://www.suse.com/security/cve/CVE-2025-39788"
},
{
"category": "external",
"summary": "SUSE Bug 1249547 for CVE-2025-39788",
"url": "https://bugzilla.suse.com/1249547"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_25-rt-1-150700.1.3.1.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.25.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.25.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.25.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_25-rt-1-150700.1.3.1.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.25.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.25.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.25.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-23T16:27:39Z",
"details": "moderate"
}
],
"title": "CVE-2025-39788"
},
{
"cve": "CVE-2025-39805",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-39805"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnet: macb: fix unregister_netdev call order in macb_remove()\n\nWhen removing a macb device, the driver calls phy_exit() before\nunregister_netdev(). This leads to a WARN from kernfs:\n\n ------------[ cut here ]------------\n kernfs: can not remove \u0027attached_dev\u0027, no directory\n WARNING: CPU: 1 PID: 27146 at fs/kernfs/dir.c:1683\n Call trace:\n kernfs_remove_by_name_ns+0xd8/0xf0\n sysfs_remove_link+0x24/0x58\n phy_detach+0x5c/0x168\n phy_disconnect+0x4c/0x70\n phylink_disconnect_phy+0x6c/0xc0 [phylink]\n macb_close+0x6c/0x170 [macb]\n ...\n macb_remove+0x60/0x168 [macb]\n platform_remove+0x5c/0x80\n ...\n\nThe warning happens because the PHY is being exited while the netdev\nis still registered. The correct order is to unregister the netdev\nbefore shutting down the PHY and cleaning up the MDIO bus.\n\nFix this by moving unregister_netdev() ahead of phy_exit() in\nmacb_remove().",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_25-rt-1-150700.1.3.1.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.25.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.25.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.25.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-39805",
"url": "https://www.suse.com/security/cve/CVE-2025-39805"
},
{
"category": "external",
"summary": "SUSE Bug 1249982 for CVE-2025-39805",
"url": "https://bugzilla.suse.com/1249982"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_25-rt-1-150700.1.3.1.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.25.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.25.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.25.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_25-rt-1-150700.1.3.1.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.25.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.25.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.25.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-23T16:27:39Z",
"details": "moderate"
}
],
"title": "CVE-2025-39805"
},
{
"cve": "CVE-2025-39819",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-39819"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nfs/smb: Fix inconsistent refcnt update\n\nA possible inconsistent update of refcount was identified in `smb2_compound_op`.\nSuch inconsistent update could lead to possible resource leaks.\n\nWhy it is a possible bug:\n1. In the comment section of the function, it clearly states that the\nreference to `cfile` should be dropped after calling this function.\n2. Every control flow path would check and drop the reference to\n`cfile`, except the patched one.\n3. Existing callers would not handle refcount update of `cfile` if\n-ENOMEM is returned.\n\nTo fix the bug, an extra goto label \"out\" is added, to make sure that the\ncleanup logic would always be respected. As the problem is caused by the\nallocation failure of `vars`, the cleanup logic between label \"finished\"\nand \"out\" can be safely ignored. According to the definition of function\n`is_replayable_error`, the error code of \"-ENOMEM\" is not recoverable.\nTherefore, the replay logic also gets ignored.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_25-rt-1-150700.1.3.1.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.25.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.25.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.25.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-39819",
"url": "https://www.suse.com/security/cve/CVE-2025-39819"
},
{
"category": "external",
"summary": "SUSE Bug 1250176 for CVE-2025-39819",
"url": "https://bugzilla.suse.com/1250176"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_25-rt-1-150700.1.3.1.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.25.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.25.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.25.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_25-rt-1-150700.1.3.1.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.25.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.25.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.25.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-23T16:27:39Z",
"details": "moderate"
}
],
"title": "CVE-2025-39819"
},
{
"cve": "CVE-2025-39822",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-39822"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nio_uring/kbuf: fix signedness in this_len calculation\n\nWhen importing and using buffers, buf-\u003elen is considered unsigned.\nHowever, buf-\u003elen is converted to signed int when committing. This can\nlead to unexpected behavior if the buffer is large enough to be\ninterpreted as a negative value. Make min_t calculation unsigned.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_25-rt-1-150700.1.3.1.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.25.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.25.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.25.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-39822",
"url": "https://www.suse.com/security/cve/CVE-2025-39822"
},
{
"category": "external",
"summary": "SUSE Bug 1250034 for CVE-2025-39822",
"url": "https://bugzilla.suse.com/1250034"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_25-rt-1-150700.1.3.1.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.25.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.25.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.25.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_25-rt-1-150700.1.3.1.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.25.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.25.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.25.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-23T16:27:39Z",
"details": "moderate"
}
],
"title": "CVE-2025-39822"
},
{
"cve": "CVE-2025-39859",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-39859"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nptp: ocp: fix use-after-free bugs causing by ptp_ocp_watchdog\n\nThe ptp_ocp_detach() only shuts down the watchdog timer if it is\npending. However, if the timer handler is already running, the\ntimer_delete_sync() is not called. This leads to race conditions\nwhere the devlink that contains the ptp_ocp is deallocated while\nthe timer handler is still accessing it, resulting in use-after-free\nbugs. The following details one of the race scenarios.\n\n(thread 1) | (thread 2)\nptp_ocp_remove() |\n ptp_ocp_detach() | ptp_ocp_watchdog()\n if (timer_pending(\u0026bp-\u003ewatchdog))| bp = timer_container_of()\n timer_delete_sync() |\n |\n devlink_free(devlink) //free |\n | bp-\u003e //use\n\nResolve this by unconditionally calling timer_delete_sync() to ensure\nthe timer is reliably deactivated, preventing any access after free.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_25-rt-1-150700.1.3.1.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.25.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.25.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.25.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-39859",
"url": "https://www.suse.com/security/cve/CVE-2025-39859"
},
{
"category": "external",
"summary": "SUSE Bug 1250252 for CVE-2025-39859",
"url": "https://bugzilla.suse.com/1250252"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_25-rt-1-150700.1.3.1.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.25.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.25.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.25.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_25-rt-1-150700.1.3.1.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.25.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.25.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.25.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-23T16:27:39Z",
"details": "moderate"
}
],
"title": "CVE-2025-39859"
},
{
"cve": "CVE-2025-39944",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-39944"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nocteontx2-pf: Fix use-after-free bugs in otx2_sync_tstamp()\n\nThe original code relies on cancel_delayed_work() in otx2_ptp_destroy(),\nwhich does not ensure that the delayed work item synctstamp_work has fully\ncompleted if it was already running. This leads to use-after-free scenarios\nwhere otx2_ptp is deallocated by otx2_ptp_destroy(), while synctstamp_work\nremains active and attempts to dereference otx2_ptp in otx2_sync_tstamp().\nFurthermore, the synctstamp_work is cyclic, the likelihood of triggering\nthe bug is nonnegligible.\n\nA typical race condition is illustrated below:\n\nCPU 0 (cleanup) | CPU 1 (delayed work callback)\notx2_remove() |\n otx2_ptp_destroy() | otx2_sync_tstamp()\n cancel_delayed_work() |\n kfree(ptp) |\n | ptp = container_of(...); //UAF\n | ptp-\u003e //UAF\n\nThis is confirmed by a KASAN report:\n\nBUG: KASAN: slab-use-after-free in __run_timer_base.part.0+0x7d7/0x8c0\nWrite of size 8 at addr ffff88800aa09a18 by task bash/136\n...\nCall Trace:\n \u003cIRQ\u003e\n dump_stack_lvl+0x55/0x70\n print_report+0xcf/0x610\n ? __run_timer_base.part.0+0x7d7/0x8c0\n kasan_report+0xb8/0xf0\n ? __run_timer_base.part.0+0x7d7/0x8c0\n __run_timer_base.part.0+0x7d7/0x8c0\n ? __pfx___run_timer_base.part.0+0x10/0x10\n ? __pfx_read_tsc+0x10/0x10\n ? ktime_get+0x60/0x140\n ? lapic_next_event+0x11/0x20\n ? clockevents_program_event+0x1d4/0x2a0\n run_timer_softirq+0xd1/0x190\n handle_softirqs+0x16a/0x550\n irq_exit_rcu+0xaf/0xe0\n sysvec_apic_timer_interrupt+0x70/0x80\n \u003c/IRQ\u003e\n...\nAllocated by task 1:\n kasan_save_stack+0x24/0x50\n kasan_save_track+0x14/0x30\n __kasan_kmalloc+0x7f/0x90\n otx2_ptp_init+0xb1/0x860\n otx2_probe+0x4eb/0xc30\n local_pci_probe+0xdc/0x190\n pci_device_probe+0x2fe/0x470\n really_probe+0x1ca/0x5c0\n __driver_probe_device+0x248/0x310\n driver_probe_device+0x44/0x120\n __driver_attach+0xd2/0x310\n bus_for_each_dev+0xed/0x170\n bus_add_driver+0x208/0x500\n driver_register+0x132/0x460\n do_one_initcall+0x89/0x300\n kernel_init_freeable+0x40d/0x720\n kernel_init+0x1a/0x150\n ret_from_fork+0x10c/0x1a0\n ret_from_fork_asm+0x1a/0x30\n\nFreed by task 136:\n kasan_save_stack+0x24/0x50\n kasan_save_track+0x14/0x30\n kasan_save_free_info+0x3a/0x60\n __kasan_slab_free+0x3f/0x50\n kfree+0x137/0x370\n otx2_ptp_destroy+0x38/0x80\n otx2_remove+0x10d/0x4c0\n pci_device_remove+0xa6/0x1d0\n device_release_driver_internal+0xf8/0x210\n pci_stop_bus_device+0x105/0x150\n pci_stop_and_remove_bus_device_locked+0x15/0x30\n remove_store+0xcc/0xe0\n kernfs_fop_write_iter+0x2c3/0x440\n vfs_write+0x871/0xd70\n ksys_write+0xee/0x1c0\n do_syscall_64+0xac/0x280\n entry_SYSCALL_64_after_hwframe+0x77/0x7f\n...\n\nReplace cancel_delayed_work() with cancel_delayed_work_sync() to ensure\nthat the delayed work item is properly canceled before the otx2_ptp is\ndeallocated.\n\nThis bug was initially identified through static analysis. To reproduce\nand test it, I simulated the OcteonTX2 PCI device in QEMU and introduced\nartificial delays within the otx2_sync_tstamp() function to increase the\nlikelihood of triggering the bug.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_25-rt-1-150700.1.3.1.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.25.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.25.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.25.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-39944",
"url": "https://www.suse.com/security/cve/CVE-2025-39944"
},
{
"category": "external",
"summary": "SUSE Bug 1251120 for CVE-2025-39944",
"url": "https://bugzilla.suse.com/1251120"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_25-rt-1-150700.1.3.1.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.25.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.25.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.25.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_25-rt-1-150700.1.3.1.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.25.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.25.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.25.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-23T16:27:39Z",
"details": "moderate"
}
],
"title": "CVE-2025-39944"
},
{
"cve": "CVE-2025-39980",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-39980"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnexthop: Forbid FDB status change while nexthop is in a group\n\nThe kernel forbids the creation of non-FDB nexthop groups with FDB\nnexthops:\n\n # ip nexthop add id 1 via 192.0.2.1 fdb\n # ip nexthop add id 2 group 1\n Error: Non FDB nexthop group cannot have fdb nexthops.\n\nAnd vice versa:\n\n # ip nexthop add id 3 via 192.0.2.2 dev dummy1\n # ip nexthop add id 4 group 3 fdb\n Error: FDB nexthop group can only have fdb nexthops.\n\nHowever, as long as no routes are pointing to a non-FDB nexthop group,\nthe kernel allows changing the type of a nexthop from FDB to non-FDB and\nvice versa:\n\n # ip nexthop add id 5 via 192.0.2.2 dev dummy1\n # ip nexthop add id 6 group 5\n # ip nexthop replace id 5 via 192.0.2.2 fdb\n # echo $?\n 0\n\nThis configuration is invalid and can result in a NPD [1] since FDB\nnexthops are not associated with a nexthop device:\n\n # ip route add 198.51.100.1/32 nhid 6\n # ping 198.51.100.1\n\nFix by preventing nexthop FDB status change while the nexthop is in a\ngroup:\n\n # ip nexthop add id 7 via 192.0.2.2 dev dummy1\n # ip nexthop add id 8 group 7\n # ip nexthop replace id 7 via 192.0.2.2 fdb\n Error: Cannot change nexthop FDB status while in a group.\n\n[1]\nBUG: kernel NULL pointer dereference, address: 00000000000003c0\n[...]\nOops: Oops: 0000 [#1] SMP\nCPU: 6 UID: 0 PID: 367 Comm: ping Not tainted 6.17.0-rc6-virtme-gb65678cacc03 #1 PREEMPT(voluntary)\nHardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.17.0-4.fc41 04/01/2014\nRIP: 0010:fib_lookup_good_nhc+0x1e/0x80\n[...]\nCall Trace:\n \u003cTASK\u003e\n fib_table_lookup+0x541/0x650\n ip_route_output_key_hash_rcu+0x2ea/0x970\n ip_route_output_key_hash+0x55/0x80\n __ip4_datagram_connect+0x250/0x330\n udp_connect+0x2b/0x60\n __sys_connect+0x9c/0xd0\n __x64_sys_connect+0x18/0x20\n do_syscall_64+0xa4/0x2a0\n entry_SYSCALL_64_after_hwframe+0x4b/0x53",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_25-rt-1-150700.1.3.1.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.25.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.25.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.25.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-39980",
"url": "https://www.suse.com/security/cve/CVE-2025-39980"
},
{
"category": "external",
"summary": "SUSE Bug 1252063 for CVE-2025-39980",
"url": "https://bugzilla.suse.com/1252063"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_25-rt-1-150700.1.3.1.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.25.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.25.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.25.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_25-rt-1-150700.1.3.1.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.25.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.25.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.25.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-23T16:27:39Z",
"details": "moderate"
}
],
"title": "CVE-2025-39980"
},
{
"cve": "CVE-2025-40001",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40001"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nscsi: mvsas: Fix use-after-free bugs in mvs_work_queue\n\nDuring the detaching of Marvell\u0027s SAS/SATA controller, the original code\ncalls cancel_delayed_work() in mvs_free() to cancel the delayed work\nitem mwq-\u003ework_q. However, if mwq-\u003ework_q is already running, the\ncancel_delayed_work() may fail to cancel it. This can lead to\nuse-after-free scenarios where mvs_free() frees the mvs_info while\nmvs_work_queue() is still executing and attempts to access the\nalready-freed mvs_info.\n\nA typical race condition is illustrated below:\n\nCPU 0 (remove) | CPU 1 (delayed work callback)\nmvs_pci_remove() |\n mvs_free() | mvs_work_queue()\n cancel_delayed_work() |\n kfree(mvi) |\n | mvi-\u003e // UAF\n\nReplace cancel_delayed_work() with cancel_delayed_work_sync() to ensure\nthat the delayed work item is properly canceled and any executing\ndelayed work item completes before the mvs_info is deallocated.\n\nThis bug was found by static analysis.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_25-rt-1-150700.1.3.1.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.25.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.25.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.25.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40001",
"url": "https://www.suse.com/security/cve/CVE-2025-40001"
},
{
"category": "external",
"summary": "SUSE Bug 1252303 for CVE-2025-40001",
"url": "https://bugzilla.suse.com/1252303"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_25-rt-1-150700.1.3.1.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.25.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.25.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.25.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.8,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_25-rt-1-150700.1.3.1.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.25.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.25.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.25.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-23T16:27:39Z",
"details": "moderate"
}
],
"title": "CVE-2025-40001"
},
{
"cve": "CVE-2025-40021",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40021"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\ntracing: dynevent: Add a missing lockdown check on dynevent\n\nSince dynamic_events interface on tracefs is compatible with\nkprobe_events and uprobe_events, it should also check the lockdown\nstatus and reject if it is set.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_25-rt-1-150700.1.3.1.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.25.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.25.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.25.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40021",
"url": "https://www.suse.com/security/cve/CVE-2025-40021"
},
{
"category": "external",
"summary": "SUSE Bug 1252681 for CVE-2025-40021",
"url": "https://bugzilla.suse.com/1252681"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_25-rt-1-150700.1.3.1.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.25.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.25.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.25.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_25-rt-1-150700.1.3.1.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.25.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.25.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.25.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-23T16:27:39Z",
"details": "moderate"
}
],
"title": "CVE-2025-40021"
},
{
"cve": "CVE-2025-40027",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40027"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnet/9p: fix double req put in p9_fd_cancelled\n\nSyzkaller reports a KASAN issue as below:\n\ngeneral protection fault, probably for non-canonical address 0xfbd59c0000000021: 0000 [#1] PREEMPT SMP KASAN NOPTI\nKASAN: maybe wild-memory-access in range [0xdead000000000108-0xdead00000000010f]\nCPU: 0 PID: 5083 Comm: syz-executor.2 Not tainted 6.1.134-syzkaller-00037-g855bd1d7d838 #0\nHardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014\nRIP: 0010:__list_del include/linux/list.h:114 [inline]\nRIP: 0010:__list_del_entry include/linux/list.h:137 [inline]\nRIP: 0010:list_del include/linux/list.h:148 [inline]\nRIP: 0010:p9_fd_cancelled+0xe9/0x200 net/9p/trans_fd.c:734\n\nCall Trace:\n \u003cTASK\u003e\n p9_client_flush+0x351/0x440 net/9p/client.c:614\n p9_client_rpc+0xb6b/0xc70 net/9p/client.c:734\n p9_client_version net/9p/client.c:920 [inline]\n p9_client_create+0xb51/0x1240 net/9p/client.c:1027\n v9fs_session_init+0x1f0/0x18f0 fs/9p/v9fs.c:408\n v9fs_mount+0xba/0xcb0 fs/9p/vfs_super.c:126\n legacy_get_tree+0x108/0x220 fs/fs_context.c:632\n vfs_get_tree+0x8e/0x300 fs/super.c:1573\n do_new_mount fs/namespace.c:3056 [inline]\n path_mount+0x6a6/0x1e90 fs/namespace.c:3386\n do_mount fs/namespace.c:3399 [inline]\n __do_sys_mount fs/namespace.c:3607 [inline]\n __se_sys_mount fs/namespace.c:3584 [inline]\n __x64_sys_mount+0x283/0x300 fs/namespace.c:3584\n do_syscall_x64 arch/x86/entry/common.c:51 [inline]\n do_syscall_64+0x35/0x80 arch/x86/entry/common.c:81\n entry_SYSCALL_64_after_hwframe+0x6e/0xd8\n\nThis happens because of a race condition between:\n\n- The 9p client sending an invalid flush request and later cleaning it up;\n- The 9p client in p9_read_work() canceled all pending requests.\n\n Thread 1 Thread 2\n ...\n p9_client_create()\n ...\n p9_fd_create()\n ...\n p9_conn_create()\n ...\n // start Thread 2\n INIT_WORK(\u0026m-\u003erq, p9_read_work);\n p9_read_work()\n ...\n p9_client_rpc()\n ...\n ...\n p9_conn_cancel()\n ...\n spin_lock(\u0026m-\u003ereq_lock);\n ...\n p9_fd_cancelled()\n ...\n ...\n spin_unlock(\u0026m-\u003ereq_lock);\n // status rewrite\n p9_client_cb(m-\u003eclient, req, REQ_STATUS_ERROR)\n // first remove\n list_del(\u0026req-\u003ereq_list);\n ...\n\n spin_lock(\u0026m-\u003ereq_lock)\n ...\n // second remove\n list_del(\u0026req-\u003ereq_list);\n spin_unlock(\u0026m-\u003ereq_lock)\n ...\n\nCommit 74d6a5d56629 (\"9p/trans_fd: Fix concurrency del of req_list in\np9_fd_cancelled/p9_read_work\") fixes a concurrency issue in the 9p filesystem\nclient where the req_list could be deleted simultaneously by both\np9_read_work and p9_fd_cancelled functions, but for the case where req-\u003estatus\nequals REQ_STATUS_RCVD.\n\nUpdate the check for req-\u003estatus in p9_fd_cancelled to skip processing not\njust received requests, but anything that is not SENT, as whatever\nchanged the state from SENT also removed the request from its list.\n\nFound by Linux Verification Center (linuxtesting.org) with Syzkaller.\n\n[updated the check from status == RECV || status == ERROR to status != SENT]",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_25-rt-1-150700.1.3.1.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.25.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.25.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.25.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40027",
"url": "https://www.suse.com/security/cve/CVE-2025-40027"
},
{
"category": "external",
"summary": "SUSE Bug 1252763 for CVE-2025-40027",
"url": "https://bugzilla.suse.com/1252763"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_25-rt-1-150700.1.3.1.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.25.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.25.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.25.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_25-rt-1-150700.1.3.1.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.25.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.25.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.25.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-23T16:27:39Z",
"details": "moderate"
}
],
"title": "CVE-2025-40027"
},
{
"cve": "CVE-2025-40030",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40030"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\npinctrl: check the return value of pinmux_ops::get_function_name()\n\nWhile the API contract in docs doesn\u0027t specify it explicitly, the\ngeneric implementation of the get_function_name() callback from struct\npinmux_ops - pinmux_generic_get_function_name() - can fail and return\nNULL. This is already checked in pinmux_check_ops() so add a similar\ncheck in pinmux_func_name_to_selector() instead of passing the returned\npointer right down to strcmp() where the NULL can get dereferenced. This\nis normal operation when adding new pinfunctions.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_25-rt-1-150700.1.3.1.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.25.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.25.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.25.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40030",
"url": "https://www.suse.com/security/cve/CVE-2025-40030"
},
{
"category": "external",
"summary": "SUSE Bug 1252773 for CVE-2025-40030",
"url": "https://bugzilla.suse.com/1252773"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_25-rt-1-150700.1.3.1.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.25.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.25.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.25.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_25-rt-1-150700.1.3.1.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.25.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.25.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.25.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-23T16:27:39Z",
"details": "moderate"
}
],
"title": "CVE-2025-40030"
},
{
"cve": "CVE-2025-40038",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40038"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nKVM: SVM: Skip fastpath emulation on VM-Exit if next RIP isn\u0027t valid\n\nSkip the WRMSR and HLT fastpaths in SVM\u0027s VM-Exit handler if the next RIP\nisn\u0027t valid, e.g. because KVM is running with nrips=false. SVM must\ndecode and emulate to skip the instruction if the CPU doesn\u0027t provide the\nnext RIP, and getting the instruction bytes to decode requires reading\nguest memory. Reading guest memory through the emulator can fault, i.e.\ncan sleep, which is disallowed since the fastpath handlers run with IRQs\ndisabled.\n\n BUG: sleeping function called from invalid context at ./include/linux/uaccess.h:106\n in_atomic(): 1, irqs_disabled(): 1, non_block: 0, pid: 32611, name: qemu\n preempt_count: 1, expected: 0\n INFO: lockdep is turned off.\n irq event stamp: 30580\n hardirqs last enabled at (30579): [\u003cffffffffc08b2527\u003e] vcpu_run+0x1787/0x1db0 [kvm]\n hardirqs last disabled at (30580): [\u003cffffffffb4f62e32\u003e] __schedule+0x1e2/0xed0\n softirqs last enabled at (30570): [\u003cffffffffb4247a64\u003e] fpu_swap_kvm_fpstate+0x44/0x210\n softirqs last disabled at (30568): [\u003cffffffffb4247a64\u003e] fpu_swap_kvm_fpstate+0x44/0x210\n CPU: 298 UID: 0 PID: 32611 Comm: qemu Tainted: G U 6.16.0-smp--e6c618b51cfe-sleep #782 NONE\n Tainted: [U]=USER\n Hardware name: Google Astoria-Turin/astoria, BIOS 0.20241223.2-0 01/17/2025\n Call Trace:\n \u003cTASK\u003e\n dump_stack_lvl+0x7d/0xb0\n __might_resched+0x271/0x290\n __might_fault+0x28/0x80\n kvm_vcpu_read_guest_page+0x8d/0xc0 [kvm]\n kvm_fetch_guest_virt+0x92/0xc0 [kvm]\n __do_insn_fetch_bytes+0xf3/0x1e0 [kvm]\n x86_decode_insn+0xd1/0x1010 [kvm]\n x86_emulate_instruction+0x105/0x810 [kvm]\n __svm_skip_emulated_instruction+0xc4/0x140 [kvm_amd]\n handle_fastpath_invd+0xc4/0x1a0 [kvm]\n vcpu_run+0x11a1/0x1db0 [kvm]\n kvm_arch_vcpu_ioctl_run+0x5cc/0x730 [kvm]\n kvm_vcpu_ioctl+0x578/0x6a0 [kvm]\n __se_sys_ioctl+0x6d/0xb0\n do_syscall_64+0x8a/0x2c0\n entry_SYSCALL_64_after_hwframe+0x4b/0x53\n RIP: 0033:0x7f479d57a94b\n \u003c/TASK\u003e\n\nNote, this is essentially a reapply of commit 5c30e8101e8d (\"KVM: SVM:\nSkip WRMSR fastpath on VM-Exit if next RIP isn\u0027t valid\"), but with\ndifferent justification (KVM now grabs SRCU when skipping the instruction\nfor other reasons).",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_25-rt-1-150700.1.3.1.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.25.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.25.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.25.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40038",
"url": "https://www.suse.com/security/cve/CVE-2025-40038"
},
{
"category": "external",
"summary": "SUSE Bug 1252817 for CVE-2025-40038",
"url": "https://bugzilla.suse.com/1252817"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_25-rt-1-150700.1.3.1.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.25.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.25.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.25.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_25-rt-1-150700.1.3.1.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.25.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.25.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.25.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-23T16:27:39Z",
"details": "moderate"
}
],
"title": "CVE-2025-40038"
},
{
"cve": "CVE-2025-40040",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40040"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nmm/ksm: fix flag-dropping behavior in ksm_madvise\n\nsyzkaller discovered the following crash: (kernel BUG)\n\n[ 44.607039] ------------[ cut here ]------------\n[ 44.607422] kernel BUG at mm/userfaultfd.c:2067!\n[ 44.608148] Oops: invalid opcode: 0000 [#1] SMP DEBUG_PAGEALLOC KASAN NOPTI\n[ 44.608814] CPU: 1 UID: 0 PID: 2475 Comm: reproducer Not tainted 6.16.0-rc6 #1 PREEMPT(none)\n[ 44.609635] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.16.3-0-ga6ed6b701f0a-prebuilt.qemu.org 04/01/2014\n[ 44.610695] RIP: 0010:userfaultfd_release_all+0x3a8/0x460\n\n\u003csnip other registers, drop unreliable trace\u003e\n\n[ 44.617726] Call Trace:\n[ 44.617926] \u003cTASK\u003e\n[ 44.619284] userfaultfd_release+0xef/0x1b0\n[ 44.620976] __fput+0x3f9/0xb60\n[ 44.621240] fput_close_sync+0x110/0x210\n[ 44.622222] __x64_sys_close+0x8f/0x120\n[ 44.622530] do_syscall_64+0x5b/0x2f0\n[ 44.622840] entry_SYSCALL_64_after_hwframe+0x76/0x7e\n[ 44.623244] RIP: 0033:0x7f365bb3f227\n\nKernel panics because it detects UFFD inconsistency during\nuserfaultfd_release_all(). Specifically, a VMA which has a valid pointer\nto vma-\u003evm_userfaultfd_ctx, but no UFFD flags in vma-\u003evm_flags.\n\nThe inconsistency is caused in ksm_madvise(): when user calls madvise()\nwith MADV_UNMEARGEABLE on a VMA that is registered for UFFD in MINOR mode,\nit accidentally clears all flags stored in the upper 32 bits of\nvma-\u003evm_flags.\n\nAssuming x86_64 kernel build, unsigned long is 64-bit and unsigned int and\nint are 32-bit wide. This setup causes the following mishap during the \u0026=\n~VM_MERGEABLE assignment.\n\nVM_MERGEABLE is a 32-bit constant of type unsigned int, 0x8000\u00270000. \nAfter ~ is applied, it becomes 0x7fff\u0027ffff unsigned int, which is then\npromoted to unsigned long before the \u0026 operation. This promotion fills\nupper 32 bits with leading 0s, as we\u0027re doing unsigned conversion (and\neven for a signed conversion, this wouldn\u0027t help as the leading bit is 0).\n\u0026 operation thus ends up AND-ing vm_flags with 0x0000\u00270000\u00277fff\u0027ffff\ninstead of intended 0xffff\u0027ffff\u00277fff\u0027ffff and hence accidentally clears\nthe upper 32-bits of its value.\n\nFix it by changing `VM_MERGEABLE` constant to unsigned long, using the\nBIT() macro.\n\nNote: other VM_* flags are not affected: This only happens to the\nVM_MERGEABLE flag, as the other VM_* flags are all constants of type int\nand after ~ operation, they end up with leading 1 and are thus converted\nto unsigned long with leading 1s.\n\nNote 2:\nAfter commit 31defc3b01d9 (\"userfaultfd: remove (VM_)BUG_ON()s\"), this is\nno longer a kernel BUG, but a WARNING at the same place:\n\n[ 45.595973] WARNING: CPU: 1 PID: 2474 at mm/userfaultfd.c:2067\n\nbut the root-cause (flag-drop) remains the same.\n\n[akpm@linux-foundation.org: rust bindgen wasn\u0027t able to handle BIT(), from Miguel]",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_25-rt-1-150700.1.3.1.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.25.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.25.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.25.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40040",
"url": "https://www.suse.com/security/cve/CVE-2025-40040"
},
{
"category": "external",
"summary": "SUSE Bug 1252780 for CVE-2025-40040",
"url": "https://bugzilla.suse.com/1252780"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_25-rt-1-150700.1.3.1.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.25.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.25.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.25.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_25-rt-1-150700.1.3.1.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.25.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.25.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.25.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-23T16:27:39Z",
"details": "moderate"
}
],
"title": "CVE-2025-40040"
},
{
"cve": "CVE-2025-40047",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40047"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nio_uring/waitid: always prune wait queue entry in io_waitid_wait()\n\nFor a successful return, always remove our entry from the wait queue\nentry list. Previously this was skipped if a cancelation was in\nprogress, but this can race with another invocation of the wait queue\nentry callback.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_25-rt-1-150700.1.3.1.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.25.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.25.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.25.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40047",
"url": "https://www.suse.com/security/cve/CVE-2025-40047"
},
{
"category": "external",
"summary": "SUSE Bug 1252790 for CVE-2025-40047",
"url": "https://bugzilla.suse.com/1252790"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_25-rt-1-150700.1.3.1.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.25.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.25.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.25.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.7,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_25-rt-1-150700.1.3.1.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.25.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.25.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.25.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-23T16:27:39Z",
"details": "moderate"
}
],
"title": "CVE-2025-40047"
},
{
"cve": "CVE-2025-40048",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40048"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nuio_hv_generic: Let userspace take care of interrupt mask\n\nRemove the logic to set interrupt mask by default in uio_hv_generic\ndriver as the interrupt mask value is supposed to be controlled\ncompletely by the user space. If the mask bit gets changed\nby the driver, concurrently with user mode operating on the ring,\nthe mask bit may be set when it is supposed to be clear, and the\nuser-mode driver will miss an interrupt which will cause a hang.\n\nFor eg- when the driver sets inbound ring buffer interrupt mask to 1,\nthe host does not interrupt the guest on the UIO VMBus channel.\nHowever, setting the mask does not prevent the host from putting a\nmessage in the inbound ring buffer. So let\u0027s assume that happens,\nthe host puts a message into the ring buffer but does not interrupt.\n\nSubsequently, the user space code in the guest sets the inbound ring\nbuffer interrupt mask to 0, saying \"Hey, I\u0027m ready for interrupts\".\nUser space code then calls pread() to wait for an interrupt.\nThen one of two things happens:\n\n* The host never sends another message. So the pread() waits forever.\n* The host does send another message. But because there\u0027s already a\n message in the ring buffer, it doesn\u0027t generate an interrupt.\n This is the correct behavior, because the host should only send an\n interrupt when the inbound ring buffer transitions from empty to\n not-empty. Adding an additional message to a ring buffer that is not\n empty is not supposed to generate an interrupt on the guest.\n Since the guest is waiting in pread() and not removing messages from\n the ring buffer, the pread() waits forever.\n\nThis could be easily reproduced in hv_fcopy_uio_daemon if we delay\nsetting interrupt mask to 0.\n\nSimilarly if hv_uio_channel_cb() sets the interrupt_mask to 1,\nthere\u0027s a race condition. Once user space empties the inbound ring\nbuffer, but before user space sets interrupt_mask to 0, the host could\nput another message in the ring buffer but it wouldn\u0027t interrupt.\nThen the next pread() would hang.\n\nFix these by removing all instances where interrupt_mask is changed,\nwhile keeping the one in set_event() unchanged to enable userspace\ncontrol the interrupt mask by writing 0/1 to /dev/uioX.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_25-rt-1-150700.1.3.1.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.25.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.25.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.25.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40048",
"url": "https://www.suse.com/security/cve/CVE-2025-40048"
},
{
"category": "external",
"summary": "SUSE Bug 1252862 for CVE-2025-40048",
"url": "https://bugzilla.suse.com/1252862"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_25-rt-1-150700.1.3.1.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.25.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.25.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.25.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_25-rt-1-150700.1.3.1.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.25.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.25.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.25.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-23T16:27:39Z",
"details": "moderate"
}
],
"title": "CVE-2025-40048"
},
{
"cve": "CVE-2025-40055",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40055"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nocfs2: fix double free in user_cluster_connect()\n\nuser_cluster_disconnect() frees \"conn-\u003ecc_private\" which is \"lc\" but then\nthe error handling frees \"lc\" a second time. Set \"lc\" to NULL on this\npath to avoid a double free.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_25-rt-1-150700.1.3.1.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.25.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.25.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.25.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40055",
"url": "https://www.suse.com/security/cve/CVE-2025-40055"
},
{
"category": "external",
"summary": "SUSE Bug 1252821 for CVE-2025-40055",
"url": "https://bugzilla.suse.com/1252821"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_25-rt-1-150700.1.3.1.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.25.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.25.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.25.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_25-rt-1-150700.1.3.1.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.25.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.25.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.25.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-23T16:27:39Z",
"details": "moderate"
}
],
"title": "CVE-2025-40055"
},
{
"cve": "CVE-2025-40059",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40059"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\ncoresight: Fix incorrect handling for return value of devm_kzalloc\n\nThe return value of devm_kzalloc could be an null pointer,\nuse \"!desc.pdata\" to fix incorrect handling return value\nof devm_kzalloc.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_25-rt-1-150700.1.3.1.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.25.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.25.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.25.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40059",
"url": "https://www.suse.com/security/cve/CVE-2025-40059"
},
{
"category": "external",
"summary": "SUSE Bug 1252809 for CVE-2025-40059",
"url": "https://bugzilla.suse.com/1252809"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_25-rt-1-150700.1.3.1.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.25.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.25.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.25.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_25-rt-1-150700.1.3.1.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.25.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.25.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.25.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-23T16:27:39Z",
"details": "moderate"
}
],
"title": "CVE-2025-40059"
},
{
"cve": "CVE-2025-40064",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40064"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nsmc: Fix use-after-free in __pnet_find_base_ndev().\n\nsyzbot reported use-after-free of net_device in __pnet_find_base_ndev(),\nwhich was called during connect(). [0]\n\nsmc_pnet_find_ism_resource() fetches sk_dst_get(sk)-\u003edev and passes\ndown to pnet_find_base_ndev(), where RTNL is held. Then, UAF happened\nat __pnet_find_base_ndev() when the dev is first used.\n\nThis means dev had already been freed before acquiring RTNL in\npnet_find_base_ndev().\n\nWhile dev is going away, dst-\u003edev could be swapped with blackhole_netdev,\nand the dev\u0027s refcnt by dst will be released.\n\nWe must hold dev\u0027s refcnt before calling smc_pnet_find_ism_resource().\n\nAlso, smc_pnet_find_roce_resource() has the same problem.\n\nLet\u0027s use __sk_dst_get() and dst_dev_rcu() in the two functions.\n\n[0]:\nBUG: KASAN: use-after-free in __pnet_find_base_ndev+0x1b1/0x1c0 net/smc/smc_pnet.c:926\nRead of size 1 at addr ffff888036bac33a by task syz.0.3632/18609\n\nCPU: 1 UID: 0 PID: 18609 Comm: syz.0.3632 Not tainted syzkaller #0 PREEMPT(full)\nHardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/18/2025\nCall Trace:\n \u003cTASK\u003e\n dump_stack_lvl+0x189/0x250 lib/dump_stack.c:120\n print_address_description mm/kasan/report.c:378 [inline]\n print_report+0xca/0x240 mm/kasan/report.c:482\n kasan_report+0x118/0x150 mm/kasan/report.c:595\n __pnet_find_base_ndev+0x1b1/0x1c0 net/smc/smc_pnet.c:926\n pnet_find_base_ndev net/smc/smc_pnet.c:946 [inline]\n smc_pnet_find_ism_by_pnetid net/smc/smc_pnet.c:1103 [inline]\n smc_pnet_find_ism_resource+0xef/0x390 net/smc/smc_pnet.c:1154\n smc_find_ism_device net/smc/af_smc.c:1030 [inline]\n smc_find_proposal_devices net/smc/af_smc.c:1115 [inline]\n __smc_connect+0x372/0x1890 net/smc/af_smc.c:1545\n smc_connect+0x877/0xd90 net/smc/af_smc.c:1715\n __sys_connect_file net/socket.c:2086 [inline]\n __sys_connect+0x313/0x440 net/socket.c:2105\n __do_sys_connect net/socket.c:2111 [inline]\n __se_sys_connect net/socket.c:2108 [inline]\n __x64_sys_connect+0x7a/0x90 net/socket.c:2108\n do_syscall_x64 arch/x86/entry/syscall_64.c:63 [inline]\n do_syscall_64+0xfa/0x3b0 arch/x86/entry/syscall_64.c:94\n entry_SYSCALL_64_after_hwframe+0x77/0x7f\nRIP: 0033:0x7f47cbf8eba9\nCode: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 \u003c48\u003e 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48\nRSP: 002b:00007f47ccdb1038 EFLAGS: 00000246 ORIG_RAX: 000000000000002a\nRAX: ffffffffffffffda RBX: 00007f47cc1d5fa0 RCX: 00007f47cbf8eba9\nRDX: 0000000000000010 RSI: 0000200000000280 RDI: 000000000000000b\nRBP: 00007f47cc011e19 R08: 0000000000000000 R09: 0000000000000000\nR10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000\nR13: 00007f47cc1d6038 R14: 00007f47cc1d5fa0 R15: 00007ffc512f8aa8\n \u003c/TASK\u003e\n\nThe buggy address belongs to the physical page:\npage: refcount:0 mapcount:0 mapping:0000000000000000 index:0xffff888036bacd00 pfn:0x36bac\nflags: 0xfff00000000000(node=0|zone=1|lastcpupid=0x7ff)\nraw: 00fff00000000000 ffffea0001243d08 ffff8880b863fdc0 0000000000000000\nraw: ffff888036bacd00 0000000000000000 00000000ffffffff 0000000000000000\npage dumped because: kasan: bad access detected\npage_owner tracks the page as freed\npage last allocated via order 2, migratetype Unmovable, gfp_mask 0x446dc0(GFP_KERNEL_ACCOUNT|__GFP_ZERO|__GFP_NOWARN|__GFP_RETRY_MAYFAIL|__GFP_COMP), pid 16741, tgid 16741 (syz-executor), ts 343313197788, free_ts 380670750466\n set_page_owner include/linux/page_owner.h:32 [inline]\n post_alloc_hook+0x240/0x2a0 mm/page_alloc.c:1851\n prep_new_page mm/page_alloc.c:1859 [inline]\n get_page_from_freelist+0x21e4/0x22c0 mm/page_alloc.c:3858\n __alloc_frozen_pages_noprof+0x181/0x370 mm/page_alloc.c:5148\n alloc_pages_mpol+0x232/0x4a0 mm/mempolicy.c:2416\n ___kmalloc_large_node+0x5f/0x1b0 mm/slub.c:4317\n __kmalloc_large_node_noprof+0x18/0x90 mm/slub.c:4348\n __do_kmalloc_node mm/slub.c:4364 [inline]\n __kvmalloc_node\n---truncated---",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_25-rt-1-150700.1.3.1.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.25.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.25.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.25.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40064",
"url": "https://www.suse.com/security/cve/CVE-2025-40064"
},
{
"category": "external",
"summary": "SUSE Bug 1252845 for CVE-2025-40064",
"url": "https://bugzilla.suse.com/1252845"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_25-rt-1-150700.1.3.1.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.25.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.25.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.25.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_25-rt-1-150700.1.3.1.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.25.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.25.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.25.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-23T16:27:39Z",
"details": "moderate"
}
],
"title": "CVE-2025-40064"
},
{
"cve": "CVE-2025-40070",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40070"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\npps: fix warning in pps_register_cdev when register device fail\n\nSimilar to previous commit 2a934fdb01db (\"media: v4l2-dev: fix error\nhandling in __video_register_device()\"), the release hook should be set\nbefore device_register(). Otherwise, when device_register() return error\nand put_device() try to callback the release function, the below warning\nmay happen.\n\n ------------[ cut here ]------------\n WARNING: CPU: 1 PID: 4760 at drivers/base/core.c:2567 device_release+0x1bd/0x240 drivers/base/core.c:2567\n Modules linked in:\n CPU: 1 UID: 0 PID: 4760 Comm: syz.4.914 Not tainted 6.17.0-rc3+ #1 NONE\n RIP: 0010:device_release+0x1bd/0x240 drivers/base/core.c:2567\n Call Trace:\n \u003cTASK\u003e\n kobject_cleanup+0x136/0x410 lib/kobject.c:689\n kobject_release lib/kobject.c:720 [inline]\n kref_put include/linux/kref.h:65 [inline]\n kobject_put+0xe9/0x130 lib/kobject.c:737\n put_device+0x24/0x30 drivers/base/core.c:3797\n pps_register_cdev+0x2da/0x370 drivers/pps/pps.c:402\n pps_register_source+0x2f6/0x480 drivers/pps/kapi.c:108\n pps_tty_open+0x190/0x310 drivers/pps/clients/pps-ldisc.c:57\n tty_ldisc_open+0xa7/0x120 drivers/tty/tty_ldisc.c:432\n tty_set_ldisc+0x333/0x780 drivers/tty/tty_ldisc.c:563\n tiocsetd drivers/tty/tty_io.c:2429 [inline]\n tty_ioctl+0x5d1/0x1700 drivers/tty/tty_io.c:2728\n vfs_ioctl fs/ioctl.c:51 [inline]\n __do_sys_ioctl fs/ioctl.c:598 [inline]\n __se_sys_ioctl fs/ioctl.c:584 [inline]\n __x64_sys_ioctl+0x194/0x210 fs/ioctl.c:584\n do_syscall_x64 arch/x86/entry/syscall_64.c:63 [inline]\n do_syscall_64+0x5f/0x2a0 arch/x86/entry/syscall_64.c:94\n entry_SYSCALL_64_after_hwframe+0x76/0x7e\n \u003c/TASK\u003e\n\nBefore commit c79a39dc8d06 (\"pps: Fix a use-after-free\"),\npps_register_cdev() call device_create() to create pps-\u003edev, which will\ninit dev-\u003erelease to device_create_release(). Now the comment is outdated,\njust remove it.\n\nThanks for the reminder from Calvin Owens, \u0027kfree_pps\u0027 should be removed\nin pps_register_source() to avoid a double free in the failure case.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_25-rt-1-150700.1.3.1.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.25.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.25.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.25.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40070",
"url": "https://www.suse.com/security/cve/CVE-2025-40070"
},
{
"category": "external",
"summary": "SUSE Bug 1252836 for CVE-2025-40070",
"url": "https://bugzilla.suse.com/1252836"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_25-rt-1-150700.1.3.1.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.25.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.25.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.25.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_25-rt-1-150700.1.3.1.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.25.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.25.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.25.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-23T16:27:39Z",
"details": "moderate"
}
],
"title": "CVE-2025-40070"
},
{
"cve": "CVE-2025-40074",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40074"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nipv4: start using dst_dev_rcu()\n\nChange icmpv4_xrlim_allow(), ip_defrag() to prevent possible UAF.\n\nChange ipmr_prepare_xmit(), ipmr_queue_fwd_xmit(), ip_mr_output(),\nipv4_neigh_lookup() to use lockdep enabled dst_dev_rcu().",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_25-rt-1-150700.1.3.1.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.25.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.25.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.25.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40074",
"url": "https://www.suse.com/security/cve/CVE-2025-40074"
},
{
"category": "external",
"summary": "SUSE Bug 1252794 for CVE-2025-40074",
"url": "https://bugzilla.suse.com/1252794"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_25-rt-1-150700.1.3.1.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.25.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.25.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.25.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_25-rt-1-150700.1.3.1.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.25.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.25.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.25.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-23T16:27:39Z",
"details": "moderate"
}
],
"title": "CVE-2025-40074"
},
{
"cve": "CVE-2025-40075",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40075"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\ntcp_metrics: use dst_dev_net_rcu()\n\nReplace three dst_dev() with a lockdep enabled helper.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_25-rt-1-150700.1.3.1.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.25.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.25.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.25.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40075",
"url": "https://www.suse.com/security/cve/CVE-2025-40075"
},
{
"category": "external",
"summary": "SUSE Bug 1252795 for CVE-2025-40075",
"url": "https://bugzilla.suse.com/1252795"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_25-rt-1-150700.1.3.1.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.25.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.25.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.25.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_25-rt-1-150700.1.3.1.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.25.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.25.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.25.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-23T16:27:39Z",
"details": "moderate"
}
],
"title": "CVE-2025-40075"
},
{
"cve": "CVE-2025-40080",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40080"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnbd: restrict sockets to TCP and UDP\n\nRecently, syzbot started to abuse NBD with all kinds of sockets.\n\nCommit cf1b2326b734 (\"nbd: verify socket is supported during setup\")\nmade sure the socket supported a shutdown() method.\n\nExplicitely accept TCP and UNIX stream sockets.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_25-rt-1-150700.1.3.1.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.25.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.25.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.25.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40080",
"url": "https://www.suse.com/security/cve/CVE-2025-40080"
},
{
"category": "external",
"summary": "SUSE Bug 1252774 for CVE-2025-40080",
"url": "https://bugzilla.suse.com/1252774"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_25-rt-1-150700.1.3.1.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.25.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.25.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.25.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_25-rt-1-150700.1.3.1.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.25.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.25.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.25.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-23T16:27:39Z",
"details": "moderate"
}
],
"title": "CVE-2025-40080"
},
{
"cve": "CVE-2025-40083",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40083"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnet/sched: sch_qfq: Fix null-deref in agg_dequeue\n\nTo prevent a potential crash in agg_dequeue (net/sched/sch_qfq.c)\nwhen cl-\u003eqdisc-\u003eops-\u003epeek(cl-\u003eqdisc) returns NULL, we check the return\nvalue before using it, similar to the existing approach in sch_hfsc.c.\n\nTo avoid code duplication, the following changes are made:\n\n1. Changed qdisc_warn_nonwc(include/net/pkt_sched.h) into a static\ninline function.\n\n2. Moved qdisc_peek_len from net/sched/sch_hfsc.c to\ninclude/net/pkt_sched.h so that sch_qfq can reuse it.\n\n3. Applied qdisc_peek_len in agg_dequeue to avoid crashing.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_25-rt-1-150700.1.3.1.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.25.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.25.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.25.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40083",
"url": "https://www.suse.com/security/cve/CVE-2025-40083"
},
{
"category": "external",
"summary": "SUSE Bug 1252912 for CVE-2025-40083",
"url": "https://bugzilla.suse.com/1252912"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_25-rt-1-150700.1.3.1.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.25.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.25.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.25.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_25-rt-1-150700.1.3.1.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.25.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.25.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.25.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-23T16:27:39Z",
"details": "moderate"
}
],
"title": "CVE-2025-40083"
},
{
"cve": "CVE-2025-40086",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40086"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\ndrm/xe: Don\u0027t allow evicting of BOs in same VM in array of VM binds\n\nAn array of VM binds can potentially evict other buffer objects (BOs)\nwithin the same VM under certain conditions, which may lead to NULL\npointer dereferences later in the bind pipeline. To prevent this, clear\nthe allow_res_evict flag in the xe_bo_validate call.\n\nv2:\n - Invert polarity of no_res_evict (Thomas)\n - Add comment in code explaining issue (Thomas)\n\n(cherry picked from commit 8b9ba8d6d95fe75fed6b0480bb03da4b321bea08)",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_25-rt-1-150700.1.3.1.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.25.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.25.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.25.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40086",
"url": "https://www.suse.com/security/cve/CVE-2025-40086"
},
{
"category": "external",
"summary": "SUSE Bug 1252923 for CVE-2025-40086",
"url": "https://bugzilla.suse.com/1252923"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_25-rt-1-150700.1.3.1.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.25.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.25.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.25.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.1,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_25-rt-1-150700.1.3.1.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.25.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.25.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.25.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-23T16:27:39Z",
"details": "moderate"
}
],
"title": "CVE-2025-40086"
},
{
"cve": "CVE-2025-40098",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40098"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nALSA: hda: cs35l41: Fix NULL pointer dereference in cs35l41_get_acpi_mute_state()\n\nReturn value of a function acpi_evaluate_dsm() is dereferenced without\nchecking for NULL, but it is usually checked for this function.\n\nacpi_evaluate_dsm() may return NULL, when acpi_evaluate_object() returns\nacpi_status other than ACPI_SUCCESS, so add a check to prevent the crach.\n\nFound by Linux Verification Center (linuxtesting.org) with SVACE.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_25-rt-1-150700.1.3.1.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.25.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.25.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.25.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40098",
"url": "https://www.suse.com/security/cve/CVE-2025-40098"
},
{
"category": "external",
"summary": "SUSE Bug 1252917 for CVE-2025-40098",
"url": "https://bugzilla.suse.com/1252917"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_25-rt-1-150700.1.3.1.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.25.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.25.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.25.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_25-rt-1-150700.1.3.1.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.25.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.25.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.25.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-23T16:27:39Z",
"details": "moderate"
}
],
"title": "CVE-2025-40098"
},
{
"cve": "CVE-2025-40105",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40105"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nvfs: Don\u0027t leak disconnected dentries on umount\n\nWhen user calls open_by_handle_at() on some inode that is not cached, we\nwill create disconnected dentry for it. If such dentry is a directory,\nexportfs_decode_fh_raw() will then try to connect this dentry to the\ndentry tree through reconnect_path(). It may happen for various reasons\n(such as corrupted fs or race with rename) that the call to\nlookup_one_unlocked() in reconnect_one() will fail to find the dentry we\nare trying to reconnect and instead create a new dentry under the\nparent. Now this dentry will not be marked as disconnected although the\nparent still may well be disconnected (at least in case this\ninconsistency happened because the fs is corrupted and .. doesn\u0027t point\nto the real parent directory). This creates inconsistency in\ndisconnected flags but AFAICS it was mostly harmless. At least until\ncommit f1ee616214cb (\"VFS: don\u0027t keep disconnected dentries on d_anon\")\nwhich removed adding of most disconnected dentries to sb-\u003es_anon list.\nThus after this commit cleanup of disconnected dentries implicitely\nrelies on the fact that dput() will immediately reclaim such dentries.\nHowever when some leaf dentry isn\u0027t marked as disconnected, as in the\nscenario described above, the reclaim doesn\u0027t happen and the dentries\nare \"leaked\". Memory reclaim can eventually reclaim them but otherwise\nthey stay in memory and if umount comes first, we hit infamous \"Busy\ninodes after unmount\" bug. Make sure all dentries created under a\ndisconnected parent are marked as disconnected as well.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_25-rt-1-150700.1.3.1.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.25.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.25.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.25.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40105",
"url": "https://www.suse.com/security/cve/CVE-2025-40105"
},
{
"category": "external",
"summary": "SUSE Bug 1252928 for CVE-2025-40105",
"url": "https://bugzilla.suse.com/1252928"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_25-rt-1-150700.1.3.1.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.25.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.25.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.25.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.3,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_25-rt-1-150700.1.3.1.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.25.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.25.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.25.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-23T16:27:39Z",
"details": "low"
}
],
"title": "CVE-2025-40105"
},
{
"cve": "CVE-2025-40107",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40107"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\ncan: hi311x: fix null pointer dereference when resuming from sleep before interface was enabled\n\nThis issue is similar to the vulnerability in the `mcp251x` driver,\nwhich was fixed in commit 03c427147b2d (\"can: mcp251x: fix resume from\nsleep before interface was brought up\").\n\nIn the `hi311x` driver, when the device resumes from sleep, the driver\nschedules `priv-\u003erestart_work`. However, if the network interface was\nnot previously enabled, the `priv-\u003ewq` (workqueue) is not allocated and\ninitialized, leading to a null pointer dereference.\n\nTo fix this, we move the allocation and initialization of the workqueue\nfrom the `hi3110_open` function to the `hi3110_can_probe` function.\nThis ensures that the workqueue is properly initialized before it is\nused during device resume. And added logic to destroy the workqueue\nin the error handling paths of `hi3110_can_probe` and in the\n`hi3110_can_remove` function to prevent resource leaks.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_25-rt-1-150700.1.3.1.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.25.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.25.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.25.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40107",
"url": "https://www.suse.com/security/cve/CVE-2025-40107"
},
{
"category": "external",
"summary": "SUSE Bug 1253018 for CVE-2025-40107",
"url": "https://bugzilla.suse.com/1253018"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_25-rt-1-150700.1.3.1.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.25.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.25.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.25.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_25-rt-1-150700.1.3.1.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.25.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.25.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.25.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-23T16:27:39Z",
"details": "moderate"
}
],
"title": "CVE-2025-40107"
},
{
"cve": "CVE-2025-40109",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40109"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\ncrypto: rng - Ensure set_ent is always present\n\nEnsure that set_ent is always set since only drbg provides it.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_25-rt-1-150700.1.3.1.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.25.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.25.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.25.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40109",
"url": "https://www.suse.com/security/cve/CVE-2025-40109"
},
{
"category": "external",
"summary": "SUSE Bug 1253176 for CVE-2025-40109",
"url": "https://bugzilla.suse.com/1253176"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_25-rt-1-150700.1.3.1.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.25.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.25.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.25.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_25-rt-1-150700.1.3.1.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.25.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.25.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.25.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-23T16:27:39Z",
"details": "moderate"
}
],
"title": "CVE-2025-40109"
},
{
"cve": "CVE-2025-40110",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40110"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\ndrm/vmwgfx: Fix a null-ptr access in the cursor snooper\n\nCheck that the resource which is converted to a surface exists before\ntrying to use the cursor snooper on it.\n\nvmw_cmd_res_check allows explicit invalid (SVGA3D_INVALID_ID) identifiers\nbecause some svga commands accept SVGA3D_INVALID_ID to mean \"no surface\",\nunfortunately functions that accept the actual surfaces as objects might\n(and in case of the cursor snooper, do not) be able to handle null\nobjects. Make sure that we validate not only the identifier (via the\nvmw_cmd_res_check) but also check that the actual resource exists before\ntrying to do something with it.\n\nFixes unchecked null-ptr reference in the snooping code.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_25-rt-1-150700.1.3.1.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.25.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.25.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.25.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40110",
"url": "https://www.suse.com/security/cve/CVE-2025-40110"
},
{
"category": "external",
"summary": "SUSE Bug 1253275 for CVE-2025-40110",
"url": "https://bugzilla.suse.com/1253275"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_25-rt-1-150700.1.3.1.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.25.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.25.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.25.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.1,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_25-rt-1-150700.1.3.1.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.25.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.25.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.25.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-23T16:27:39Z",
"details": "moderate"
}
],
"title": "CVE-2025-40110"
},
{
"cve": "CVE-2025-40111",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40111"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\ndrm/vmwgfx: Fix Use-after-free in validation\n\nNodes stored in the validation duplicates hashtable come from an arena\nallocator that is cleared at the end of vmw_execbuf_process. All nodes\nare expected to be cleared in vmw_validation_drop_ht but this node escaped\nbecause its resource was destroyed prematurely.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_25-rt-1-150700.1.3.1.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.25.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.25.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.25.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40111",
"url": "https://www.suse.com/security/cve/CVE-2025-40111"
},
{
"category": "external",
"summary": "SUSE Bug 1253362 for CVE-2025-40111",
"url": "https://bugzilla.suse.com/1253362"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_25-rt-1-150700.1.3.1.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.25.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.25.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.25.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.7,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:L/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_25-rt-1-150700.1.3.1.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.25.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.25.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.25.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-23T16:27:39Z",
"details": "moderate"
}
],
"title": "CVE-2025-40111"
},
{
"cve": "CVE-2025-40115",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40115"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nscsi: mpt3sas: Fix crash in transport port remove by using ioc_info()\n\nDuring mpt3sas_transport_port_remove(), messages were logged with\ndev_printk() against \u0026mpt3sas_port-\u003eport-\u003edev. At this point the SAS\ntransport device may already be partially unregistered or freed, leading\nto a crash when accessing its struct device.\n\nUsing ioc_info(), which logs via the PCI device (ioc-\u003epdev-\u003edev),\nguaranteed to remain valid until driver removal.\n\n[83428.295776] Oops: general protection fault, probably for non-canonical address 0x6f702f323a33312d: 0000 [#1] SMP NOPTI\n[83428.295785] CPU: 145 UID: 0 PID: 113296 Comm: rmmod Kdump: loaded Tainted: G OE 6.16.0-rc1+ #1 PREEMPT(voluntary)\n[83428.295792] Tainted: [O]=OOT_MODULE, [E]=UNSIGNED_MODULE\n[83428.295795] Hardware name: Dell Inc. Precision 7875 Tower/, BIOS 89.1.67 02/23/2024\n[83428.295799] RIP: 0010:__dev_printk+0x1f/0x70\n[83428.295805] Code: 90 90 90 90 90 90 90 90 90 90 90 0f 1f 44 00 00 49 89 d1 48 85 f6 74 52 4c 8b 46 50 4d 85 c0 74 1f 48 8b 46 68 48 85 c0 74 22 \u003c48\u003e 8b 08 0f b6 7f 01 48 c7 c2 db e8 42 ad 83 ef 30 e9 7b f8 ff ff\n[83428.295813] RSP: 0018:ff85aeafc3137bb0 EFLAGS: 00010206\n[83428.295817] RAX: 6f702f323a33312d RBX: ff4290ee81292860 RCX: 5000cca25103be32\n[83428.295820] RDX: ff85aeafc3137bb8 RSI: ff4290eeb1966c00 RDI: ffffffffc1560845\n[83428.295823] RBP: ff85aeafc3137c18 R08: 74726f702f303a33 R09: ff85aeafc3137bb8\n[83428.295826] R10: ff85aeafc3137b18 R11: ff4290f5bd60fe68 R12: ff4290ee81290000\n[83428.295830] R13: ff4290ee6e345de0 R14: ff4290ee81290000 R15: ff4290ee6e345e30\n[83428.295833] FS: 00007fd9472a6740(0000) GS:ff4290f5ce96b000(0000) knlGS:0000000000000000\n[83428.295837] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033\n[83428.295840] CR2: 00007f242b4db238 CR3: 00000002372b8006 CR4: 0000000000771ef0\n[83428.295844] PKRU: 55555554\n[83428.295846] Call Trace:\n[83428.295848] \u003cTASK\u003e\n[83428.295850] _dev_printk+0x5c/0x80\n[83428.295857] ? srso_alias_return_thunk+0x5/0xfbef5\n[83428.295863] mpt3sas_transport_port_remove+0x1c7/0x420 [mpt3sas]\n[83428.295882] _scsih_remove_device+0x21b/0x280 [mpt3sas]\n[83428.295894] ? _scsih_expander_node_remove+0x108/0x140 [mpt3sas]\n[83428.295906] ? srso_alias_return_thunk+0x5/0xfbef5\n[83428.295910] mpt3sas_device_remove_by_sas_address.part.0+0x8f/0x110 [mpt3sas]\n[83428.295921] _scsih_expander_node_remove+0x129/0x140 [mpt3sas]\n[83428.295933] _scsih_expander_node_remove+0x6a/0x140 [mpt3sas]\n[83428.295944] scsih_remove+0x3f0/0x4a0 [mpt3sas]\n[83428.295957] pci_device_remove+0x3b/0xb0\n[83428.295962] device_release_driver_internal+0x193/0x200\n[83428.295968] driver_detach+0x44/0x90\n[83428.295971] bus_remove_driver+0x69/0xf0\n[83428.295975] pci_unregister_driver+0x2a/0xb0\n[83428.295979] _mpt3sas_exit+0x1f/0x300 [mpt3sas]\n[83428.295991] __do_sys_delete_module.constprop.0+0x174/0x310\n[83428.295997] ? srso_alias_return_thunk+0x5/0xfbef5\n[83428.296000] ? __x64_sys_getdents64+0x9a/0x110\n[83428.296005] ? srso_alias_return_thunk+0x5/0xfbef5\n[83428.296009] ? syscall_trace_enter+0xf6/0x1b0\n[83428.296014] do_syscall_64+0x7b/0x2c0\n[83428.296019] ? srso_alias_return_thunk+0x5/0xfbef5\n[83428.296023] entry_SYSCALL_64_after_hwframe+0x76/0x7e",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_25-rt-1-150700.1.3.1.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.25.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.25.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.25.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40115",
"url": "https://www.suse.com/security/cve/CVE-2025-40115"
},
{
"category": "external",
"summary": "SUSE Bug 1253318 for CVE-2025-40115",
"url": "https://bugzilla.suse.com/1253318"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_25-rt-1-150700.1.3.1.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.25.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.25.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.25.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_25-rt-1-150700.1.3.1.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.25.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.25.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.25.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-23T16:27:39Z",
"details": "moderate"
}
],
"title": "CVE-2025-40115"
},
{
"cve": "CVE-2025-40116",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40116"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nusb: host: max3421-hcd: Fix error pointer dereference in probe cleanup\n\nThe kthread_run() function returns error pointers so the\nmax3421_hcd-\u003espi_thread pointer can be either error pointers or NULL.\nCheck for both before dereferencing it.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_25-rt-1-150700.1.3.1.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.25.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.25.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.25.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40116",
"url": "https://www.suse.com/security/cve/CVE-2025-40116"
},
{
"category": "external",
"summary": "SUSE Bug 1253324 for CVE-2025-40116",
"url": "https://bugzilla.suse.com/1253324"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_25-rt-1-150700.1.3.1.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.25.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.25.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.25.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_25-rt-1-150700.1.3.1.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.25.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.25.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.25.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-23T16:27:39Z",
"details": "moderate"
}
],
"title": "CVE-2025-40116"
},
{
"cve": "CVE-2025-40118",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40118"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nscsi: pm80xx: Fix array-index-out-of-of-bounds on rmmod\n\nSince commit f7b705c238d1 (\"scsi: pm80xx: Set phy_attached to zero when\ndevice is gone\") UBSAN reports:\n\n UBSAN: array-index-out-of-bounds in drivers/scsi/pm8001/pm8001_sas.c:786:17\n index 28 is out of range for type \u0027pm8001_phy [16]\u0027\n\non rmmod when using an expander.\n\nFor a direct attached device, attached_phy contains the local phy id.\nFor a device behind an expander, attached_phy contains the remote phy\nid, not the local phy id.\n\nI.e. while pm8001_ha will have pm8001_ha-\u003echip-\u003en_phy local phys, for a\ndevice behind an expander, attached_phy can be much larger than\npm8001_ha-\u003echip-\u003en_phy (depending on the amount of phys of the\nexpander).\n\nE.g. on my system pm8001_ha has 8 phys with phy ids 0-7. One of the\nports has an expander connected. The expander has 31 phys with phy ids\n0-30.\n\nThe pm8001_ha-\u003ephy array only contains the phys of the HBA. It does not\ncontain the phys of the expander. Thus, it is wrong to use attached_phy\nto index the pm8001_ha-\u003ephy array for a device behind an expander.\n\nThus, we can only clear phy_attached for devices that are directly\nattached.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_25-rt-1-150700.1.3.1.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.25.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.25.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.25.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40118",
"url": "https://www.suse.com/security/cve/CVE-2025-40118"
},
{
"category": "external",
"summary": "SUSE Bug 1253363 for CVE-2025-40118",
"url": "https://bugzilla.suse.com/1253363"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_25-rt-1-150700.1.3.1.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.25.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.25.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.25.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.1,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_25-rt-1-150700.1.3.1.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.25.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.25.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.25.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-23T16:27:39Z",
"details": "moderate"
}
],
"title": "CVE-2025-40118"
},
{
"cve": "CVE-2025-40120",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40120"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnet: usb: asix: hold PM usage ref to avoid PM/MDIO + RTNL deadlock\n\nPrevent USB runtime PM (autosuspend) for AX88772* in bind.\n\nusbnet enables runtime PM (autosuspend) by default, so disabling it via\nthe usb_driver flag is ineffective. On AX88772B, autosuspend shows no\nmeasurable power saving with current driver (no link partner, admin\nup/down). The ~0.453 W -\u003e ~0.248 W drop on v6.1 comes from phylib powering\nthe PHY off on admin-down, not from USB autosuspend.\n\nThe real hazard is that with runtime PM enabled, ndo_open() (under RTNL)\nmay synchronously trigger autoresume (usb_autopm_get_interface()) into\nasix_resume() while the USB PM lock is held. Resume paths then invoke\nphylink/phylib and MDIO, which also expect RTNL, leading to possible\ndeadlocks or PM lock vs MDIO wake issues.\n\nTo avoid this, keep the device runtime-PM active by taking a usage\nreference in ax88772_bind() and dropping it in unbind(). A non-zero PM\nusage count blocks runtime suspend regardless of userspace policy\n(.../power/control - pm_runtime_allow/forbid), making this approach\nrobust against sysfs overrides.\n\nHolding a runtime-PM usage ref does not affect system-wide suspend;\nsystem sleep/resume callbacks continue to run as before.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_25-rt-1-150700.1.3.1.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.25.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.25.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.25.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40120",
"url": "https://www.suse.com/security/cve/CVE-2025-40120"
},
{
"category": "external",
"summary": "SUSE Bug 1253360 for CVE-2025-40120",
"url": "https://bugzilla.suse.com/1253360"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_25-rt-1-150700.1.3.1.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.25.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.25.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.25.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_25-rt-1-150700.1.3.1.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.25.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.25.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.25.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-23T16:27:39Z",
"details": "moderate"
}
],
"title": "CVE-2025-40120"
},
{
"cve": "CVE-2025-40121",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40121"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nASoC: Intel: bytcr_rt5651: Fix invalid quirk input mapping\n\nWhen an invalid value is passed via quirk option, currently\nbytcr_rt5640 driver just ignores and leaves as is, which may lead to\nunepxected results like OOB access.\n\nThis patch adds the sanity check and corrects the input mapping to the\ncertain default value if an invalid value is passed.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_25-rt-1-150700.1.3.1.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.25.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.25.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.25.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40121",
"url": "https://www.suse.com/security/cve/CVE-2025-40121"
},
{
"category": "external",
"summary": "SUSE Bug 1253367 for CVE-2025-40121",
"url": "https://bugzilla.suse.com/1253367"
},
{
"category": "external",
"summary": "SUSE Bug 1253430 for CVE-2025-40121",
"url": "https://bugzilla.suse.com/1253430"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_25-rt-1-150700.1.3.1.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.25.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.25.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.25.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_25-rt-1-150700.1.3.1.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.25.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.25.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.25.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-23T16:27:39Z",
"details": "moderate"
}
],
"title": "CVE-2025-40121"
},
{
"cve": "CVE-2025-40127",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40127"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nhwrng: ks-sa - fix division by zero in ks_sa_rng_init\n\nFix division by zero in ks_sa_rng_init caused by missing clock\npointer initialization. The clk_get_rate() call is performed on\nan uninitialized clk pointer, resulting in division by zero when\ncalculating delay values.\n\nAdd clock initialization code before using the clock.\n\n\n drivers/char/hw_random/ks-sa-rng.c | 7 +++++++\n 1 file changed, 7 insertions(+)",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_25-rt-1-150700.1.3.1.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.25.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.25.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.25.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40127",
"url": "https://www.suse.com/security/cve/CVE-2025-40127"
},
{
"category": "external",
"summary": "SUSE Bug 1253369 for CVE-2025-40127",
"url": "https://bugzilla.suse.com/1253369"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_25-rt-1-150700.1.3.1.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.25.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.25.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.25.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_25-rt-1-150700.1.3.1.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.25.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.25.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.25.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-23T16:27:39Z",
"details": "moderate"
}
],
"title": "CVE-2025-40127"
},
{
"cve": "CVE-2025-40129",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40129"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nsunrpc: fix null pointer dereference on zero-length checksum\n\nIn xdr_stream_decode_opaque_auth(), zero-length checksum.len causes\nchecksum.data to be set to NULL. This triggers a NPD when accessing\nchecksum.data in gss_krb5_verify_mic_v2(). This patch ensures that\nthe value of checksum.len is not less than XDR_UNIT.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_25-rt-1-150700.1.3.1.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.25.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.25.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.25.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40129",
"url": "https://www.suse.com/security/cve/CVE-2025-40129"
},
{
"category": "external",
"summary": "SUSE Bug 1253472 for CVE-2025-40129",
"url": "https://bugzilla.suse.com/1253472"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_25-rt-1-150700.1.3.1.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.25.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.25.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.25.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_25-rt-1-150700.1.3.1.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.25.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.25.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.25.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-23T16:27:39Z",
"details": "important"
}
],
"title": "CVE-2025-40129"
},
{
"cve": "CVE-2025-40139",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40139"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nsmc: Use __sk_dst_get() and dst_dev_rcu() in in smc_clc_prfx_set().\n\nsmc_clc_prfx_set() is called during connect() and not under RCU\nnor RTNL.\n\nUsing sk_dst_get(sk)-\u003edev could trigger UAF.\n\nLet\u0027s use __sk_dst_get() and dev_dst_rcu() under rcu_read_lock()\nafter kernel_getsockname().\n\nNote that the returned value of smc_clc_prfx_set() is not used\nin the caller.\n\nWhile at it, we change the 1st arg of smc_clc_prfx_set[46]_rcu()\nnot to touch dst there.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_25-rt-1-150700.1.3.1.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.25.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.25.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.25.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40139",
"url": "https://www.suse.com/security/cve/CVE-2025-40139"
},
{
"category": "external",
"summary": "SUSE Bug 1253409 for CVE-2025-40139",
"url": "https://bugzilla.suse.com/1253409"
},
{
"category": "external",
"summary": "SUSE Bug 1253411 for CVE-2025-40139",
"url": "https://bugzilla.suse.com/1253411"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_25-rt-1-150700.1.3.1.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.25.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.25.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.25.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_25-rt-1-150700.1.3.1.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.25.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.25.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.25.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-23T16:27:39Z",
"details": "important"
}
],
"title": "CVE-2025-40139"
},
{
"cve": "CVE-2025-40140",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40140"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnet: usb: Remove disruptive netif_wake_queue in rtl8150_set_multicast\n\nsyzbot reported WARNING in rtl8150_start_xmit/usb_submit_urb.\nThis is the sequence of events that leads to the warning:\n\nrtl8150_start_xmit() {\n\tnetif_stop_queue();\n\tusb_submit_urb(dev-\u003etx_urb);\n}\n\nrtl8150_set_multicast() {\n\tnetif_stop_queue();\n\tnetif_wake_queue();\t\t\u003c-- wakes up TX queue before URB is done\n}\n\nrtl8150_start_xmit() {\n\tnetif_stop_queue();\n\tusb_submit_urb(dev-\u003etx_urb);\t\u003c-- double submission\n}\n\nrtl8150_set_multicast being the ndo_set_rx_mode callback should not be\ncalling netif_stop_queue and notif_start_queue as these handle\nTX queue synchronization.\n\nThe net core function dev_set_rx_mode handles the synchronization\nfor rtl8150_set_multicast making it safe to remove these locks.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_25-rt-1-150700.1.3.1.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.25.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.25.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.25.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40140",
"url": "https://www.suse.com/security/cve/CVE-2025-40140"
},
{
"category": "external",
"summary": "SUSE Bug 1253349 for CVE-2025-40140",
"url": "https://bugzilla.suse.com/1253349"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_25-rt-1-150700.1.3.1.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.25.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.25.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.25.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.3,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_25-rt-1-150700.1.3.1.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.25.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.25.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.25.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-23T16:27:39Z",
"details": "low"
}
],
"title": "CVE-2025-40140"
},
{
"cve": "CVE-2025-40141",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40141"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nBluetooth: ISO: Fix possible UAF on iso_conn_free\n\nThis attempt to fix similar issue to sco_conn_free where if the\nconn-\u003esk is not set to NULL may lead to UAF on iso_conn_free.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_25-rt-1-150700.1.3.1.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.25.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.25.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.25.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40141",
"url": "https://www.suse.com/security/cve/CVE-2025-40141"
},
{
"category": "external",
"summary": "SUSE Bug 1253352 for CVE-2025-40141",
"url": "https://bugzilla.suse.com/1253352"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_25-rt-1-150700.1.3.1.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.25.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.25.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.25.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_25-rt-1-150700.1.3.1.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.25.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.25.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.25.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-23T16:27:39Z",
"details": "moderate"
}
],
"title": "CVE-2025-40141"
},
{
"cve": "CVE-2025-40149",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40149"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\ntls: Use __sk_dst_get() and dst_dev_rcu() in get_netdev_for_sock().\n\nget_netdev_for_sock() is called during setsockopt(),\nso not under RCU.\n\nUsing sk_dst_get(sk)-\u003edev could trigger UAF.\n\nLet\u0027s use __sk_dst_get() and dst_dev_rcu().\n\nNote that the only -\u003endo_sk_get_lower_dev() user is\nbond_sk_get_lower_dev(), which uses RCU.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_25-rt-1-150700.1.3.1.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.25.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.25.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.25.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40149",
"url": "https://www.suse.com/security/cve/CVE-2025-40149"
},
{
"category": "external",
"summary": "SUSE Bug 1253355 for CVE-2025-40149",
"url": "https://bugzilla.suse.com/1253355"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_25-rt-1-150700.1.3.1.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.25.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.25.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.25.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_25-rt-1-150700.1.3.1.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.25.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.25.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.25.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-23T16:27:39Z",
"details": "moderate"
}
],
"title": "CVE-2025-40149"
},
{
"cve": "CVE-2025-40154",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40154"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nASoC: Intel: bytcr_rt5640: Fix invalid quirk input mapping\n\nWhen an invalid value is passed via quirk option, currently\nbytcr_rt5640 driver only shows an error message but leaves as is.\nThis may lead to unepxected results like OOB access.\n\nThis patch corrects the input mapping to the certain default value if\nan invalid value is passed.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_25-rt-1-150700.1.3.1.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.25.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.25.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.25.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40154",
"url": "https://www.suse.com/security/cve/CVE-2025-40154"
},
{
"category": "external",
"summary": "SUSE Bug 1253431 for CVE-2025-40154",
"url": "https://bugzilla.suse.com/1253431"
},
{
"category": "external",
"summary": "SUSE Bug 1253432 for CVE-2025-40154",
"url": "https://bugzilla.suse.com/1253432"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_25-rt-1-150700.1.3.1.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.25.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.25.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.25.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_25-rt-1-150700.1.3.1.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.25.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.25.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.25.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-23T16:27:39Z",
"details": "moderate"
}
],
"title": "CVE-2025-40154"
},
{
"cve": "CVE-2025-40156",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40156"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nPM / devfreq: mtk-cci: Fix potential error pointer dereference in probe()\n\nThe drv-\u003esram_reg pointer could be set to ERR_PTR(-EPROBE_DEFER) which\nwould lead to a error pointer dereference. Use IS_ERR_OR_NULL() to check\nthat the pointer is valid.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_25-rt-1-150700.1.3.1.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.25.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.25.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.25.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40156",
"url": "https://www.suse.com/security/cve/CVE-2025-40156"
},
{
"category": "external",
"summary": "SUSE Bug 1253428 for CVE-2025-40156",
"url": "https://bugzilla.suse.com/1253428"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_25-rt-1-150700.1.3.1.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.25.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.25.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.25.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_25-rt-1-150700.1.3.1.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.25.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.25.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.25.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-23T16:27:39Z",
"details": "moderate"
}
],
"title": "CVE-2025-40156"
},
{
"cve": "CVE-2025-40157",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40157"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nEDAC/i10nm: Skip DIMM enumeration on a disabled memory controller\n\nWhen loading the i10nm_edac driver on some Intel Granite Rapids servers,\na call trace may appear as follows:\n\n UBSAN: shift-out-of-bounds in drivers/edac/skx_common.c:453:16\n shift exponent -66 is negative\n ...\n __ubsan_handle_shift_out_of_bounds+0x1e3/0x390\n skx_get_dimm_info.cold+0x47/0xd40 [skx_edac_common]\n i10nm_get_dimm_config+0x23e/0x390 [i10nm_edac]\n skx_register_mci+0x159/0x220 [skx_edac_common]\n i10nm_init+0xcb0/0x1ff0 [i10nm_edac]\n ...\n\nThis occurs because some BIOS may disable a memory controller if there\naren\u0027t any memory DIMMs populated on this memory controller. The DIMMMTR\nregister of this disabled memory controller contains the invalid value\n~0, resulting in the call trace above.\n\nFix this call trace by skipping DIMM enumeration on a disabled memory\ncontroller.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_25-rt-1-150700.1.3.1.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.25.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.25.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.25.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40157",
"url": "https://www.suse.com/security/cve/CVE-2025-40157"
},
{
"category": "external",
"summary": "SUSE Bug 1253423 for CVE-2025-40157",
"url": "https://bugzilla.suse.com/1253423"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_25-rt-1-150700.1.3.1.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.25.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.25.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.25.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.2,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:L/I:L/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_25-rt-1-150700.1.3.1.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.25.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.25.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.25.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-23T16:27:39Z",
"details": "moderate"
}
],
"title": "CVE-2025-40157"
},
{
"cve": "CVE-2025-40159",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40159"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nxsk: Harden userspace-supplied xdp_desc validation\n\nTurned out certain clearly invalid values passed in xdp_desc from\nuserspace can pass xp_{,un}aligned_validate_desc() and then lead\nto UBs or just invalid frames to be queued for xmit.\n\ndesc-\u003elen close to ``U32_MAX`` with a non-zero pool-\u003etx_metadata_len\ncan cause positive integer overflow and wraparound, the same way low\nenough desc-\u003eaddr with a non-zero pool-\u003etx_metadata_len can cause\nnegative integer overflow. Both scenarios can then pass the\nvalidation successfully.\nThis doesn\u0027t happen with valid XSk applications, but can be used\nto perform attacks.\n\nAlways promote desc-\u003elen to ``u64`` first to exclude positive\noverflows of it. Use explicit check_{add,sub}_overflow() when\nvalidating desc-\u003eaddr (which is ``u64`` already).\n\nbloat-o-meter reports a little growth of the code size:\n\nadd/remove: 0/0 grow/shrink: 2/1 up/down: 60/-16 (44)\nFunction old new delta\nxskq_cons_peek_desc 299 330 +31\nxsk_tx_peek_release_desc_batch 973 1002 +29\nxsk_generic_xmit 3148 3132 -16\n\nbut hopefully this doesn\u0027t hurt the performance much.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_25-rt-1-150700.1.3.1.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.25.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.25.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.25.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40159",
"url": "https://www.suse.com/security/cve/CVE-2025-40159"
},
{
"category": "external",
"summary": "SUSE Bug 1253403 for CVE-2025-40159",
"url": "https://bugzilla.suse.com/1253403"
},
{
"category": "external",
"summary": "SUSE Bug 1253404 for CVE-2025-40159",
"url": "https://bugzilla.suse.com/1253404"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_25-rt-1-150700.1.3.1.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.25.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.25.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.25.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_25-rt-1-150700.1.3.1.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.25.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.25.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.25.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-23T16:27:39Z",
"details": "important"
}
],
"title": "CVE-2025-40159"
},
{
"cve": "CVE-2025-40164",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40164"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nusbnet: Fix using smp_processor_id() in preemptible code warnings\n\nSyzbot reported the following warning:\n\nBUG: using smp_processor_id() in preemptible [00000000] code: dhcpcd/2879\ncaller is usbnet_skb_return+0x74/0x490 drivers/net/usb/usbnet.c:331\nCPU: 1 UID: 0 PID: 2879 Comm: dhcpcd Not tainted 6.15.0-rc4-syzkaller-00098-g615dca38c2ea #0 PREEMPT(voluntary)\nCall Trace:\n \u003cTASK\u003e\n __dump_stack lib/dump_stack.c:94 [inline]\n dump_stack_lvl+0x16c/0x1f0 lib/dump_stack.c:120\n check_preemption_disabled+0xd0/0xe0 lib/smp_processor_id.c:49\n usbnet_skb_return+0x74/0x490 drivers/net/usb/usbnet.c:331\n usbnet_resume_rx+0x4b/0x170 drivers/net/usb/usbnet.c:708\n usbnet_change_mtu+0x1be/0x220 drivers/net/usb/usbnet.c:417\n __dev_set_mtu net/core/dev.c:9443 [inline]\n netif_set_mtu_ext+0x369/0x5c0 net/core/dev.c:9496\n netif_set_mtu+0xb0/0x160 net/core/dev.c:9520\n dev_set_mtu+0xae/0x170 net/core/dev_api.c:247\n dev_ifsioc+0xa31/0x18d0 net/core/dev_ioctl.c:572\n dev_ioctl+0x223/0x10e0 net/core/dev_ioctl.c:821\n sock_do_ioctl+0x19d/0x280 net/socket.c:1204\n sock_ioctl+0x42f/0x6a0 net/socket.c:1311\n vfs_ioctl fs/ioctl.c:51 [inline]\n __do_sys_ioctl fs/ioctl.c:906 [inline]\n __se_sys_ioctl fs/ioctl.c:892 [inline]\n __x64_sys_ioctl+0x190/0x200 fs/ioctl.c:892\n do_syscall_x64 arch/x86/entry/syscall_64.c:63 [inline]\n do_syscall_64+0xcd/0x260 arch/x86/entry/syscall_64.c:94\n entry_SYSCALL_64_after_hwframe+0x77/0x7f\n\nFor historical and portability reasons, the netif_rx() is usually\nrun in the softirq or interrupt context, this commit therefore add\nlocal_bh_disable/enable() protection in the usbnet_resume_rx().",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_25-rt-1-150700.1.3.1.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.25.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.25.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.25.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40164",
"url": "https://www.suse.com/security/cve/CVE-2025-40164"
},
{
"category": "external",
"summary": "SUSE Bug 1253407 for CVE-2025-40164",
"url": "https://bugzilla.suse.com/1253407"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_25-rt-1-150700.1.3.1.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.25.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.25.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.25.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.7,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_25-rt-1-150700.1.3.1.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.25.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.25.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.25.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-23T16:27:39Z",
"details": "moderate"
}
],
"title": "CVE-2025-40164"
},
{
"cve": "CVE-2025-40168",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40168"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nsmc: Use __sk_dst_get() and dst_dev_rcu() in smc_clc_prfx_match().\n\nsmc_clc_prfx_match() is called from smc_listen_work() and\nnot under RCU nor RTNL.\n\nUsing sk_dst_get(sk)-\u003edev could trigger UAF.\n\nLet\u0027s use __sk_dst_get() and dst_dev_rcu().\n\nNote that the returned value of smc_clc_prfx_match() is not\nused in the caller.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_25-rt-1-150700.1.3.1.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.25.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.25.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.25.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40168",
"url": "https://www.suse.com/security/cve/CVE-2025-40168"
},
{
"category": "external",
"summary": "SUSE Bug 1253427 for CVE-2025-40168",
"url": "https://bugzilla.suse.com/1253427"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_25-rt-1-150700.1.3.1.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.25.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.25.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.25.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_25-rt-1-150700.1.3.1.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.25.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.25.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.25.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-23T16:27:39Z",
"details": "moderate"
}
],
"title": "CVE-2025-40168"
},
{
"cve": "CVE-2025-40169",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40169"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nbpf: Reject negative offsets for ALU ops\n\nWhen verifying BPF programs, the check_alu_op() function validates\ninstructions with ALU operations. The \u0027offset\u0027 field in these\ninstructions is a signed 16-bit integer.\n\nThe existing check \u0027insn-\u003eoff \u003e 1\u0027 was intended to ensure the offset is\neither 0, or 1 for BPF_MOD/BPF_DIV. However, because \u0027insn-\u003eoff\u0027 is\nsigned, this check incorrectly accepts all negative values (e.g., -1).\n\nThis commit tightens the validation by changing the condition to\n\u0027(insn-\u003eoff != 0 \u0026\u0026 insn-\u003eoff != 1)\u0027. This ensures that any value\nother than the explicitly permitted 0 and 1 is rejected, hardening the\nverifier against malformed BPF programs.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_25-rt-1-150700.1.3.1.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.25.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.25.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.25.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40169",
"url": "https://www.suse.com/security/cve/CVE-2025-40169"
},
{
"category": "external",
"summary": "SUSE Bug 1253416 for CVE-2025-40169",
"url": "https://bugzilla.suse.com/1253416"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_25-rt-1-150700.1.3.1.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.25.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.25.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.25.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.8,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_25-rt-1-150700.1.3.1.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.25.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.25.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.25.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-23T16:27:39Z",
"details": "moderate"
}
],
"title": "CVE-2025-40169"
},
{
"cve": "CVE-2025-40171",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40171"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnvmet-fc: move lsop put work to nvmet_fc_ls_req_op\n\nIt\u0027s possible for more than one async command to be in flight from\n__nvmet_fc_send_ls_req. For each command, a tgtport reference is taken.\n\nIn the current code, only one put work item is queued at a time, which\nresults in a leaked reference.\n\nTo fix this, move the work item to the nvmet_fc_ls_req_op struct, which\nalready tracks all resources related to the command.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_25-rt-1-150700.1.3.1.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.25.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.25.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.25.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40171",
"url": "https://www.suse.com/security/cve/CVE-2025-40171"
},
{
"category": "external",
"summary": "SUSE Bug 1253412 for CVE-2025-40171",
"url": "https://bugzilla.suse.com/1253412"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_25-rt-1-150700.1.3.1.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.25.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.25.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.25.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_25-rt-1-150700.1.3.1.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.25.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.25.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.25.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-23T16:27:39Z",
"details": "moderate"
}
],
"title": "CVE-2025-40171"
},
{
"cve": "CVE-2025-40172",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40172"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\naccel/qaic: Treat remaining == 0 as error in find_and_map_user_pages()\n\nCurrently, if find_and_map_user_pages() takes a DMA xfer request from the\nuser with a length field set to 0, or in a rare case, the host receives\nQAIC_TRANS_DMA_XFER_CONT from the device where resources-\u003exferred_dma_size\nis equal to the requested transaction size, the function will return 0\nbefore allocating an sgt or setting the fields of the dma_xfer struct.\nIn that case, encode_addr_size_pairs() will try to access the sgt which\nwill lead to a general protection fault.\n\nReturn an EINVAL in case the user provides a zero-sized ALP, or the device\nrequests continuation after all of the bytes have been transferred.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_25-rt-1-150700.1.3.1.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.25.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.25.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.25.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40172",
"url": "https://www.suse.com/security/cve/CVE-2025-40172"
},
{
"category": "external",
"summary": "SUSE Bug 1253424 for CVE-2025-40172",
"url": "https://bugzilla.suse.com/1253424"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_25-rt-1-150700.1.3.1.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.25.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.25.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.25.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_25-rt-1-150700.1.3.1.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.25.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.25.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.25.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-23T16:27:39Z",
"details": "moderate"
}
],
"title": "CVE-2025-40172"
},
{
"cve": "CVE-2025-40173",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40173"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnet/ip6_tunnel: Prevent perpetual tunnel growth\n\nSimilarly to ipv4 tunnel, ipv6 version updates dev-\u003eneeded_headroom, too.\nWhile ipv4 tunnel headroom adjustment growth was limited in\ncommit 5ae1e9922bbd (\"net: ip_tunnel: prevent perpetual headroom growth\"),\nipv6 tunnel yet increases the headroom without any ceiling.\n\nReflect ipv4 tunnel headroom adjustment limit on ipv6 version.\n\nCredits to Francesco Ruggeri, who was originally debugging this issue\nand wrote local Arista-specific patch and a reproducer.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_25-rt-1-150700.1.3.1.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.25.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.25.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.25.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40173",
"url": "https://www.suse.com/security/cve/CVE-2025-40173"
},
{
"category": "external",
"summary": "SUSE Bug 1253421 for CVE-2025-40173",
"url": "https://bugzilla.suse.com/1253421"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_25-rt-1-150700.1.3.1.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.25.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.25.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.25.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.7,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_25-rt-1-150700.1.3.1.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.25.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.25.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.25.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-23T16:27:39Z",
"details": "moderate"
}
],
"title": "CVE-2025-40173"
},
{
"cve": "CVE-2025-40176",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40176"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\ntls: wait for pending async decryptions if tls_strp_msg_hold fails\n\nAsync decryption calls tls_strp_msg_hold to create a clone of the\ninput skb to hold references to the memory it uses. If we fail to\nallocate that clone, proceeding with async decryption can lead to\nvarious issues (UAF on the skb, writing into userspace memory after\nthe recv() call has returned).\n\nIn this case, wait for all pending decryption requests.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_25-rt-1-150700.1.3.1.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.25.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.25.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.25.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40176",
"url": "https://www.suse.com/security/cve/CVE-2025-40176"
},
{
"category": "external",
"summary": "SUSE Bug 1253425 for CVE-2025-40176",
"url": "https://bugzilla.suse.com/1253425"
},
{
"category": "external",
"summary": "SUSE Bug 1254100 for CVE-2025-40176",
"url": "https://bugzilla.suse.com/1254100"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_25-rt-1-150700.1.3.1.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.25.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.25.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.25.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_25-rt-1-150700.1.3.1.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.25.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.25.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.25.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-23T16:27:39Z",
"details": "important"
}
],
"title": "CVE-2025-40176"
},
{
"cve": "CVE-2025-40180",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40180"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nmailbox: zynqmp-ipi: Fix out-of-bounds access in mailbox cleanup loop\n\nThe cleanup loop was starting at the wrong array index, causing\nout-of-bounds access.\nStart the loop at the correct index for zero-indexed arrays to prevent\naccessing memory beyond the allocated array bounds.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_25-rt-1-150700.1.3.1.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.25.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.25.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.25.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40180",
"url": "https://www.suse.com/security/cve/CVE-2025-40180"
},
{
"category": "external",
"summary": "SUSE Bug 1253440 for CVE-2025-40180",
"url": "https://bugzilla.suse.com/1253440"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_25-rt-1-150700.1.3.1.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.25.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.25.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.25.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_25-rt-1-150700.1.3.1.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.25.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.25.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.25.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-23T16:27:39Z",
"details": "moderate"
}
],
"title": "CVE-2025-40180"
},
{
"cve": "CVE-2025-40183",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40183"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nbpf: Fix metadata_dst leak __bpf_redirect_neigh_v{4,6}\n\nCilium has a BPF egress gateway feature which forces outgoing K8s Pod\ntraffic to pass through dedicated egress gateways which then SNAT the\ntraffic in order to interact with stable IPs outside the cluster.\n\nThe traffic is directed to the gateway via vxlan tunnel in collect md\nmode. A recent BPF change utilized the bpf_redirect_neigh() helper to\nforward packets after the arrival and decap on vxlan, which turned out\nover time that the kmalloc-256 slab usage in kernel was ever-increasing.\n\nThe issue was that vxlan allocates the metadata_dst object and attaches\nit through a fake dst entry to the skb. The latter was never released\nthough given bpf_redirect_neigh() was merely setting the new dst entry\nvia skb_dst_set() without dropping an existing one first.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_25-rt-1-150700.1.3.1.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.25.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.25.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.25.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40183",
"url": "https://www.suse.com/security/cve/CVE-2025-40183"
},
{
"category": "external",
"summary": "SUSE Bug 1253441 for CVE-2025-40183",
"url": "https://bugzilla.suse.com/1253441"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_25-rt-1-150700.1.3.1.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.25.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.25.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.25.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_25-rt-1-150700.1.3.1.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.25.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.25.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.25.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-23T16:27:39Z",
"details": "moderate"
}
],
"title": "CVE-2025-40183"
},
{
"cve": "CVE-2025-40185",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40185"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nice: ice_adapter: release xa entry on adapter allocation failure\n\nWhen ice_adapter_new() fails, the reserved XArray entry created by\nxa_insert() is not released. This causes subsequent insertions at\nthe same index to return -EBUSY, potentially leading to\nNULL pointer dereferences.\n\nReorder the operations as suggested by Przemek Kitszel:\n1. Check if adapter already exists (xa_load)\n2. Reserve the XArray slot (xa_reserve)\n3. Allocate the adapter (ice_adapter_new)\n4. Store the adapter (xa_store)",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_25-rt-1-150700.1.3.1.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.25.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.25.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.25.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40185",
"url": "https://www.suse.com/security/cve/CVE-2025-40185"
},
{
"category": "external",
"summary": "SUSE Bug 1253394 for CVE-2025-40185",
"url": "https://bugzilla.suse.com/1253394"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_25-rt-1-150700.1.3.1.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.25.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.25.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.25.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_25-rt-1-150700.1.3.1.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.25.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.25.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.25.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-23T16:27:39Z",
"details": "moderate"
}
],
"title": "CVE-2025-40185"
},
{
"cve": "CVE-2025-40186",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40186"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\ntcp: Don\u0027t call reqsk_fastopen_remove() in tcp_conn_request().\n\nsyzbot reported the splat below in tcp_conn_request(). [0]\n\nIf a listener is close()d while a TFO socket is being processed in\ntcp_conn_request(), inet_csk_reqsk_queue_add() does not set reqsk-\u003esk\nand calls inet_child_forget(), which calls tcp_disconnect() for the\nTFO socket.\n\nAfter the cited commit, tcp_disconnect() calls reqsk_fastopen_remove(),\nwhere reqsk_put() is called due to !reqsk-\u003esk.\n\nThen, reqsk_fastopen_remove() in tcp_conn_request() decrements the\nlast req-\u003ersk_refcnt and frees reqsk, and __reqsk_free() at the\ndrop_and_free label causes the refcount underflow for the listener\nand double-free of the reqsk.\n\nLet\u0027s remove reqsk_fastopen_remove() in tcp_conn_request().\n\nNote that other callers make sure tp-\u003efastopen_rsk is not NULL.\n\n[0]:\nrefcount_t: underflow; use-after-free.\nWARNING: CPU: 12 PID: 5563 at lib/refcount.c:28 refcount_warn_saturate (lib/refcount.c:28)\nModules linked in:\nCPU: 12 UID: 0 PID: 5563 Comm: syz-executor Not tainted syzkaller #0 PREEMPT(full)\nHardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025\nRIP: 0010:refcount_warn_saturate (lib/refcount.c:28)\nCode: ab e8 8e b4 98 ff 0f 0b c3 cc cc cc cc cc 80 3d a4 e4 d6 01 00 75 9c c6 05 9b e4 d6 01 01 48 c7 c7 e8 df fb ab e8 6a b4 98 ff \u003c0f\u003e 0b e9 03 5b 76 00 cc 80 3d 7d e4 d6 01 00 0f 85 74 ff ff ff c6\nRSP: 0018:ffffa79fc0304a98 EFLAGS: 00010246\nRAX: d83af4db1c6b3900 RBX: ffff9f65c7a69020 RCX: d83af4db1c6b3900\nRDX: 0000000000000000 RSI: 00000000ffff7fff RDI: ffffffffac78a280\nRBP: 000000009d781b60 R08: 0000000000007fff R09: ffffffffac6ca280\nR10: 0000000000017ffd R11: 0000000000000004 R12: ffff9f65c7b4f100\nR13: ffff9f65c7d23c00 R14: ffff9f65c7d26000 R15: ffff9f65c7a64ef8\nFS: 00007f9f962176c0(0000) GS:ffff9f65fcf00000(0000) knlGS:0000000000000000\nCS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033\nCR2: 0000200000000180 CR3: 000000000dbbe006 CR4: 0000000000372ef0\nCall Trace:\n \u003cIRQ\u003e\n tcp_conn_request (./include/linux/refcount.h:400 ./include/linux/refcount.h:432 ./include/linux/refcount.h:450 ./include/net/sock.h:1965 ./include/net/request_sock.h:131 net/ipv4/tcp_input.c:7301)\n tcp_rcv_state_process (net/ipv4/tcp_input.c:6708)\n tcp_v6_do_rcv (net/ipv6/tcp_ipv6.c:1670)\n tcp_v6_rcv (net/ipv6/tcp_ipv6.c:1906)\n ip6_protocol_deliver_rcu (net/ipv6/ip6_input.c:438)\n ip6_input (net/ipv6/ip6_input.c:500)\n ipv6_rcv (net/ipv6/ip6_input.c:311)\n __netif_receive_skb (net/core/dev.c:6104)\n process_backlog (net/core/dev.c:6456)\n __napi_poll (net/core/dev.c:7506)\n net_rx_action (net/core/dev.c:7569 net/core/dev.c:7696)\n handle_softirqs (kernel/softirq.c:579)\n do_softirq (kernel/softirq.c:480)\n \u003c/IRQ\u003e",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_25-rt-1-150700.1.3.1.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.25.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.25.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.25.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40186",
"url": "https://www.suse.com/security/cve/CVE-2025-40186"
},
{
"category": "external",
"summary": "SUSE Bug 1253438 for CVE-2025-40186",
"url": "https://bugzilla.suse.com/1253438"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_25-rt-1-150700.1.3.1.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.25.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.25.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.25.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_25-rt-1-150700.1.3.1.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.25.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.25.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.25.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-23T16:27:39Z",
"details": "important"
}
],
"title": "CVE-2025-40186"
},
{
"cve": "CVE-2025-40188",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40188"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\npwm: berlin: Fix wrong register in suspend/resume\n\nThe \u0027enable\u0027 register should be BERLIN_PWM_EN rather than\nBERLIN_PWM_ENABLE, otherwise, the driver accesses wrong address, there\nwill be cpu exception then kernel panic during suspend/resume.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_25-rt-1-150700.1.3.1.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.25.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.25.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.25.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40188",
"url": "https://www.suse.com/security/cve/CVE-2025-40188"
},
{
"category": "external",
"summary": "SUSE Bug 1253449 for CVE-2025-40188",
"url": "https://bugzilla.suse.com/1253449"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_25-rt-1-150700.1.3.1.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.25.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.25.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.25.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_25-rt-1-150700.1.3.1.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.25.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.25.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.25.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-23T16:27:39Z",
"details": "moderate"
}
],
"title": "CVE-2025-40188"
},
{
"cve": "CVE-2025-40194",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40194"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\ncpufreq: intel_pstate: Fix object lifecycle issue in update_qos_request()\n\nThe cpufreq_cpu_put() call in update_qos_request() takes place too early\nbecause the latter subsequently calls freq_qos_update_request() that\nindirectly accesses the policy object in question through the QoS request\nobject passed to it.\n\nFortunately, update_qos_request() is called under intel_pstate_driver_lock,\nso this issue does not matter for changing the intel_pstate operation\nmode, but it theoretically can cause a crash to occur on CPU device hot\nremoval (which currently can only happen in virt, but it is formally\nsupported nevertheless).\n\nAddress this issue by modifying update_qos_request() to drop the\nreference to the policy later.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_25-rt-1-150700.1.3.1.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.25.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.25.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.25.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40194",
"url": "https://www.suse.com/security/cve/CVE-2025-40194"
},
{
"category": "external",
"summary": "SUSE Bug 1253445 for CVE-2025-40194",
"url": "https://bugzilla.suse.com/1253445"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_25-rt-1-150700.1.3.1.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.25.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.25.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.25.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.7,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_25-rt-1-150700.1.3.1.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.25.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.25.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.25.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-23T16:27:39Z",
"details": "moderate"
}
],
"title": "CVE-2025-40194"
},
{
"cve": "CVE-2025-40198",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40198"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\next4: avoid potential buffer over-read in parse_apply_sb_mount_options()\n\nUnlike other strings in the ext4 superblock, we rely on tune2fs to\nmake sure s_mount_opts is NUL terminated. Harden\nparse_apply_sb_mount_options() by treating s_mount_opts as a potential\n__nonstring.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_25-rt-1-150700.1.3.1.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.25.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.25.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.25.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40198",
"url": "https://www.suse.com/security/cve/CVE-2025-40198"
},
{
"category": "external",
"summary": "SUSE Bug 1253453 for CVE-2025-40198",
"url": "https://bugzilla.suse.com/1253453"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_25-rt-1-150700.1.3.1.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.25.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.25.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.25.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_25-rt-1-150700.1.3.1.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.25.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.25.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.25.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-23T16:27:39Z",
"details": "moderate"
}
],
"title": "CVE-2025-40198"
},
{
"cve": "CVE-2025-40200",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40200"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nSquashfs: reject negative file sizes in squashfs_read_inode()\n\nSyskaller reports a \"WARNING in ovl_copy_up_file\" in overlayfs.\n\nThis warning is ultimately caused because the underlying Squashfs file\nsystem returns a file with a negative file size.\n\nThis commit checks for a negative file size and returns EINVAL.\n\n[phillip@squashfs.org.uk: only need to check 64 bit quantity]",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_25-rt-1-150700.1.3.1.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.25.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.25.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.25.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40200",
"url": "https://www.suse.com/security/cve/CVE-2025-40200"
},
{
"category": "external",
"summary": "SUSE Bug 1253448 for CVE-2025-40200",
"url": "https://bugzilla.suse.com/1253448"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_25-rt-1-150700.1.3.1.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.25.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.25.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.25.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_25-rt-1-150700.1.3.1.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.25.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.25.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.25.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-23T16:27:39Z",
"details": "moderate"
}
],
"title": "CVE-2025-40200"
},
{
"cve": "CVE-2025-40204",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40204"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nsctp: Fix MAC comparison to be constant-time\n\nTo prevent timing attacks, MACs need to be compared in constant time.\nUse the appropriate helper function for this.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_25-rt-1-150700.1.3.1.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.25.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.25.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.25.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40204",
"url": "https://www.suse.com/security/cve/CVE-2025-40204"
},
{
"category": "external",
"summary": "SUSE Bug 1253436 for CVE-2025-40204",
"url": "https://bugzilla.suse.com/1253436"
},
{
"category": "external",
"summary": "SUSE Bug 1253437 for CVE-2025-40204",
"url": "https://bugzilla.suse.com/1253437"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_25-rt-1-150700.1.3.1.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.25.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.25.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.25.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_25-rt-1-150700.1.3.1.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.25.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.25.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.25.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-23T16:27:39Z",
"details": "important"
}
],
"title": "CVE-2025-40204"
},
{
"cve": "CVE-2025-40205",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40205"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nbtrfs: avoid potential out-of-bounds in btrfs_encode_fh()\n\nThe function btrfs_encode_fh() does not properly account for the three\ncases it handles.\n\nBefore writing to the file handle (fh), the function only returns to the\nuser BTRFS_FID_SIZE_NON_CONNECTABLE (5 dwords, 20 bytes) or\nBTRFS_FID_SIZE_CONNECTABLE (8 dwords, 32 bytes).\n\nHowever, when a parent exists and the root ID of the parent and the\ninode are different, the function writes BTRFS_FID_SIZE_CONNECTABLE_ROOT\n(10 dwords, 40 bytes).\n\nIf *max_len is not large enough, this write goes out of bounds because\nBTRFS_FID_SIZE_CONNECTABLE_ROOT is greater than\nBTRFS_FID_SIZE_CONNECTABLE originally returned.\n\nThis results in an 8-byte out-of-bounds write at\nfid-\u003eparent_root_objectid = parent_root_id.\n\nA previous attempt to fix this issue was made but was lost.\n\nhttps://lore.kernel.org/all/4CADAEEC020000780001B32C@vpn.id2.novell.com/\n\nAlthough this issue does not seem to be easily triggerable, it is a\npotential memory corruption bug that should be fixed. This patch\nresolves the issue by ensuring the function returns the appropriate size\nfor all three cases and validates that *max_len is large enough before\nwriting any data.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_25-rt-1-150700.1.3.1.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.25.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.25.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.25.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40205",
"url": "https://www.suse.com/security/cve/CVE-2025-40205"
},
{
"category": "external",
"summary": "SUSE Bug 1253456 for CVE-2025-40205",
"url": "https://bugzilla.suse.com/1253456"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_25-rt-1-150700.1.3.1.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.25.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.25.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.25.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_25-rt-1-150700.1.3.1.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.25.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.25.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.25.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-23T16:27:39Z",
"details": "moderate"
}
],
"title": "CVE-2025-40205"
},
{
"cve": "CVE-2025-40206",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40206"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnetfilter: nft_objref: validate objref and objrefmap expressions\n\nReferencing a synproxy stateful object from OUTPUT hook causes kernel\ncrash due to infinite recursive calls:\n\nBUG: TASK stack guard page was hit at 000000008bda5b8c (stack is 000000003ab1c4a5..00000000494d8b12)\n[...]\nCall Trace:\n __find_rr_leaf+0x99/0x230\n fib6_table_lookup+0x13b/0x2d0\n ip6_pol_route+0xa4/0x400\n fib6_rule_lookup+0x156/0x240\n ip6_route_output_flags+0xc6/0x150\n __nf_ip6_route+0x23/0x50\n synproxy_send_tcp_ipv6+0x106/0x200\n synproxy_send_client_synack_ipv6+0x1aa/0x1f0\n nft_synproxy_do_eval+0x263/0x310\n nft_do_chain+0x5a8/0x5f0 [nf_tables\n nft_do_chain_inet+0x98/0x110\n nf_hook_slow+0x43/0xc0\n __ip6_local_out+0xf0/0x170\n ip6_local_out+0x17/0x70\n synproxy_send_tcp_ipv6+0x1a2/0x200\n synproxy_send_client_synack_ipv6+0x1aa/0x1f0\n[...]\n\nImplement objref and objrefmap expression validate functions.\n\nCurrently, only NFT_OBJECT_SYNPROXY object type requires validation.\nThis will also handle a jump to a chain using a synproxy object from the\nOUTPUT hook.\n\nNow when trying to reference a synproxy object in the OUTPUT hook, nft\nwill produce the following error:\n\nsynproxy_crash.nft: Error: Could not process rule: Operation not supported\n synproxy name mysynproxy\n ^^^^^^^^^^^^^^^^^^^^^^^^",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_25-rt-1-150700.1.3.1.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.25.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.25.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.25.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40206",
"url": "https://www.suse.com/security/cve/CVE-2025-40206"
},
{
"category": "external",
"summary": "SUSE Bug 1253393 for CVE-2025-40206",
"url": "https://bugzilla.suse.com/1253393"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_25-rt-1-150700.1.3.1.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.25.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.25.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.25.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.1,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_25-rt-1-150700.1.3.1.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.25.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.25.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.25.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-23T16:27:39Z",
"details": "moderate"
}
],
"title": "CVE-2025-40206"
},
{
"cve": "CVE-2025-40207",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40207"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nmedia: v4l2-subdev: Fix alloc failure check in v4l2_subdev_call_state_try()\n\nv4l2_subdev_call_state_try() macro allocates a subdev state with\n__v4l2_subdev_state_alloc(), but does not check the returned value. If\n__v4l2_subdev_state_alloc fails, it returns an ERR_PTR, and that would\ncause v4l2_subdev_call_state_try() to crash.\n\nAdd proper error handling to v4l2_subdev_call_state_try().",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_25-rt-1-150700.1.3.1.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.25.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.25.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.25.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40207",
"url": "https://www.suse.com/security/cve/CVE-2025-40207"
},
{
"category": "external",
"summary": "SUSE Bug 1253395 for CVE-2025-40207",
"url": "https://bugzilla.suse.com/1253395"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_25-rt-1-150700.1.3.1.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.25.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.25.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.25.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_25-rt-1-150700.1.3.1.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.25.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.25.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.25.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-23T16:27:39Z",
"details": "moderate"
}
],
"title": "CVE-2025-40207"
}
]
}
CERTFR-2025-AVI-1133
Vulnerability from certfr_avis - Published: 2025-12-19 - Updated: 2025-12-19
De multiples vulnérabilités ont été découvertes dans le noyau Linux de SUSE. Certaines d'entre elles permettent à un attaquant de provoquer une atteinte à la confidentialité des données, une atteinte à l'intégrité des données et un contournement de la politique de sécurité.
Solutions
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
| Vendor | Product | Description | ||
|---|---|---|---|---|
| SUSE | N/A | SUSE Linux Enterprise Desktop 15 SP6 | ||
| SUSE | N/A | SUSE Linux Enterprise Real Time 15 SP7 | ||
| SUSE | N/A | Basesystem Module 15-SP6 | ||
| SUSE | N/A | SUSE Linux Enterprise Workstation Extension 15 SP7 | ||
| SUSE | N/A | Legacy Module 15-SP7 | ||
| SUSE | N/A | SUSE Linux Enterprise High Availability Extension 15 SP7 | ||
| SUSE | N/A | SUSE Linux Enterprise Desktop 15 SP7 | ||
| SUSE | N/A | SUSE Linux Enterprise Server for SAP Applications 15 SP7 | ||
| SUSE | N/A | SUSE Linux Enterprise Live Patching 15-SP6 | ||
| SUSE | N/A | Legacy Module 15-SP6 | ||
| SUSE | N/A | SUSE Linux Enterprise Server 15 SP7 | ||
| SUSE | N/A | SUSE Linux Enterprise Live Patching 15-SP7 | ||
| SUSE | N/A | SUSE Linux Enterprise Real Time 15 SP6 | ||
| SUSE | N/A | openSUSE Leap 15.6 | ||
| SUSE | N/A | Development Tools Module 15-SP7 | ||
| SUSE | N/A | SUSE Linux Enterprise Workstation Extension 15 SP6 | ||
| SUSE | N/A | Basesystem Module 15-SP7 | ||
| SUSE | N/A | SUSE Linux Enterprise High Availability Extension 15 SP6 | ||
| SUSE | N/A | SUSE Linux Enterprise Server for SAP Applications 15 SP6 | ||
| SUSE | N/A | Development Tools Module 15-SP6 | ||
| SUSE | N/A | SUSE Linux Enterprise Server 15 SP6 |
| Title | Publication Time | Tags | ||||||
|---|---|---|---|---|---|---|---|---|
|
||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "SUSE Linux Enterprise Desktop 15 SP6",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Real Time 15 SP7",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "Basesystem Module 15-SP6",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Workstation Extension 15 SP7",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "Legacy Module 15-SP7",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise High Availability Extension 15 SP7",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Desktop 15 SP7",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Server for SAP Applications 15 SP7",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Live Patching 15-SP6",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "Legacy Module 15-SP6",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Server 15 SP7",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Live Patching 15-SP7",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Real Time 15 SP6",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "openSUSE Leap 15.6",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "Development Tools Module 15-SP7",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Workstation Extension 15 SP6",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "Basesystem Module 15-SP7",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise High Availability Extension 15 SP6",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Server for SAP Applications 15 SP6",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "Development Tools Module 15-SP6",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Server 15 SP6",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
}
],
"affected_systems_content": "",
"content": "## Solutions\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des correctifs (cf. section Documentation).",
"cves": [
{
"name": "CVE-2025-40064",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40064"
},
{
"name": "CVE-2025-40156",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40156"
},
{
"name": "CVE-2025-40055",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40055"
},
{
"name": "CVE-2025-40048",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40048"
},
{
"name": "CVE-2025-40121",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40121"
},
{
"name": "CVE-2025-40204",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40204"
},
{
"name": "CVE-2025-40171",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40171"
},
{
"name": "CVE-2025-40139",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40139"
},
{
"name": "CVE-2025-40107",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40107"
},
{
"name": "CVE-2025-40115",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40115"
},
{
"name": "CVE-2025-40198",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40198"
},
{
"name": "CVE-2025-40173",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40173"
},
{
"name": "CVE-2025-39944",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39944"
},
{
"name": "CVE-2025-40194",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40194"
},
{
"name": "CVE-2025-40001",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40001"
},
{
"name": "CVE-2025-39859",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39859"
},
{
"name": "CVE-2025-40172",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40172"
},
{
"name": "CVE-2025-40188",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40188"
},
{
"name": "CVE-2025-40186",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40186"
},
{
"name": "CVE-2025-40086",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40086"
},
{
"name": "CVE-2025-40169",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40169"
},
{
"name": "CVE-2025-40070",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40070"
},
{
"name": "CVE-2025-40047",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40047"
},
{
"name": "CVE-2025-40205",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40205"
},
{
"name": "CVE-2022-50253",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50253"
},
{
"name": "CVE-2025-40075",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40075"
},
{
"name": "CVE-2025-40027",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40027"
},
{
"name": "CVE-2025-40206",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40206"
},
{
"name": "CVE-2025-39788",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39788"
},
{
"name": "CVE-2025-40109",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40109"
},
{
"name": "CVE-2025-40038",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40038"
},
{
"name": "CVE-2025-39805",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39805"
},
{
"name": "CVE-2025-40176",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40176"
},
{
"name": "CVE-2025-40183",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40183"
},
{
"name": "CVE-2025-37916",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37916"
},
{
"name": "CVE-2025-38359",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38359"
},
{
"name": "CVE-2025-40074",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40074"
},
{
"name": "CVE-2025-40116",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40116"
},
{
"name": "CVE-2025-40127",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40127"
},
{
"name": "CVE-2025-40168",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40168"
},
{
"name": "CVE-2025-40120",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40120"
},
{
"name": "CVE-2025-40185",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40185"
},
{
"name": "CVE-2025-40098",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40098"
},
{
"name": "CVE-2025-40129",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40129"
},
{
"name": "CVE-2025-40040",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40040"
},
{
"name": "CVE-2025-40207",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40207"
},
{
"name": "CVE-2025-40118",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40118"
},
{
"name": "CVE-2025-40157",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40157"
},
{
"name": "CVE-2025-40021",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40021"
},
{
"name": "CVE-2025-40105",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40105"
},
{
"name": "CVE-2025-40083",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40083"
},
{
"name": "CVE-2025-40154",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40154"
},
{
"name": "CVE-2025-40149",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40149"
},
{
"name": "CVE-2025-40164",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40164"
},
{
"name": "CVE-2025-40180",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40180"
},
{
"name": "CVE-2025-40200",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40200"
},
{
"name": "CVE-2025-40080",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40080"
},
{
"name": "CVE-2025-40111",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40111"
},
{
"name": "CVE-2025-40059",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40059"
},
{
"name": "CVE-2023-53676",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53676"
},
{
"name": "CVE-2025-39822",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39822"
},
{
"name": "CVE-2025-40141",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40141"
},
{
"name": "CVE-2025-40110",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40110"
},
{
"name": "CVE-2025-39980",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39980"
},
{
"name": "CVE-2025-40030",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40030"
},
{
"name": "CVE-2025-39819",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39819"
},
{
"name": "CVE-2025-40140",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40140"
},
{
"name": "CVE-2025-21710",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21710"
},
{
"name": "CVE-2025-40159",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40159"
},
{
"name": "CVE-2025-38361",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38361"
}
],
"initial_release_date": "2025-12-19T00:00:00",
"last_revision_date": "2025-12-19T00:00:00",
"links": [],
"reference": "CERTFR-2025-AVI-1133",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2025-12-19T00:00:00.000000"
}
],
"risks": [
{
"description": "Atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es"
},
{
"description": "D\u00e9ni de service"
},
{
"description": "Contournement de la politique de s\u00e9curit\u00e9"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans le noyau Linux de SUSE. Certaines d\u0027entre elles permettent \u00e0 un attaquant de provoquer une atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es, une atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es et un contournement de la politique de s\u00e9curit\u00e9.",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans le noyau Linux de SUSE",
"vendor_advisories": [
{
"published_at": "2025-12-15",
"title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2025:4393-1",
"url": "https://www.suse.com/support/update/announcement/2025/suse-su-20254393-1"
},
{
"published_at": "2025-12-17",
"title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2025:4422-1",
"url": "https://www.suse.com/support/update/announcement/2025/suse-su-20254422-1"
}
]
}
CERTFR-2026-AVI-0108
Vulnerability from certfr_avis - Published: 2026-01-30 - Updated: 2026-01-30
De multiples vulnérabilités ont été découvertes dans le noyau Linux de SUSE. Certaines d'entre elles permettent à un attaquant de provoquer une exécution de code arbitraire, une atteinte à la confidentialité des données et une atteinte à l'intégrité des données.
Solutions
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Vendor | Product | Description | ||
|---|---|---|---|---|
| SUSE | N/A | SUSE Linux Enterprise High Performance Computing 15 SP5 | ||
| SUSE | N/A | Public Cloud Module 15-SP7 | ||
| SUSE | N/A | SUSE Linux Enterprise Real Time 15 SP7 | ||
| SUSE | N/A | SUSE Linux Enterprise Workstation Extension 15 SP7 | ||
| SUSE | N/A | SUSE Linux Enterprise High Performance Computing 12 SP5 | ||
| SUSE | N/A | SUSE Linux Enterprise Server 12 SP5 | ||
| SUSE | N/A | Legacy Module 15-SP7 | ||
| SUSE | N/A | SUSE Linux Enterprise High Availability Extension 15 SP7 | ||
| SUSE | N/A | SUSE Linux Enterprise Server 12 SP5 LTSS | ||
| SUSE | N/A | SUSE Linux Enterprise Desktop 15 SP7 | ||
| SUSE | N/A | SUSE Linux Enterprise Server for SAP Applications 15 SP7 | ||
| SUSE | N/A | openSUSE Leap 15.5 | ||
| SUSE | N/A | SUSE Linux Enterprise Live Patching 15-SP6 | ||
| SUSE | N/A | SUSE Linux Enterprise Server 15 SP5 | ||
| SUSE | N/A | SUSE Linux Enterprise Server for SAP Applications 15 SP5 | ||
| SUSE | N/A | SUSE Linux Enterprise Real Time 15 SP5 | ||
| SUSE | N/A | SUSE Linux Enterprise Live Patching 12-SP5 | ||
| SUSE | N/A | SUSE Linux Micro 6.2 | ||
| SUSE | N/A | SUSE Linux Enterprise Server 15 SP7 | ||
| SUSE | N/A | SUSE Linux Enterprise Live Patching 15-SP7 | ||
| SUSE | N/A | SUSE Linux Enterprise Live Patching 15-SP5 | ||
| SUSE | N/A | SUSE Linux Enterprise High Performance Computing LTSS 15 SP5 | ||
| SUSE | N/A | SUSE Linux Enterprise Server 15 SP6 LTSS | ||
| SUSE | N/A | SUSE Linux Enterprise Real Time 15 SP6 | ||
| SUSE | N/A | openSUSE Leap 15.6 | ||
| SUSE | N/A | SUSE Linux Enterprise Server for SAP Applications 16.0 | ||
| SUSE | N/A | SUSE Linux Enterprise Server 15 SP5 LTSS | ||
| SUSE | N/A | SUSE Linux Enterprise High Performance Computing ESPOS 15 SP5 | ||
| SUSE | N/A | Development Tools Module 15-SP7 | ||
| SUSE | N/A | SUSE Linux Enterprise Server 16.0 | ||
| SUSE | N/A | SUSE Linux Enterprise Server for SAP Applications 12 SP5 | ||
| SUSE | N/A | Basesystem Module 15-SP7 | ||
| SUSE | N/A | SUSE Linux Enterprise High Availability Extension 15 SP6 | ||
| SUSE | N/A | SUSE Linux Enterprise Server for SAP Applications 15 SP6 | ||
| SUSE | N/A | SUSE Linux Enterprise Server 12 SP5 LTSS Extended Security | ||
| SUSE | N/A | SUSE Linux Enterprise Server 15 SP6 | ||
| SUSE | N/A | SUSE Real Time Module 15-SP7 | ||
| SUSE | N/A | SUSE Linux Enterprise Micro 5.5 |
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "SUSE Linux Enterprise High Performance Computing 15 SP5",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "Public Cloud Module 15-SP7",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Real Time 15 SP7",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Workstation Extension 15 SP7",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise High Performance Computing 12 SP5",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Server 12 SP5",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "Legacy Module 15-SP7",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise High Availability Extension 15 SP7",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Server 12 SP5 LTSS",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Desktop 15 SP7",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Server for SAP Applications 15 SP7",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "openSUSE Leap 15.5",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Live Patching 15-SP6",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Server 15 SP5",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Server for SAP Applications 15 SP5",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Real Time 15 SP5",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Live Patching 12-SP5",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Micro 6.2",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Server 15 SP7",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Live Patching 15-SP7",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Live Patching 15-SP5",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise High Performance Computing LTSS 15 SP5",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Server 15 SP6 LTSS",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Real Time 15 SP6",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "openSUSE Leap 15.6",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Server for SAP Applications 16.0",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Server 15 SP5 LTSS",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise High Performance Computing ESPOS 15 SP5",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "Development Tools Module 15-SP7",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Server 16.0",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Server for SAP Applications 12 SP5",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "Basesystem Module 15-SP7",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise High Availability Extension 15 SP6",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Server for SAP Applications 15 SP6",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Server 12 SP5 LTSS Extended Security",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Server 15 SP6",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Real Time Module 15-SP7",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Micro 5.5",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
}
],
"affected_systems_content": null,
"content": "## Solutions\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des correctifs (cf. section Documentation).",
"cves": [
{
"name": "CVE-2022-50669",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50669"
},
{
"name": "CVE-2023-53761",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53761"
},
{
"name": "CVE-2023-53814",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53814"
},
{
"name": "CVE-2025-40225",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40225"
},
{
"name": "CVE-2023-54076",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54076"
},
{
"name": "CVE-2025-40273",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40273"
},
{
"name": "CVE-2023-54208",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54208"
},
{
"name": "CVE-2025-68230",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68230"
},
{
"name": "CVE-2023-54039",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54039"
},
{
"name": "CVE-2025-40064",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40064"
},
{
"name": "CVE-2023-53804",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53804"
},
{
"name": "CVE-2023-54149",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54149"
},
{
"name": "CVE-2023-53797",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53797"
},
{
"name": "CVE-2022-50873",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50873"
},
{
"name": "CVE-2023-53863",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53863"
},
{
"name": "CVE-2023-54131",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54131"
},
{
"name": "CVE-2023-54142",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54142"
},
{
"name": "CVE-2022-50867",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50867"
},
{
"name": "CVE-2022-50779",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50779"
},
{
"name": "CVE-2023-54000",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54000"
},
{
"name": "CVE-2023-54052",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54052"
},
{
"name": "CVE-2023-54111",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54111"
},
{
"name": "CVE-2023-53809",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53809"
},
{
"name": "CVE-2023-54186",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54186"
},
{
"name": "CVE-2025-68286",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68286"
},
{
"name": "CVE-2025-68749",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68749"
},
{
"name": "CVE-2023-53803",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53803"
},
{
"name": "CVE-2022-50641",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50641"
},
{
"name": "CVE-2023-53754",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53754"
},
{
"name": "CVE-2023-54091",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54091"
},
{
"name": "CVE-2023-54083",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54083"
},
{
"name": "CVE-2022-50527",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50527"
},
{
"name": "CVE-2023-54280",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54280"
},
{
"name": "CVE-2025-38588",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38588"
},
{
"name": "CVE-2022-50834",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50834"
},
{
"name": "CVE-2025-40314",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40314"
},
{
"name": "CVE-2025-40306",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40306"
},
{
"name": "CVE-2022-50809",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50809"
},
{
"name": "CVE-2023-54270",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54270"
},
{
"name": "CVE-2023-53821",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53821"
},
{
"name": "CVE-2023-53799",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53799"
},
{
"name": "CVE-2023-54021",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54021"
},
{
"name": "CVE-2023-54201",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54201"
},
{
"name": "CVE-2025-40219",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40219"
},
{
"name": "CVE-2025-68176",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68176"
},
{
"name": "CVE-2023-53176",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53176"
},
{
"name": "CVE-2025-68204",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68204"
},
{
"name": "CVE-2022-50630",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50630"
},
{
"name": "CVE-2025-68380",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68380"
},
{
"name": "CVE-2022-50672",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50672"
},
{
"name": "CVE-2023-53833",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53833"
},
{
"name": "CVE-2023-54309",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54309"
},
{
"name": "CVE-2022-50776",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50776"
},
{
"name": "CVE-2025-68339",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68339"
},
{
"name": "CVE-2025-40287",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40287"
},
{
"name": "CVE-2023-53995",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53995"
},
{
"name": "CVE-2023-54255",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54255"
},
{
"name": "CVE-2023-54018",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54018"
},
{
"name": "CVE-2023-54271",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54271"
},
{
"name": "CVE-2022-50702",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50702"
},
{
"name": "CVE-2023-53786",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53786"
},
{
"name": "CVE-2022-50761",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50761"
},
{
"name": "CVE-2022-50866",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50866"
},
{
"name": "CVE-2023-54297",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54297"
},
{
"name": "CVE-2025-40019",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40019"
},
{
"name": "CVE-2023-54112",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54112"
},
{
"name": "CVE-2025-68287",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68287"
},
{
"name": "CVE-2025-40240",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40240"
},
{
"name": "CVE-2025-40081",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40081"
},
{
"name": "CVE-2023-54313",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54313"
},
{
"name": "CVE-2023-53759",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53759"
},
{
"name": "CVE-2025-68746",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68746"
},
{
"name": "CVE-2023-53845",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53845"
},
{
"name": "CVE-2023-53994",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53994"
},
{
"name": "CVE-2025-40153",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40153"
},
{
"name": "CVE-2022-50622",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50622"
},
{
"name": "CVE-2025-40294",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40294"
},
{
"name": "CVE-2023-53765",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53765"
},
{
"name": "CVE-2025-40312",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40312"
},
{
"name": "CVE-2025-40204",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40204"
},
{
"name": "CVE-2023-54095",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54095"
},
{
"name": "CVE-2022-50883",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50883"
},
{
"name": "CVE-2023-54143",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54143"
},
{
"name": "CVE-2025-68302",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68302"
},
{
"name": "CVE-2025-68238",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68238"
},
{
"name": "CVE-2023-53813",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53813"
},
{
"name": "CVE-2023-54227",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54227"
},
{
"name": "CVE-2022-50646",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50646"
},
{
"name": "CVE-2023-53855",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53855"
},
{
"name": "CVE-2022-50853",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50853"
},
{
"name": "CVE-2025-40139",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40139"
},
{
"name": "CVE-2023-54100",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54100"
},
{
"name": "CVE-2023-53864",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53864"
},
{
"name": "CVE-2025-40309",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40309"
},
{
"name": "CVE-2025-38336",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38336"
},
{
"name": "CVE-2025-40349",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40349"
},
{
"name": "CVE-2023-54246",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54246"
},
{
"name": "CVE-2025-40343",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40343"
},
{
"name": "CVE-2023-54001",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54001"
},
{
"name": "CVE-2023-54253",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54253"
},
{
"name": "CVE-2022-50619",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50619"
},
{
"name": "CVE-2025-68307",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68307"
},
{
"name": "CVE-2025-40308",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40308"
},
{
"name": "CVE-2023-54324",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54324"
},
{
"name": "CVE-2023-54106",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54106"
},
{
"name": "CVE-2025-40187",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40187"
},
{
"name": "CVE-2025-40315",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40315"
},
{
"name": "CVE-2023-53793",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53793"
},
{
"name": "CVE-2023-54213",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54213"
},
{
"name": "CVE-2023-54096",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54096"
},
{
"name": "CVE-2022-50636",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50636"
},
{
"name": "CVE-2025-40251",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40251"
},
{
"name": "CVE-2023-54283",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54283"
},
{
"name": "CVE-2025-68184",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68184"
},
{
"name": "CVE-2023-53837",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53837"
},
{
"name": "CVE-2023-54049",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54049"
},
{
"name": "CVE-2023-54066",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54066"
},
{
"name": "CVE-2023-53020",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53020"
},
{
"name": "CVE-2023-54117",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54117"
},
{
"name": "CVE-2023-53999",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53999"
},
{
"name": "CVE-2023-54038",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54038"
},
{
"name": "CVE-2023-54315",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54315"
},
{
"name": "CVE-2023-54010",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54010"
},
{
"name": "CVE-2022-50774",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50774"
},
{
"name": "CVE-2025-38500",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38500"
},
{
"name": "CVE-2022-50878",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50878"
},
{
"name": "CVE-2023-54211",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54211"
},
{
"name": "CVE-2023-54251",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54251"
},
{
"name": "CVE-2022-50836",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50836"
},
{
"name": "CVE-2023-54156",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54156"
},
{
"name": "CVE-2022-50644",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50644"
},
{
"name": "CVE-2022-50846",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50846"
},
{
"name": "CVE-2023-54098",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54098"
},
{
"name": "CVE-2023-53750",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53750"
},
{
"name": "CVE-2022-50842",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50842"
},
{
"name": "CVE-2025-40347",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40347"
},
{
"name": "CVE-2023-54037",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54037"
},
{
"name": "CVE-2023-54275",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54275"
},
{
"name": "CVE-2023-53815",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53815"
},
{
"name": "CVE-2025-40198",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40198"
},
{
"name": "CVE-2022-50668",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50668"
},
{
"name": "CVE-2025-68257",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68257"
},
{
"name": "CVE-2023-53818",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53818"
},
{
"name": "CVE-2023-54132",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54132"
},
{
"name": "CVE-2023-54031",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54031"
},
{
"name": "CVE-2022-50840",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50840"
},
{
"name": "CVE-2023-54305",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54305"
},
{
"name": "CVE-2025-40190",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40190"
},
{
"name": "CVE-2022-50756",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50756"
},
{
"name": "CVE-2023-53989",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53989"
},
{
"name": "CVE-2023-54150",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54150"
},
{
"name": "CVE-2023-54199",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54199"
},
{
"name": "CVE-2025-68347",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68347"
},
{
"name": "CVE-2025-68235",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68235"
},
{
"name": "CVE-2025-40311",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40311"
},
{
"name": "CVE-2023-54254",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54254"
},
{
"name": "CVE-2023-53780",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53780"
},
{
"name": "CVE-2023-54312",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54312"
},
{
"name": "CVE-2023-54094",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54094"
},
{
"name": "CVE-2022-50700",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50700"
},
{
"name": "CVE-2022-50821",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50821"
},
{
"name": "CVE-2023-54128",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54128"
},
{
"name": "CVE-2025-40167",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40167"
},
{
"name": "CVE-2023-54110",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54110"
},
{
"name": "CVE-2022-50881",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50881"
},
{
"name": "CVE-2023-54205",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54205"
},
{
"name": "CVE-2023-53846",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53846"
},
{
"name": "CVE-2023-53866",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53866"
},
{
"name": "CVE-2023-53792",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53792"
},
{
"name": "CVE-2023-54164",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54164"
},
{
"name": "CVE-2025-40256",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40256"
},
{
"name": "CVE-2025-40360",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40360"
},
{
"name": "CVE-2025-40332",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40332"
},
{
"name": "CVE-2025-68354",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68354"
},
{
"name": "CVE-2023-54316",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54316"
},
{
"name": "CVE-2022-49975",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49975"
},
{
"name": "CVE-2022-50724",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50724"
},
{
"name": "CVE-2022-50633",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50633"
},
{
"name": "CVE-2025-68258",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68258"
},
{
"name": "CVE-2023-54089",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54089"
},
{
"name": "CVE-2022-50859",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50859"
},
{
"name": "CVE-2022-50750",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50750"
},
{
"name": "CVE-2022-50726",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50726"
},
{
"name": "CVE-2023-54016",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54016"
},
{
"name": "CVE-2025-40035",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40035"
},
{
"name": "CVE-2023-54035",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54035"
},
{
"name": "CVE-2025-40322",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40322"
},
{
"name": "CVE-2025-68209",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68209"
},
{
"name": "CVE-2022-50814",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50814"
},
{
"name": "CVE-2023-20569",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-20569"
},
{
"name": "CVE-2023-54074",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54074"
},
{
"name": "CVE-2023-54040",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54040"
},
{
"name": "CVE-2022-50705",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50705"
},
{
"name": "CVE-2023-54214",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54214"
},
{
"name": "CVE-2025-40233",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40233"
},
{
"name": "CVE-2023-54322",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54322"
},
{
"name": "CVE-2023-54155",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54155"
},
{
"name": "CVE-2023-54088",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54088"
},
{
"name": "CVE-2023-54090",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54090"
},
{
"name": "CVE-2025-40271",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40271"
},
{
"name": "CVE-2023-54276",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54276"
},
{
"name": "CVE-2025-40359",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40359"
},
{
"name": "CVE-2025-68306",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68306"
},
{
"name": "CVE-2023-53755",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53755"
},
{
"name": "CVE-2023-42752",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-42752"
},
{
"name": "CVE-2023-54079",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54079"
},
{
"name": "CVE-2023-54048",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54048"
},
{
"name": "CVE-2023-54202",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54202"
},
{
"name": "CVE-2023-54007",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54007"
},
{
"name": "CVE-2023-54278",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54278"
},
{
"name": "CVE-2023-54215",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54215"
},
{
"name": "CVE-2025-68308",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68308"
},
{
"name": "CVE-2023-54024",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54024"
},
{
"name": "CVE-2023-53777",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53777"
},
{
"name": "CVE-2022-50781",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50781"
},
{
"name": "CVE-2023-54133",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54133"
},
{
"name": "CVE-2022-50860",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50860"
},
{
"name": "CVE-2025-40242",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40242"
},
{
"name": "CVE-2022-50833",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50833"
},
{
"name": "CVE-2025-40212",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40212"
},
{
"name": "CVE-2022-50649",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50649"
},
{
"name": "CVE-2023-54148",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54148"
},
{
"name": "CVE-2025-68190",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68190"
},
{
"name": "CVE-2022-50829",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50829"
},
{
"name": "CVE-2023-54064",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54064"
},
{
"name": "CVE-2023-54153",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54153"
},
{
"name": "CVE-2022-50830",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50830"
},
{
"name": "CVE-2025-40252",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40252"
},
{
"name": "CVE-2022-49546",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49546"
},
{
"name": "CVE-2022-50673",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50673"
},
{
"name": "CVE-2023-53791",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53791"
},
{
"name": "CVE-2025-68218",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68218"
},
{
"name": "CVE-2023-53848",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53848"
},
{
"name": "CVE-2025-68255",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68255"
},
{
"name": "CVE-2023-54081",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54081"
},
{
"name": "CVE-2023-54274",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54274"
},
{
"name": "CVE-2023-53828",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53828"
},
{
"name": "CVE-2025-40024",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40024"
},
{
"name": "CVE-2022-50666",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50666"
},
{
"name": "CVE-2023-54185",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54185"
},
{
"name": "CVE-2023-54108",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54108"
},
{
"name": "CVE-2022-50745",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50745"
},
{
"name": "CVE-2025-40277",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40277"
},
{
"name": "CVE-2023-54317",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54317"
},
{
"name": "CVE-2022-50736",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50736"
},
{
"name": "CVE-2022-50740",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50740"
},
{
"name": "CVE-2023-53753",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53753"
},
{
"name": "CVE-2025-40272",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40272"
},
{
"name": "CVE-2023-54298",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54298"
},
{
"name": "CVE-2022-50822",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50822"
},
{
"name": "CVE-2025-68759",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68759"
},
{
"name": "CVE-2023-53834",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53834"
},
{
"name": "CVE-2023-54053",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54053"
},
{
"name": "CVE-2022-50843",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50843"
},
{
"name": "CVE-2022-50769",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50769"
},
{
"name": "CVE-2025-40345",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40345"
},
{
"name": "CVE-2023-54295",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54295"
},
{
"name": "CVE-2022-50752",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50752"
},
{
"name": "CVE-2025-40354",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40354"
},
{
"name": "CVE-2023-54170",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54170"
},
{
"name": "CVE-2023-53781",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53781"
},
{
"name": "CVE-2025-40033",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40033"
},
{
"name": "CVE-2025-40269",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40269"
},
{
"name": "CVE-2025-68335",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68335"
},
{
"name": "CVE-2023-54223",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54223"
},
{
"name": "CVE-2023-54175",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54175"
},
{
"name": "CVE-2022-50716",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50716"
},
{
"name": "CVE-2025-40075",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40075"
},
{
"name": "CVE-2022-50698",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50698"
},
{
"name": "CVE-2022-50844",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50844"
},
{
"name": "CVE-2025-39977",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39977"
},
{
"name": "CVE-2023-54045",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54045"
},
{
"name": "CVE-2025-68330",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68330"
},
{
"name": "CVE-2023-54101",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54101"
},
{
"name": "CVE-2023-54107",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54107"
},
{
"name": "CVE-2023-54179",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54179"
},
{
"name": "CVE-2022-50773",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50773"
},
{
"name": "CVE-2022-50758",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50758"
},
{
"name": "CVE-2022-50848",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50848"
},
{
"name": "CVE-2025-68180",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68180"
},
{
"name": "CVE-2023-54289",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54289"
},
{
"name": "CVE-2022-50662",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50662"
},
{
"name": "CVE-2022-50738",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50738"
},
{
"name": "CVE-2023-54177",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54177"
},
{
"name": "CVE-2025-68201",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68201"
},
{
"name": "CVE-2023-54078",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54078"
},
{
"name": "CVE-2022-50819",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50819"
},
{
"name": "CVE-2025-40289",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40289"
},
{
"name": "CVE-2024-57849",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57849"
},
{
"name": "CVE-2023-54102",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54102"
},
{
"name": "CVE-2022-50723",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50723"
},
{
"name": "CVE-2025-68223",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68223"
},
{
"name": "CVE-2025-40292",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40292"
},
{
"name": "CVE-2025-68181",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68181"
},
{
"name": "CVE-2023-54093",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54093"
},
{
"name": "CVE-2023-53839",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53839"
},
{
"name": "CVE-2023-53752",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53752"
},
{
"name": "CVE-2023-53802",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53802"
},
{
"name": "CVE-2022-50887",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50887"
},
{
"name": "CVE-2025-68724",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68724"
},
{
"name": "CVE-2023-54318",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54318"
},
{
"name": "CVE-2022-50710",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50710"
},
{
"name": "CVE-2022-50757",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50757"
},
{
"name": "CVE-2022-0854",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0854"
},
{
"name": "CVE-2022-50827",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50827"
},
{
"name": "CVE-2025-68252",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68252"
},
{
"name": "CVE-2023-54166",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54166"
},
{
"name": "CVE-2025-40274",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40274"
},
{
"name": "CVE-2023-53820",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53820"
},
{
"name": "CVE-2023-54136",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54136"
},
{
"name": "CVE-2023-54225",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54225"
},
{
"name": "CVE-2022-50679",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50679"
},
{
"name": "CVE-2025-40220",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40220"
},
{
"name": "CVE-2025-68237",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68237"
},
{
"name": "CVE-2023-54194",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54194"
},
{
"name": "CVE-2023-53748",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53748"
},
{
"name": "CVE-2025-68259",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68259"
},
{
"name": "CVE-2022-50839",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50839"
},
{
"name": "CVE-2023-54301",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54301"
},
{
"name": "CVE-2025-68312",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68312"
},
{
"name": "CVE-2023-53843",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53843"
},
{
"name": "CVE-2025-68194",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68194"
},
{
"name": "CVE-2024-53164",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53164"
},
{
"name": "CVE-2022-50744",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50744"
},
{
"name": "CVE-2023-54277",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54277"
},
{
"name": "CVE-2025-40006",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40006"
},
{
"name": "CVE-2023-53844",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53844"
},
{
"name": "CVE-2025-68183",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68183"
},
{
"name": "CVE-2023-54046",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54046"
},
{
"name": "CVE-2025-40263",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40263"
},
{
"name": "CVE-2022-50717",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50717"
},
{
"name": "CVE-2023-54120",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54120"
},
{
"name": "CVE-2025-38616",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38616"
},
{
"name": "CVE-2022-50621",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50621"
},
{
"name": "CVE-2023-54026",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54026"
},
{
"name": "CVE-2025-68244",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68244"
},
{
"name": "CVE-2025-40231",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40231"
},
{
"name": "CVE-2022-50742",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50742"
},
{
"name": "CVE-2025-40278",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40278"
},
{
"name": "CVE-2023-53783",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53783"
},
{
"name": "CVE-2025-40342",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40342"
},
{
"name": "CVE-2023-54057",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54057"
},
{
"name": "CVE-2022-50714",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50714"
},
{
"name": "CVE-2023-54028",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54028"
},
{
"name": "CVE-2023-53858",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53858"
},
{
"name": "CVE-2023-53992",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53992"
},
{
"name": "CVE-2022-50722",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50722"
},
{
"name": "CVE-2022-50709",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50709"
},
{
"name": "CVE-2022-50728",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50728"
},
{
"name": "CVE-2022-50677",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50677"
},
{
"name": "CVE-2023-54266",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54266"
},
{
"name": "CVE-2025-68222",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68222"
},
{
"name": "CVE-2025-68765",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68765"
},
{
"name": "CVE-2023-53825",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53825"
},
{
"name": "CVE-2025-38664",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38664"
},
{
"name": "CVE-2023-53454",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53454"
},
{
"name": "CVE-2023-54003",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54003"
},
{
"name": "CVE-2023-54072",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54072"
},
{
"name": "CVE-2023-54134",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54134"
},
{
"name": "CVE-2025-38554",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38554"
},
{
"name": "CVE-2023-54291",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54291"
},
{
"name": "CVE-2023-54321",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54321"
},
{
"name": "CVE-2025-40279",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40279"
},
{
"name": "CVE-2023-53865",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53865"
},
{
"name": "CVE-2025-68328",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68328"
},
{
"name": "CVE-2023-54041",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54041"
},
{
"name": "CVE-2023-53744",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53744"
},
{
"name": "CVE-2023-23559",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-23559"
},
{
"name": "CVE-2023-53823",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53823"
},
{
"name": "CVE-2022-50718",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50718"
},
{
"name": "CVE-2022-50658",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50658"
},
{
"name": "CVE-2023-54009",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54009"
},
{
"name": "CVE-2023-54023",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54023"
},
{
"name": "CVE-2022-50660",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50660"
},
{
"name": "CVE-2025-68744",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68744"
},
{
"name": "CVE-2023-54241",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54241"
},
{
"name": "CVE-2023-54017",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54017"
},
{
"name": "CVE-2023-53787",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53787"
},
{
"name": "CVE-2022-50886",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50886"
},
{
"name": "CVE-2025-68172",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68172"
},
{
"name": "CVE-2023-54097",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54097"
},
{
"name": "CVE-2022-50626",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50626"
},
{
"name": "CVE-2025-40338",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40338"
},
{
"name": "CVE-2022-50767",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50767"
},
{
"name": "CVE-2025-40134",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40134"
},
{
"name": "CVE-2023-53801",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53801"
},
{
"name": "CVE-2023-54154",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54154"
},
{
"name": "CVE-2022-50880",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50880"
},
{
"name": "CVE-2023-54141",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54141"
},
{
"name": "CVE-2022-50885",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50885"
},
{
"name": "CVE-2025-40302",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40302"
},
{
"name": "CVE-2023-53766",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53766"
},
{
"name": "CVE-2023-53840",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53840"
},
{
"name": "CVE-2025-40357",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40357"
},
{
"name": "CVE-2023-53785",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53785"
},
{
"name": "CVE-2025-40328",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40328"
},
{
"name": "CVE-2025-40340",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40340"
},
{
"name": "CVE-2022-50661",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50661"
},
{
"name": "CVE-2025-68332",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68332"
},
{
"name": "CVE-2023-54263",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54263"
},
{
"name": "CVE-2025-40283",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40283"
},
{
"name": "CVE-2023-54284",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54284"
},
{
"name": "CVE-2025-40324",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40324"
},
{
"name": "CVE-2023-54181",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54181"
},
{
"name": "CVE-2022-50818",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50818"
},
{
"name": "CVE-2025-68378",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68378"
},
{
"name": "CVE-2022-50824",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50824"
},
{
"name": "CVE-2023-53849",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53849"
},
{
"name": "CVE-2023-53795",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53795"
},
{
"name": "CVE-2022-50623",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50623"
},
{
"name": "CVE-2025-40250",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40250"
},
{
"name": "CVE-2025-38728",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38728"
},
{
"name": "CVE-2023-53788",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53788"
},
{
"name": "CVE-2025-40074",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40074"
},
{
"name": "CVE-2025-38608",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38608"
},
{
"name": "CVE-2025-40321",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40321"
},
{
"name": "CVE-2024-56590",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56590"
},
{
"name": "CVE-2023-54207",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54207"
},
{
"name": "CVE-2025-68249",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68249"
},
{
"name": "CVE-2025-68740",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68740"
},
{
"name": "CVE-2022-50864",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50864"
},
{
"name": "CVE-2025-40158",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40158"
},
{
"name": "CVE-2025-40179",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40179"
},
{
"name": "CVE-2025-68742",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68742"
},
{
"name": "CVE-2023-53832",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53832"
},
{
"name": "CVE-2023-54226",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54226"
},
{
"name": "CVE-2025-40282",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40282"
},
{
"name": "CVE-2023-53819",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53819"
},
{
"name": "CVE-2022-50715",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50715"
},
{
"name": "CVE-2025-40168",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40168"
},
{
"name": "CVE-2022-50665",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50665"
},
{
"name": "CVE-2023-54210",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54210"
},
{
"name": "CVE-2025-40053",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40053"
},
{
"name": "CVE-2025-38085",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38085"
},
{
"name": "CVE-2022-50735",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50735"
},
{
"name": "CVE-2023-54030",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54030"
},
{
"name": "CVE-2025-68192",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68192"
},
{
"name": "CVE-2023-54092",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54092"
},
{
"name": "CVE-2023-53997",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53997"
},
{
"name": "CVE-2023-54015",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54015"
},
{
"name": "CVE-2025-40301",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40301"
},
{
"name": "CVE-2023-54224",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54224"
},
{
"name": "CVE-2025-68298",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68298"
},
{
"name": "CVE-2025-68207",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68207"
},
{
"name": "CVE-2023-54235",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54235"
},
{
"name": "CVE-2023-54122",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54122"
},
{
"name": "CVE-2023-54119",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54119"
},
{
"name": "CVE-2025-68747",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68747"
},
{
"name": "CVE-2025-38617",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38617"
},
{
"name": "CVE-2022-50675",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50675"
},
{
"name": "CVE-2023-54159",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54159"
},
{
"name": "CVE-2022-50751",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50751"
},
{
"name": "CVE-2023-54245",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54245"
},
{
"name": "CVE-2023-54032",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54032"
},
{
"name": "CVE-2023-54168",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54168"
},
{
"name": "CVE-2023-54262",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54262"
},
{
"name": "CVE-2023-53856",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53856"
},
{
"name": "CVE-2025-40318",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40318"
},
{
"name": "CVE-2022-50889",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50889"
},
{
"name": "CVE-2023-54146",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54146"
},
{
"name": "CVE-2023-54118",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54118"
},
{
"name": "CVE-2023-53782",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53782"
},
{
"name": "CVE-2023-54115",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54115"
},
{
"name": "CVE-2023-54069",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54069"
},
{
"name": "CVE-2022-50699",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50699"
},
{
"name": "CVE-2023-53990",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53990"
},
{
"name": "CVE-2023-54104",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54104"
},
{
"name": "CVE-2025-40135",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40135"
},
{
"name": "CVE-2023-54027",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54027"
},
{
"name": "CVE-2022-50870",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50870"
},
{
"name": "CVE-2025-68734",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68734"
},
{
"name": "CVE-2023-54058",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54058"
},
{
"name": "CVE-2023-54238",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54238"
},
{
"name": "CVE-2023-54114",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54114"
},
{
"name": "CVE-2023-53806",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53806"
},
{
"name": "CVE-2023-53851",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53851"
},
{
"name": "CVE-2025-68345",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68345"
},
{
"name": "CVE-2022-50838",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50838"
},
{
"name": "CVE-2023-54311",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54311"
},
{
"name": "CVE-2023-54183",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54183"
},
{
"name": "CVE-2023-54126",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54126"
},
{
"name": "CVE-2023-53841",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53841"
},
{
"name": "CVE-2023-54326",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54326"
},
{
"name": "CVE-2023-54267",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54267"
},
{
"name": "CVE-2023-54282",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54282"
},
{
"name": "CVE-2022-50879",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50879"
},
{
"name": "CVE-2025-40310",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40310"
},
{
"name": "CVE-2022-50733",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50733"
},
{
"name": "CVE-2023-54006",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54006"
},
{
"name": "CVE-2023-53784",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53784"
},
{
"name": "CVE-2023-54084",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54084"
},
{
"name": "CVE-2023-54067",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54067"
},
{
"name": "CVE-2022-50731",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50731"
},
{
"name": "CVE-2023-54264",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54264"
},
{
"name": "CVE-2025-40331",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40331"
},
{
"name": "CVE-2025-68351",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68351"
},
{
"name": "CVE-2023-54304",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54304"
},
{
"name": "CVE-2022-50851",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50851"
},
{
"name": "CVE-2022-50615",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50615"
},
{
"name": "CVE-2022-50667",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50667"
},
{
"name": "CVE-2025-40149",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40149"
},
{
"name": "CVE-2022-50704",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50704"
},
{
"name": "CVE-2023-53747",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53747"
},
{
"name": "CVE-2025-40164",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40164"
},
{
"name": "CVE-2022-50730",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50730"
},
{
"name": "CVE-2023-54125",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54125"
},
{
"name": "CVE-2022-50617",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50617"
},
{
"name": "CVE-2023-53718",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53718"
},
{
"name": "CVE-2023-54173",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54173"
},
{
"name": "CVE-2023-53751",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53751"
},
{
"name": "CVE-2023-53743",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53743"
},
{
"name": "CVE-2022-50656",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50656"
},
{
"name": "CVE-2023-54036",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54036"
},
{
"name": "CVE-2023-54190",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54190"
},
{
"name": "CVE-2022-49604",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49604"
},
{
"name": "CVE-2023-53842",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53842"
},
{
"name": "CVE-2022-50768",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50768"
},
{
"name": "CVE-2025-68208",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68208"
},
{
"name": "CVE-2025-68362",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68362"
},
{
"name": "CVE-2022-50823",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50823"
},
{
"name": "CVE-2022-50719",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50719"
},
{
"name": "CVE-2022-50703",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50703"
},
{
"name": "CVE-2022-50763",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50763"
},
{
"name": "CVE-2022-50727",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50727"
},
{
"name": "CVE-2022-50629",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50629"
},
{
"name": "CVE-2023-53762",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53762"
},
{
"name": "CVE-2022-50872",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50872"
},
{
"name": "CVE-2025-68290",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68290"
},
{
"name": "CVE-2025-40280",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40280"
},
{
"name": "CVE-2025-40293",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40293"
},
{
"name": "CVE-2025-40330",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40330"
},
{
"name": "CVE-2025-68750",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68750"
},
{
"name": "CVE-2023-54127",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54127"
},
{
"name": "CVE-2023-53861",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53861"
},
{
"name": "CVE-2023-54197",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54197"
},
{
"name": "CVE-2025-68331",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68331"
},
{
"name": "CVE-2023-54137",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54137"
},
{
"name": "CVE-2023-54244",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54244"
},
{
"name": "CVE-2022-50862",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50862"
},
{
"name": "CVE-2023-54319",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54319"
},
{
"name": "CVE-2025-68305",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68305"
},
{
"name": "CVE-2022-50845",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50845"
},
{
"name": "CVE-2025-40320",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40320"
},
{
"name": "CVE-2025-39963",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39963"
},
{
"name": "CVE-2022-50754",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50754"
},
{
"name": "CVE-2025-68753",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68753"
},
{
"name": "CVE-2023-54140",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54140"
},
{
"name": "CVE-2022-50856",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50856"
},
{
"name": "CVE-2023-54285",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54285"
},
{
"name": "CVE-2023-54055",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54055"
},
{
"name": "CVE-2023-54025",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54025"
},
{
"name": "CVE-2023-53991",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53991"
},
{
"name": "CVE-2023-54229",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54229"
},
{
"name": "CVE-2022-50861",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50861"
},
{
"name": "CVE-2022-50882",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50882"
},
{
"name": "CVE-2025-40200",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40200"
},
{
"name": "CVE-2023-54300",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54300"
},
{
"name": "CVE-2023-54042",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54042"
},
{
"name": "CVE-2022-50832",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50832"
},
{
"name": "CVE-2023-53807",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53807"
},
{
"name": "CVE-2022-50638",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50638"
},
{
"name": "CVE-2025-40102",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40102"
},
{
"name": "CVE-2023-54302",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54302"
},
{
"name": "CVE-2025-40170",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40170"
},
{
"name": "CVE-2023-53811",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53811"
},
{
"name": "CVE-2025-40160",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40160"
},
{
"name": "CVE-2025-40284",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40284"
},
{
"name": "CVE-2023-54178",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54178"
},
{
"name": "CVE-2023-54051",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54051"
},
{
"name": "CVE-2023-54286",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54286"
},
{
"name": "CVE-2023-54269",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54269"
},
{
"name": "CVE-2023-53808",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53808"
},
{
"name": "CVE-2022-50849",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50849"
},
{
"name": "CVE-2023-54234",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54234"
},
{
"name": "CVE-2022-50760",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50760"
},
{
"name": "CVE-2023-54008",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54008"
},
{
"name": "CVE-2023-54014",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54014"
},
{
"name": "CVE-2022-50858",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50858"
},
{
"name": "CVE-2025-40215",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40215"
},
{
"name": "CVE-2025-40307",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40307"
},
{
"name": "CVE-2025-68346",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68346"
},
{
"name": "CVE-2022-50888",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50888"
},
{
"name": "CVE-2025-40211",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40211"
},
{
"name": "CVE-2025-40042",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40042"
},
{
"name": "CVE-2023-54258",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54258"
},
{
"name": "CVE-2025-39890",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39890"
},
{
"name": "CVE-2022-50640",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50640"
},
{
"name": "CVE-2023-54221",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54221"
},
{
"name": "CVE-2025-40248",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40248"
},
{
"name": "CVE-2022-50747",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50747"
},
{
"name": "CVE-2025-68303",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68303"
},
{
"name": "CVE-2023-53827",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53827"
},
{
"name": "CVE-2025-68757",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68757"
},
{
"name": "CVE-2023-54293",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54293"
},
{
"name": "CVE-2025-40329",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40329"
},
{
"name": "CVE-2022-50782",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50782"
},
{
"name": "CVE-2022-50826",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50826"
},
{
"name": "CVE-2025-38618",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38618"
},
{
"name": "CVE-2023-54060",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54060"
},
{
"name": "CVE-2022-48853",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48853"
},
{
"name": "CVE-2022-50635",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50635"
},
{
"name": "CVE-2025-68766",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68766"
},
{
"name": "CVE-2023-53778",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53778"
},
{
"name": "CVE-2023-53746",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53746"
},
{
"name": "CVE-2023-54145",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54145"
},
{
"name": "CVE-2023-54171",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54171"
},
{
"name": "CVE-2022-50749",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50749"
},
{
"name": "CVE-2022-50706",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50706"
},
{
"name": "CVE-2023-54240",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54240"
},
{
"name": "CVE-2022-50618",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50618"
},
{
"name": "CVE-2025-68168",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68168"
},
{
"name": "CVE-2025-68206",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68206"
},
{
"name": "CVE-2022-50678",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50678"
},
{
"name": "CVE-2023-54247",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54247"
},
{
"name": "CVE-2025-68170",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68170"
},
{
"name": "CVE-2023-54070",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54070"
},
{
"name": "CVE-2023-54204",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54204"
},
{
"name": "CVE-2025-68313",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68313"
},
{
"name": "CVE-2023-53676",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53676"
},
{
"name": "CVE-2023-53850",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53850"
},
{
"name": "CVE-2023-54303",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54303"
},
{
"name": "CVE-2025-68197",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68197"
},
{
"name": "CVE-2025-40123",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40123"
},
{
"name": "CVE-2023-53998",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53998"
},
{
"name": "CVE-2023-53816",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53816"
},
{
"name": "CVE-2025-40297",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40297"
},
{
"name": "CVE-2025-68217",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68217"
},
{
"name": "CVE-2025-40178",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40178"
},
{
"name": "CVE-2023-54242",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54242"
},
{
"name": "CVE-2025-68289",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68289"
},
{
"name": "CVE-2023-53852",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53852"
},
{
"name": "CVE-2022-50777",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50777"
},
{
"name": "CVE-2023-53862",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53862"
},
{
"name": "CVE-2025-40276",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40276"
},
{
"name": "CVE-2022-50664",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50664"
},
{
"name": "CVE-2022-50701",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50701"
},
{
"name": "CVE-2022-50643",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50643"
},
{
"name": "CVE-2025-40317",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40317"
},
{
"name": "CVE-2023-53254",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53254"
},
{
"name": "CVE-2023-54020",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54020"
},
{
"name": "CVE-2023-54135",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54135"
},
{
"name": "CVE-2023-4132",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-4132"
},
{
"name": "CVE-2023-53996",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53996"
},
{
"name": "CVE-2025-68233",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68233"
},
{
"name": "CVE-2024-26944",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26944"
},
{
"name": "CVE-2025-38321",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38321"
},
{
"name": "CVE-2025-40316",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40316"
},
{
"name": "CVE-2023-54130",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54130"
},
{
"name": "CVE-2023-54314",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54314"
},
{
"name": "CVE-2022-50625",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50625"
},
{
"name": "CVE-2025-68758",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68758"
},
{
"name": "CVE-2023-54292",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54292"
},
{
"name": "CVE-2023-54172",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54172"
},
{
"name": "CVE-2023-54113",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54113"
},
{
"name": "CVE-2025-68340",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68340"
},
{
"name": "CVE-2023-54320",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54320"
},
{
"name": "CVE-2023-53836",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53836"
},
{
"name": "CVE-2025-40288",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40288"
},
{
"name": "CVE-2025-68239",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68239"
},
{
"name": "CVE-2025-40258",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40258"
},
{
"name": "CVE-2023-53857",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53857"
},
{
"name": "CVE-2023-53860",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53860"
},
{
"name": "CVE-2025-68185",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68185"
},
{
"name": "CVE-2025-40304",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40304"
},
{
"name": "CVE-2025-40110",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40110"
},
{
"name": "CVE-2023-54169",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54169"
},
{
"name": "CVE-2025-40268",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40268"
},
{
"name": "CVE-2023-54281",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54281"
},
{
"name": "CVE-2023-54044",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54044"
},
{
"name": "CVE-2023-54080",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54080"
},
{
"name": "CVE-2023-54294",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54294"
},
{
"name": "CVE-2023-53794",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53794"
},
{
"name": "CVE-2025-40337",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40337"
},
{
"name": "CVE-2022-50614",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50614"
},
{
"name": "CVE-2025-40346",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40346"
},
{
"name": "CVE-2025-39682",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39682"
},
{
"name": "CVE-2023-54050",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54050"
},
{
"name": "CVE-2025-40262",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40262"
},
{
"name": "CVE-2022-50828",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50828"
},
{
"name": "CVE-2024-36933",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36933"
},
{
"name": "CVE-2022-50670",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50670"
},
{
"name": "CVE-2023-54022",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54022"
},
{
"name": "CVE-2022-50868",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50868"
},
{
"name": "CVE-2023-54296",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54296"
},
{
"name": "CVE-2025-40244",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40244"
},
{
"name": "CVE-2023-54287",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54287"
},
{
"name": "CVE-2025-68732",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68732"
},
{
"name": "CVE-2023-53769",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53769"
},
{
"name": "CVE-2022-50876",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50876"
},
{
"name": "CVE-2025-40323",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40323"
},
{
"name": "CVE-2022-50652",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50652"
},
{
"name": "CVE-2022-50732",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50732"
},
{
"name": "CVE-2023-54220",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54220"
},
{
"name": "CVE-2023-54198",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54198"
},
{
"name": "CVE-2022-50671",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50671"
},
{
"name": "CVE-2023-54138",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54138"
},
{
"name": "CVE-2023-54047",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54047"
},
{
"name": "CVE-2023-54144",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54144"
},
{
"name": "CVE-2023-54209",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54209"
},
{
"name": "CVE-2022-50653",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50653"
},
{
"name": "CVE-2025-40275",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40275"
},
{
"name": "CVE-2022-50712",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50712"
},
{
"name": "CVE-2023-54252",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54252"
},
{
"name": "CVE-2023-54019",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54019"
},
{
"name": "CVE-2023-54123",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54123"
},
{
"name": "CVE-2023-54236",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54236"
},
{
"name": "CVE-2022-50835",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50835"
},
{
"name": "CVE-2023-54189",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54189"
},
{
"name": "CVE-2025-38476",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38476"
},
{
"name": "CVE-2025-40339",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40339"
},
{
"name": "CVE-2023-54260",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54260"
},
{
"name": "CVE-2023-54116",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54116"
},
{
"name": "CVE-2025-40223",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40223"
},
{
"name": "CVE-2022-50884",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50884"
},
{
"name": "CVE-2025-38572",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38572"
},
{
"name": "CVE-2023-54230",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54230"
},
{
"name": "CVE-2023-53831",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53831"
},
{
"name": "CVE-2025-68195",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68195"
},
{
"name": "CVE-2025-40213",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40213"
},
{
"name": "CVE-2023-54299",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54299"
},
{
"name": "CVE-2023-53768",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53768"
},
{
"name": "CVE-2023-53830",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53830"
},
{
"name": "CVE-2022-50850",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50850"
},
{
"name": "CVE-2023-54099",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54099"
},
{
"name": "CVE-2025-40319",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40319"
},
{
"name": "CVE-2022-50847",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50847"
},
{
"name": "CVE-2023-54219",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54219"
},
{
"name": "CVE-2023-53847",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53847"
},
{
"name": "CVE-2024-53093",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53093"
},
{
"name": "CVE-2023-54325",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54325"
},
{
"name": "CVE-2023-54121",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54121"
},
{
"name": "CVE-2023-54261",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54261"
},
{
"name": "CVE-2023-54005",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54005"
},
{
"name": "CVE-2022-50770",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50770"
},
{
"name": "CVE-2025-40351",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40351"
},
{
"name": "CVE-2025-68264",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68264"
},
{
"name": "CVE-2022-50755",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50755"
}
],
"initial_release_date": "2026-01-30T00:00:00",
"last_revision_date": "2026-01-30T00:00:00",
"links": [],
"reference": "CERTFR-2026-AVI-0108",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2026-01-30T00:00:00.000000"
}
],
"risks": [
{
"description": "Atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es"
},
{
"description": "Ex\u00e9cution de code arbitraire"
},
{
"description": "Non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur"
},
{
"description": "D\u00e9ni de service"
},
{
"description": "Contournement de la politique de s\u00e9curit\u00e9"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans le noyau Linux de SUSE. Certaines d\u0027entre elles permettent \u00e0 un attaquant de provoquer une ex\u00e9cution de code arbitraire, une atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es et une atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es.",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans le noyau Linux de SUSE",
"vendor_advisories": [
{
"published_at": "2026-01-23",
"title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2026:0269-1",
"url": "https://www.suse.com/support/update/announcement/2026/suse-su-20260269-1"
},
{
"published_at": "2026-01-26",
"title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2026:0293-1",
"url": "https://www.suse.com/support/update/announcement/2026/suse-su-20260293-1"
},
{
"published_at": "2026-01-28",
"title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2026:0315-1",
"url": "https://www.suse.com/support/update/announcement/2026/suse-su-20260315-1"
},
{
"published_at": "2026-01-26",
"title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2026:20168-1",
"url": "https://www.suse.com/support/update/announcement/2026/suse-su-202620168-1"
},
{
"published_at": "2026-01-23",
"title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2026:0278-1",
"url": "https://www.suse.com/support/update/announcement/2026/suse-su-20260278-1"
},
{
"published_at": "2026-01-26",
"title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2026:20169-1",
"url": "https://www.suse.com/support/update/announcement/2026/suse-su-202620169-1"
},
{
"published_at": "2026-01-23",
"title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2026:0283-1",
"url": "https://www.suse.com/support/update/announcement/2026/suse-su-20260283-1"
},
{
"published_at": "2026-01-23",
"title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2026:20163-1",
"url": "https://www.suse.com/support/update/announcement/2026/suse-su-202620163-1"
},
{
"published_at": "2026-01-26",
"title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2026:20164-1",
"url": "https://www.suse.com/support/update/announcement/2026/suse-su-202620164-1"
},
{
"published_at": "2026-01-23",
"title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2026:0267-1",
"url": "https://www.suse.com/support/update/announcement/2026/suse-su-20260267-1"
},
{
"published_at": "2026-01-23",
"title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2026:20148-1",
"url": "https://www.suse.com/support/update/announcement/2026/suse-su-202620148-1"
},
{
"published_at": "2026-01-23",
"title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2026:0284-1",
"url": "https://www.suse.com/support/update/announcement/2026/suse-su-20260284-1"
},
{
"published_at": "2026-01-23",
"title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2026:0270-1",
"url": "https://www.suse.com/support/update/announcement/2026/suse-su-20260270-1"
},
{
"published_at": "2026-01-23",
"title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2026:0274-1",
"url": "https://www.suse.com/support/update/announcement/2026/suse-su-20260274-1"
},
{
"published_at": "2026-01-28",
"title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2026:0317-1",
"url": "https://www.suse.com/support/update/announcement/2026/suse-su-20260317-1"
},
{
"published_at": "2026-01-26",
"title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2026:20149-1",
"url": "https://www.suse.com/support/update/announcement/2026/suse-su-202620149-1"
},
{
"published_at": "2026-01-27",
"title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2026:0305-1",
"url": "https://www.suse.com/support/update/announcement/2026/suse-su-20260305-1"
},
{
"published_at": "2026-01-22",
"title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2026:0263-1",
"url": "https://www.suse.com/support/update/announcement/2026/suse-su-20260263-1"
},
{
"published_at": "2026-01-26",
"title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2026:20165-1",
"url": "https://www.suse.com/support/update/announcement/2026/suse-su-202620165-1"
},
{
"published_at": "2026-01-28",
"title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2026:0316-1",
"url": "https://www.suse.com/support/update/announcement/2026/suse-su-20260316-1"
},
{
"published_at": "2026-01-23",
"title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2026:0281-1",
"url": "https://www.suse.com/support/update/announcement/2026/suse-su-20260281-1"
}
]
}
CERTFR-2025-AVI-1133
Vulnerability from certfr_avis - Published: 2025-12-19 - Updated: 2025-12-19
De multiples vulnérabilités ont été découvertes dans le noyau Linux de SUSE. Certaines d'entre elles permettent à un attaquant de provoquer une atteinte à la confidentialité des données, une atteinte à l'intégrité des données et un contournement de la politique de sécurité.
Solutions
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
| Vendor | Product | Description | ||
|---|---|---|---|---|
| SUSE | N/A | SUSE Linux Enterprise Desktop 15 SP6 | ||
| SUSE | N/A | SUSE Linux Enterprise Real Time 15 SP7 | ||
| SUSE | N/A | Basesystem Module 15-SP6 | ||
| SUSE | N/A | SUSE Linux Enterprise Workstation Extension 15 SP7 | ||
| SUSE | N/A | Legacy Module 15-SP7 | ||
| SUSE | N/A | SUSE Linux Enterprise High Availability Extension 15 SP7 | ||
| SUSE | N/A | SUSE Linux Enterprise Desktop 15 SP7 | ||
| SUSE | N/A | SUSE Linux Enterprise Server for SAP Applications 15 SP7 | ||
| SUSE | N/A | SUSE Linux Enterprise Live Patching 15-SP6 | ||
| SUSE | N/A | Legacy Module 15-SP6 | ||
| SUSE | N/A | SUSE Linux Enterprise Server 15 SP7 | ||
| SUSE | N/A | SUSE Linux Enterprise Live Patching 15-SP7 | ||
| SUSE | N/A | SUSE Linux Enterprise Real Time 15 SP6 | ||
| SUSE | N/A | openSUSE Leap 15.6 | ||
| SUSE | N/A | Development Tools Module 15-SP7 | ||
| SUSE | N/A | SUSE Linux Enterprise Workstation Extension 15 SP6 | ||
| SUSE | N/A | Basesystem Module 15-SP7 | ||
| SUSE | N/A | SUSE Linux Enterprise High Availability Extension 15 SP6 | ||
| SUSE | N/A | SUSE Linux Enterprise Server for SAP Applications 15 SP6 | ||
| SUSE | N/A | Development Tools Module 15-SP6 | ||
| SUSE | N/A | SUSE Linux Enterprise Server 15 SP6 |
| Title | Publication Time | Tags | ||||||
|---|---|---|---|---|---|---|---|---|
|
||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "SUSE Linux Enterprise Desktop 15 SP6",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Real Time 15 SP7",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "Basesystem Module 15-SP6",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Workstation Extension 15 SP7",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "Legacy Module 15-SP7",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise High Availability Extension 15 SP7",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Desktop 15 SP7",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Server for SAP Applications 15 SP7",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Live Patching 15-SP6",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "Legacy Module 15-SP6",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Server 15 SP7",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Live Patching 15-SP7",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Real Time 15 SP6",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "openSUSE Leap 15.6",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "Development Tools Module 15-SP7",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Workstation Extension 15 SP6",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "Basesystem Module 15-SP7",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise High Availability Extension 15 SP6",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Server for SAP Applications 15 SP6",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "Development Tools Module 15-SP6",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Server 15 SP6",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
}
],
"affected_systems_content": "",
"content": "## Solutions\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des correctifs (cf. section Documentation).",
"cves": [
{
"name": "CVE-2025-40064",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40064"
},
{
"name": "CVE-2025-40156",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40156"
},
{
"name": "CVE-2025-40055",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40055"
},
{
"name": "CVE-2025-40048",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40048"
},
{
"name": "CVE-2025-40121",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40121"
},
{
"name": "CVE-2025-40204",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40204"
},
{
"name": "CVE-2025-40171",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40171"
},
{
"name": "CVE-2025-40139",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40139"
},
{
"name": "CVE-2025-40107",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40107"
},
{
"name": "CVE-2025-40115",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40115"
},
{
"name": "CVE-2025-40198",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40198"
},
{
"name": "CVE-2025-40173",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40173"
},
{
"name": "CVE-2025-39944",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39944"
},
{
"name": "CVE-2025-40194",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40194"
},
{
"name": "CVE-2025-40001",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40001"
},
{
"name": "CVE-2025-39859",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39859"
},
{
"name": "CVE-2025-40172",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40172"
},
{
"name": "CVE-2025-40188",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40188"
},
{
"name": "CVE-2025-40186",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40186"
},
{
"name": "CVE-2025-40086",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40086"
},
{
"name": "CVE-2025-40169",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40169"
},
{
"name": "CVE-2025-40070",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40070"
},
{
"name": "CVE-2025-40047",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40047"
},
{
"name": "CVE-2025-40205",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40205"
},
{
"name": "CVE-2022-50253",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50253"
},
{
"name": "CVE-2025-40075",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40075"
},
{
"name": "CVE-2025-40027",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40027"
},
{
"name": "CVE-2025-40206",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40206"
},
{
"name": "CVE-2025-39788",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39788"
},
{
"name": "CVE-2025-40109",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40109"
},
{
"name": "CVE-2025-40038",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40038"
},
{
"name": "CVE-2025-39805",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39805"
},
{
"name": "CVE-2025-40176",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40176"
},
{
"name": "CVE-2025-40183",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40183"
},
{
"name": "CVE-2025-37916",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37916"
},
{
"name": "CVE-2025-38359",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38359"
},
{
"name": "CVE-2025-40074",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40074"
},
{
"name": "CVE-2025-40116",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40116"
},
{
"name": "CVE-2025-40127",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40127"
},
{
"name": "CVE-2025-40168",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40168"
},
{
"name": "CVE-2025-40120",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40120"
},
{
"name": "CVE-2025-40185",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40185"
},
{
"name": "CVE-2025-40098",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40098"
},
{
"name": "CVE-2025-40129",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40129"
},
{
"name": "CVE-2025-40040",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40040"
},
{
"name": "CVE-2025-40207",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40207"
},
{
"name": "CVE-2025-40118",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40118"
},
{
"name": "CVE-2025-40157",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40157"
},
{
"name": "CVE-2025-40021",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40021"
},
{
"name": "CVE-2025-40105",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40105"
},
{
"name": "CVE-2025-40083",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40083"
},
{
"name": "CVE-2025-40154",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40154"
},
{
"name": "CVE-2025-40149",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40149"
},
{
"name": "CVE-2025-40164",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40164"
},
{
"name": "CVE-2025-40180",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40180"
},
{
"name": "CVE-2025-40200",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40200"
},
{
"name": "CVE-2025-40080",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40080"
},
{
"name": "CVE-2025-40111",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40111"
},
{
"name": "CVE-2025-40059",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40059"
},
{
"name": "CVE-2023-53676",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53676"
},
{
"name": "CVE-2025-39822",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39822"
},
{
"name": "CVE-2025-40141",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40141"
},
{
"name": "CVE-2025-40110",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40110"
},
{
"name": "CVE-2025-39980",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39980"
},
{
"name": "CVE-2025-40030",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40030"
},
{
"name": "CVE-2025-39819",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39819"
},
{
"name": "CVE-2025-40140",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40140"
},
{
"name": "CVE-2025-21710",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21710"
},
{
"name": "CVE-2025-40159",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40159"
},
{
"name": "CVE-2025-38361",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38361"
}
],
"initial_release_date": "2025-12-19T00:00:00",
"last_revision_date": "2025-12-19T00:00:00",
"links": [],
"reference": "CERTFR-2025-AVI-1133",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2025-12-19T00:00:00.000000"
}
],
"risks": [
{
"description": "Atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es"
},
{
"description": "D\u00e9ni de service"
},
{
"description": "Contournement de la politique de s\u00e9curit\u00e9"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans le noyau Linux de SUSE. Certaines d\u0027entre elles permettent \u00e0 un attaquant de provoquer une atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es, une atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es et un contournement de la politique de s\u00e9curit\u00e9.",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans le noyau Linux de SUSE",
"vendor_advisories": [
{
"published_at": "2025-12-15",
"title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2025:4393-1",
"url": "https://www.suse.com/support/update/announcement/2025/suse-su-20254393-1"
},
{
"published_at": "2025-12-17",
"title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2025:4422-1",
"url": "https://www.suse.com/support/update/announcement/2025/suse-su-20254422-1"
}
]
}
CERTFR-2025-AVI-1140
Vulnerability from certfr_avis - Published: 2025-12-26 - Updated: 2025-12-26
De multiples vulnérabilités ont été découvertes dans le noyau Linux de SUSE. Certaines d'entre elles permettent à un attaquant de provoquer une atteinte à la confidentialité des données, un contournement de la politique de sécurité et un déni de service.
Solutions
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
| Vendor | Product | Description | ||
|---|---|---|---|---|
| SUSE | Public Cloud Module | Public Cloud Module 15-SP7 | ||
| SUSE | openSUSE Leap | openSUSE Leap 15.5 | ||
| SUSE | SUSE Linux Enterprise Real Time | SUSE Linux Enterprise Real Time 15 SP7 | ||
| SUSE | SUSE Linux Enterprise Server | SUSE Linux Enterprise Server for SAP Applications 15 SP6 | ||
| SUSE | SUSE Linux Enterprise High Performance Computing | SUSE Linux Enterprise High Performance Computing 12 SP5 | ||
| SUSE | SUSE Linux Enterprise Server | SUSE Linux Enterprise Server 12 SP5, SP5 LTSS et SP5 LTSS Extended Security | ||
| SUSE | SUSE Linux Enterprise Live Patching | SUSE Linux Enterprise Live Patching 12-SP5 | ||
| SUSE | SUSE Linux Enterprise Live Patching | SUSE Linux Enterprise Live Patching 15-SP6 | ||
| SUSE | SUSE Linux Enterprise Server | SUSE Linux Enterprise Server for SAP Applications 12 SP5 | ||
| SUSE | SUSE Linux Enterprise Live Patching | SUSE Linux Enterprise Live Patching 15-SP7 | ||
| SUSE | SUSE Linux Enterprise Server | SUSE Linux Enterprise Server for SAP Applications 15 SP5 | ||
| SUSE | Public Cloud Module | Public Cloud Module 15-SP6 | ||
| SUSE | openSUSE Leap | openSUSE Leap 15.6 | ||
| SUSE | SUSE Linux Enterprise Real Time | SUSE Linux Enterprise Real Time 15 SP5 | ||
| SUSE | SUSE Linux Enterprise Server | SUSE Linux Enterprise Server 15 SP6 | ||
| SUSE | SUSE Linux Enterprise Server | SUSE Linux Enterprise Real Time 15 SP5 et SP5 LTSS | ||
| SUSE | SUSE Real Time Module | SUSE Real Time Module 15-SP6 | ||
| SUSE | SUSE Linux Enterprise Server | SUSE Linux Enterprise Server for SAP Applications 15 SP7 | ||
| SUSE | SUSE Linux Enterprise High Performance Computing | SUSE Linux Enterprise High Performance Computing 15 SP5, ESPOS 15 SP5 et LTSS 15 SP5 | ||
| SUSE | SUSE Linux Enterprise Micro | SUSE Linux Enterprise Micro 5.5 | ||
| SUSE | SUSE Linux Enterprise Real Time | SUSE Linux Enterprise Real Time 15 SP6 | ||
| SUSE | SUSE Linux Enterprise Server | SUSE Linux Enterprise Server 15 SP7 | ||
| SUSE | SUSE Linux Enterprise Server | SUSE Linux Enterprise Server 11 SP4 et SP4 LTSS EXTREME CORE | ||
| SUSE | SUSE Real Time Module | SUSE Real Time Module 15-SP7 |
| Title | Publication Time | Tags | |||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||||||||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "Public Cloud Module 15-SP7",
"product": {
"name": "Public Cloud Module",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "openSUSE Leap 15.5",
"product": {
"name": "openSUSE Leap",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Real Time 15 SP7",
"product": {
"name": "SUSE Linux Enterprise Real Time",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Server for SAP Applications 15 SP6",
"product": {
"name": "SUSE Linux Enterprise Server",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise High Performance Computing 12 SP5",
"product": {
"name": "SUSE Linux Enterprise High Performance Computing",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Server 12 SP5, SP5 LTSS et SP5 LTSS Extended Security",
"product": {
"name": "SUSE Linux Enterprise Server",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Live Patching 12-SP5",
"product": {
"name": "SUSE Linux Enterprise Live Patching",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Live Patching 15-SP6",
"product": {
"name": "SUSE Linux Enterprise Live Patching",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Server for SAP Applications 12 SP5",
"product": {
"name": "SUSE Linux Enterprise Server",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Live Patching 15-SP7",
"product": {
"name": "SUSE Linux Enterprise Live Patching",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Server for SAP Applications 15 SP5",
"product": {
"name": "SUSE Linux Enterprise Server",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "Public Cloud Module 15-SP6",
"product": {
"name": "Public Cloud Module",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "openSUSE Leap 15.6",
"product": {
"name": "openSUSE Leap",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Real Time 15 SP5",
"product": {
"name": "SUSE Linux Enterprise Real Time",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Server 15 SP6",
"product": {
"name": "SUSE Linux Enterprise Server",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Real Time 15 SP5 et SP5 LTSS",
"product": {
"name": "SUSE Linux Enterprise Server",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Real Time Module 15-SP6",
"product": {
"name": "SUSE Real Time Module",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Server for SAP Applications 15 SP7",
"product": {
"name": "SUSE Linux Enterprise Server",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise High Performance Computing 15 SP5, ESPOS 15 SP5 et LTSS 15 SP5",
"product": {
"name": "SUSE Linux Enterprise High Performance Computing",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Micro 5.5",
"product": {
"name": "SUSE Linux Enterprise Micro",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Real Time 15 SP6",
"product": {
"name": "SUSE Linux Enterprise Real Time",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Server 15 SP7",
"product": {
"name": "SUSE Linux Enterprise Server",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Server 11 SP4 et SP4 LTSS EXTREME CORE",
"product": {
"name": "SUSE Linux Enterprise Server",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Real Time Module 15-SP7",
"product": {
"name": "SUSE Real Time Module",
"vendor": {
"name": "SUSE",
"scada": false
}
}
}
],
"affected_systems_content": "",
"content": "## Solutions\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des correctifs (cf. section Documentation).",
"cves": [
{
"name": "CVE-2025-40064",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40064"
},
{
"name": "CVE-2025-40156",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40156"
},
{
"name": "CVE-2025-40055",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40055"
},
{
"name": "CVE-2025-40048",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40048"
},
{
"name": "CVE-2025-40121",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40121"
},
{
"name": "CVE-2025-40204",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40204"
},
{
"name": "CVE-2025-40171",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40171"
},
{
"name": "CVE-2022-50368",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50368"
},
{
"name": "CVE-2025-40139",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40139"
},
{
"name": "CVE-2025-39967",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39967"
},
{
"name": "CVE-2025-40107",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40107"
},
{
"name": "CVE-2025-40115",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40115"
},
{
"name": "CVE-2025-40198",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40198"
},
{
"name": "CVE-2025-40173",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40173"
},
{
"name": "CVE-2025-39944",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39944"
},
{
"name": "CVE-2025-40194",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40194"
},
{
"name": "CVE-2025-38436",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38436"
},
{
"name": "CVE-2025-40001",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40001"
},
{
"name": "CVE-2023-53431",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53431"
},
{
"name": "CVE-2025-39859",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39859"
},
{
"name": "CVE-2025-40172",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40172"
},
{
"name": "CVE-2022-50494",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50494"
},
{
"name": "CVE-2025-40188",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40188"
},
{
"name": "CVE-2025-40186",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40186"
},
{
"name": "CVE-2025-40086",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40086"
},
{
"name": "CVE-2025-40169",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40169"
},
{
"name": "CVE-2023-53369",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53369"
},
{
"name": "CVE-2023-53641",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53641"
},
{
"name": "CVE-2025-40070",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40070"
},
{
"name": "CVE-2025-40047",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40047"
},
{
"name": "CVE-2025-40205",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40205"
},
{
"name": "CVE-2022-50253",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50253"
},
{
"name": "CVE-2025-40075",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40075"
},
{
"name": "CVE-2025-40027",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40027"
},
{
"name": "CVE-2022-50280",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50280"
},
{
"name": "CVE-2025-40206",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40206"
},
{
"name": "CVE-2022-50578",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50578"
},
{
"name": "CVE-2025-39788",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39788"
},
{
"name": "CVE-2022-50551",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50551"
},
{
"name": "CVE-2025-40109",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40109"
},
{
"name": "CVE-2025-40038",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40038"
},
{
"name": "CVE-2025-39805",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39805"
},
{
"name": "CVE-2025-40176",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40176"
},
{
"name": "CVE-2025-40183",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40183"
},
{
"name": "CVE-2025-37916",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37916"
},
{
"name": "CVE-2025-38359",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38359"
},
{
"name": "CVE-2025-40074",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40074"
},
{
"name": "CVE-2025-40116",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40116"
},
{
"name": "CVE-2025-40127",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40127"
},
{
"name": "CVE-2025-40168",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40168"
},
{
"name": "CVE-2025-40120",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40120"
},
{
"name": "CVE-2025-40185",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40185"
},
{
"name": "CVE-2025-40098",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40098"
},
{
"name": "CVE-2025-40129",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40129"
},
{
"name": "CVE-2025-40040",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40040"
},
{
"name": "CVE-2025-40207",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40207"
},
{
"name": "CVE-2025-40118",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40118"
},
{
"name": "CVE-2025-40157",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40157"
},
{
"name": "CVE-2025-40021",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40021"
},
{
"name": "CVE-2025-40105",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40105"
},
{
"name": "CVE-2025-40083",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40083"
},
{
"name": "CVE-2025-40154",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40154"
},
{
"name": "CVE-2022-50364",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50364"
},
{
"name": "CVE-2025-40149",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40149"
},
{
"name": "CVE-2025-40164",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40164"
},
{
"name": "CVE-2023-53542",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53542"
},
{
"name": "CVE-2023-53229",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53229"
},
{
"name": "CVE-2025-40180",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40180"
},
{
"name": "CVE-2025-40200",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40200"
},
{
"name": "CVE-2025-40080",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40080"
},
{
"name": "CVE-2025-40111",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40111"
},
{
"name": "CVE-2025-40059",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40059"
},
{
"name": "CVE-2023-53676",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53676"
},
{
"name": "CVE-2022-50569",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50569"
},
{
"name": "CVE-2025-39822",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39822"
},
{
"name": "CVE-2025-40141",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40141"
},
{
"name": "CVE-2025-40110",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40110"
},
{
"name": "CVE-2025-39980",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39980"
},
{
"name": "CVE-2025-40030",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40030"
},
{
"name": "CVE-2025-39819",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39819"
},
{
"name": "CVE-2025-38360",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38360"
},
{
"name": "CVE-2022-50545",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50545"
},
{
"name": "CVE-2025-40140",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40140"
},
{
"name": "CVE-2025-21710",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21710"
},
{
"name": "CVE-2025-40159",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40159"
},
{
"name": "CVE-2023-53597",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53597"
},
{
"name": "CVE-2024-53093",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53093"
},
{
"name": "CVE-2025-38361",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38361"
}
],
"initial_release_date": "2025-12-26T00:00:00",
"last_revision_date": "2025-12-26T00:00:00",
"links": [],
"reference": "CERTFR-2025-AVI-1140",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2025-12-26T00:00:00.000000"
}
],
"risks": [
{
"description": "Non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur"
},
{
"description": "D\u00e9ni de service"
},
{
"description": "Contournement de la politique de s\u00e9curit\u00e9"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans le noyau Linux de SUSE. Certaines d\u0027entre elles permettent \u00e0 un attaquant de provoquer une atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es, un contournement de la politique de s\u00e9curit\u00e9 et un d\u00e9ni de service.",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans le noyau Linux de SUSE",
"vendor_advisories": [
{
"published_at": "2025-12-22",
"title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2025:4506-1",
"url": "https://www.suse.com/support/update/announcement/2025/suse-su-20254506-1"
},
{
"published_at": "2025-12-23",
"title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2025:4517-1",
"url": "https://www.suse.com/support/update/announcement/2025/suse-su-20254517-1"
},
{
"published_at": "2025-12-22",
"title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2025:4507-1",
"url": "https://www.suse.com/support/update/announcement/2025/suse-su-20254507-1"
},
{
"published_at": "2025-12-23",
"title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2025:4515-1",
"url": "https://www.suse.com/support/update/announcement/2025/suse-su-20254515-1"
},
{
"published_at": "2025-12-22",
"title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2025:4505-1",
"url": "https://www.suse.com/support/update/announcement/2025/suse-su-20254505-1"
},
{
"published_at": "2025-12-23",
"title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2025:4516-1",
"url": "https://www.suse.com/support/update/announcement/2025/suse-su-20254516-1"
},
{
"published_at": "2025-12-24",
"title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2025:4521-1",
"url": "https://www.suse.com/support/update/announcement/2025/suse-su-20254521-1"
}
]
}
CERTFR-2026-AVI-0059
Vulnerability from certfr_avis - Published: 2026-01-16 - Updated: 2026-01-16
De multiples vulnérabilités ont été découvertes dans le noyau Linux de SUSE. Certaines d'entre elles permettent à un attaquant de provoquer une atteinte à la confidentialité des données, un contournement de la politique de sécurité et un déni de service.
Solutions
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
| Vendor | Product | Description | ||
|---|---|---|---|---|
| SUSE | SUSE Linux Enterprise High Performance Computing | SUSE Linux Enterprise High Performance Computing 15 SP5 | ||
| SUSE | N/A | SUSE Linux Micro Extras 6.0 | ||
| SUSE | openSUSE Leap | openSUSE Leap 15.5 | ||
| SUSE | SUSE Linux Enterprise Live Patching | SUSE Linux Enterprise Live Patching 15-SP5 | ||
| SUSE | SUSE Linux Enterprise Server | SUSE Linux Enterprise Server 16.0 | ||
| SUSE | SUSE Linux Enterprise High Performance Computing | SUSE Linux Enterprise High Performance Computing 15 SP4 | ||
| SUSE | openSUSE Leap | openSUSE Leap 15.4 | ||
| SUSE | SUSE Linux Enterprise High Availability Extension | SUSE Linux Enterprise Server High Availability Extension 16.0 | ||
| SUSE | SUSE Linux Enterprise Server | SUSE Linux Enterprise Server 15 SP5 | ||
| SUSE | SUSE Linux Enterprise Server | SUSE Linux Enterprise Server for SAP Applications 15 SP5 | ||
| SUSE | SUSE Linux Enterprise Micro | SUSE Linux Enterprise Micro 5.3 | ||
| SUSE | SUSE Linux Enterprise Real Time | SUSE Linux Enterprise Real Time 15 SP5 | ||
| SUSE | N/A | SUSE Linux Micro Extras 6.2 | ||
| SUSE | SUSE Linux Enterprise Real Time | SUSE Linux Enterprise Real Time 15 SP4 | ||
| SUSE | SUSE Linux Enterprise Server | SUSE Linux Enterprise Server for SAP Applications 15 SP4 | ||
| SUSE | SUSE Linux Enterprise Server | SUSE Linux Enterprise Server for SAP Applications 16.0 | ||
| SUSE | SUSE Linux Micro | SUSE Linux Micro 6.2 | ||
| SUSE | SUSE Linux Enterprise Micro | SUSE Linux Enterprise Micro 5.5 | ||
| SUSE | SUSE Linux Enterprise Server | SUSE Linux Enterprise Server 15 SP4 | ||
| SUSE | SUSE Linux Micro | SUSE Linux Micro 6.1 | ||
| SUSE | SUSE Linux Micro | SUSE Linux Micro 6.0 | ||
| SUSE | SUSE Linux Enterprise Micro | SUSE Linux Enterprise Micro 5.4 | ||
| SUSE | SUSE Linux Enterprise Live Patching | SUSE Linux Enterprise Live Patching 15-SP4 |
| Title | Publication Time | Tags | |||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||||||||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "SUSE Linux Enterprise High Performance Computing 15 SP5",
"product": {
"name": "SUSE Linux Enterprise High Performance Computing",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Micro Extras 6.0",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "openSUSE Leap 15.5",
"product": {
"name": "openSUSE Leap",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Live Patching 15-SP5",
"product": {
"name": "SUSE Linux Enterprise Live Patching",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Server 16.0",
"product": {
"name": "SUSE Linux Enterprise Server",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise High Performance Computing 15 SP4",
"product": {
"name": "SUSE Linux Enterprise High Performance Computing",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "openSUSE Leap 15.4",
"product": {
"name": "openSUSE Leap",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Server High Availability Extension 16.0",
"product": {
"name": "SUSE Linux Enterprise High Availability Extension",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Server 15 SP5",
"product": {
"name": "SUSE Linux Enterprise Server",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Server for SAP Applications 15 SP5",
"product": {
"name": "SUSE Linux Enterprise Server",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Micro 5.3",
"product": {
"name": "SUSE Linux Enterprise Micro",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Real Time 15 SP5",
"product": {
"name": "SUSE Linux Enterprise Real Time",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Micro Extras 6.2",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Real Time 15 SP4",
"product": {
"name": "SUSE Linux Enterprise Real Time",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Server for SAP Applications 15 SP4",
"product": {
"name": "SUSE Linux Enterprise Server",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Server for SAP Applications 16.0",
"product": {
"name": "SUSE Linux Enterprise Server",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Micro 6.2",
"product": {
"name": "SUSE Linux Micro",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Micro 5.5",
"product": {
"name": "SUSE Linux Enterprise Micro",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Server 15 SP4",
"product": {
"name": "SUSE Linux Enterprise Server",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Micro 6.1",
"product": {
"name": "SUSE Linux Micro",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Micro 6.0",
"product": {
"name": "SUSE Linux Micro",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Micro 5.4",
"product": {
"name": "SUSE Linux Enterprise Micro",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Live Patching 15-SP4",
"product": {
"name": "SUSE Linux Enterprise Live Patching",
"vendor": {
"name": "SUSE",
"scada": false
}
}
}
],
"affected_systems_content": "",
"content": "## Solutions\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des correctifs (cf. section Documentation).",
"cves": [
{
"name": "CVE-2025-40166",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40166"
},
{
"name": "CVE-2025-40064",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40064"
},
{
"name": "CVE-2025-40156",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40156"
},
{
"name": "CVE-2025-40055",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40055"
},
{
"name": "CVE-2025-40048",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40048"
},
{
"name": "CVE-2025-40081",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40081"
},
{
"name": "CVE-2025-40153",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40153"
},
{
"name": "CVE-2025-40121",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40121"
},
{
"name": "CVE-2025-40204",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40204"
},
{
"name": "CVE-2025-40171",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40171"
},
{
"name": "CVE-2025-40139",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40139"
},
{
"name": "CVE-2025-40187",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40187"
},
{
"name": "CVE-2025-40107",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40107"
},
{
"name": "CVE-2025-40115",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40115"
},
{
"name": "CVE-2025-40198",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40198"
},
{
"name": "CVE-2025-40173",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40173"
},
{
"name": "CVE-2025-39944",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39944"
},
{
"name": "CVE-2025-40202",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40202"
},
{
"name": "CVE-2025-39990",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39990"
},
{
"name": "CVE-2025-40194",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40194"
},
{
"name": "CVE-2025-40001",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40001"
},
{
"name": "CVE-2025-39859",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39859"
},
{
"name": "CVE-2025-40172",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40172"
},
{
"name": "CVE-2025-40188",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40188"
},
{
"name": "CVE-2025-40186",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40186"
},
{
"name": "CVE-2025-40086",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40086"
},
{
"name": "CVE-2025-40169",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40169"
},
{
"name": "CVE-2025-40024",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40024"
},
{
"name": "CVE-2025-40070",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40070"
},
{
"name": "CVE-2025-40047",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40047"
},
{
"name": "CVE-2025-40205",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40205"
},
{
"name": "CVE-2025-40033",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40033"
},
{
"name": "CVE-2022-50253",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50253"
},
{
"name": "CVE-2025-40075",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40075"
},
{
"name": "CVE-2025-40027",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40027"
},
{
"name": "CVE-2025-40206",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40206"
},
{
"name": "CVE-2025-39788",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39788"
},
{
"name": "CVE-2025-40197",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40197"
},
{
"name": "CVE-2025-40109",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40109"
},
{
"name": "CVE-2025-40101",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40101"
},
{
"name": "CVE-2025-40006",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40006"
},
{
"name": "CVE-2025-40038",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40038"
},
{
"name": "CVE-2025-39805",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39805"
},
{
"name": "CVE-2025-40176",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40176"
},
{
"name": "CVE-2025-40201",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40201"
},
{
"name": "CVE-2025-40183",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40183"
},
{
"name": "CVE-2025-40134",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40134"
},
{
"name": "CVE-2023-53574",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53574"
},
{
"name": "CVE-2025-40165",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40165"
},
{
"name": "CVE-2025-38257",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38257"
},
{
"name": "CVE-2025-40161",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40161"
},
{
"name": "CVE-2025-37916",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37916"
},
{
"name": "CVE-2025-38359",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38359"
},
{
"name": "CVE-2025-40177",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40177"
},
{
"name": "CVE-2025-38728",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38728"
},
{
"name": "CVE-2025-40074",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40074"
},
{
"name": "CVE-2025-40116",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40116"
},
{
"name": "CVE-2025-40158",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40158"
},
{
"name": "CVE-2025-40127",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40127"
},
{
"name": "CVE-2025-40168",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40168"
},
{
"name": "CVE-2025-40053",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40053"
},
{
"name": "CVE-2025-38085",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38085"
},
{
"name": "CVE-2025-40120",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40120"
},
{
"name": "CVE-2025-40185",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40185"
},
{
"name": "CVE-2025-40098",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40098"
},
{
"name": "CVE-2025-40196",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40196"
},
{
"name": "CVE-2025-40129",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40129"
},
{
"name": "CVE-2025-40040",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40040"
},
{
"name": "CVE-2025-40207",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40207"
},
{
"name": "CVE-2025-40118",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40118"
},
{
"name": "CVE-2025-40157",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40157"
},
{
"name": "CVE-2025-40021",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40021"
},
{
"name": "CVE-2025-40135",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40135"
},
{
"name": "CVE-2025-40105",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40105"
},
{
"name": "CVE-2025-40083",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40083"
},
{
"name": "CVE-2025-40154",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40154"
},
{
"name": "CVE-2025-40149",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40149"
},
{
"name": "CVE-2025-40164",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40164"
},
{
"name": "CVE-2025-40031",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40031"
},
{
"name": "CVE-2025-40180",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40180"
},
{
"name": "CVE-2025-40203",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40203"
},
{
"name": "CVE-2025-40192",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40192"
},
{
"name": "CVE-2025-40200",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40200"
},
{
"name": "CVE-2025-40102",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40102"
},
{
"name": "CVE-2025-40111",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40111"
},
{
"name": "CVE-2025-39961",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39961"
},
{
"name": "CVE-2025-40133",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40133"
},
{
"name": "CVE-2025-40059",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40059"
},
{
"name": "CVE-2025-39897",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39897"
},
{
"name": "CVE-2025-40003",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40003"
},
{
"name": "CVE-2025-40175",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40175"
},
{
"name": "CVE-2023-53676",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53676"
},
{
"name": "CVE-2025-40178",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40178"
},
{
"name": "CVE-2025-38321",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38321"
},
{
"name": "CVE-2025-39917",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39917"
},
{
"name": "CVE-2025-39831",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39831"
},
{
"name": "CVE-2025-39822",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39822"
},
{
"name": "CVE-2025-40141",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40141"
},
{
"name": "CVE-2025-40132",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40132"
},
{
"name": "CVE-2025-40110",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40110"
},
{
"name": "CVE-2025-40162",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40162"
},
{
"name": "CVE-2025-39980",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39980"
},
{
"name": "CVE-2025-38084",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38084"
},
{
"name": "CVE-2025-40030",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40030"
},
{
"name": "CVE-2025-39819",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39819"
},
{
"name": "CVE-2025-40140",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40140"
},
{
"name": "CVE-2025-21710",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21710"
},
{
"name": "CVE-2025-40142",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40142"
},
{
"name": "CVE-2025-40159",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40159"
},
{
"name": "CVE-2025-38361",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38361"
}
],
"initial_release_date": "2026-01-16T00:00:00",
"last_revision_date": "2026-01-16T00:00:00",
"links": [],
"reference": "CERTFR-2026-AVI-0059",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2026-01-16T00:00:00.000000"
}
],
"risks": [
{
"description": "Non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur"
},
{
"description": "D\u00e9ni de service"
},
{
"description": "Contournement de la politique de s\u00e9curit\u00e9"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans le noyau Linux de SUSE. Certaines d\u0027entre elles permettent \u00e0 un attaquant de provoquer une atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es, un contournement de la politique de s\u00e9curit\u00e9 et un d\u00e9ni de service.",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans le noyau Linux de SUSE",
"vendor_advisories": [
{
"published_at": "2025-12-19",
"title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2026:20015-1",
"url": "https://www.suse.com/support/update/announcement/2026/suse-su-202620015-1"
},
{
"published_at": "2026-01-12",
"title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2026:0090-1",
"url": "https://www.suse.com/support/update/announcement/2026/suse-su-20260090-1"
},
{
"published_at": "2026-01-07",
"title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2026:20039-1",
"url": "https://www.suse.com/support/update/announcement/2026/suse-su-202620039-1"
},
{
"published_at": "2026-01-07",
"title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2026:20059-1",
"url": "https://www.suse.com/support/update/announcement/2026/suse-su-202620059-1"
},
{
"published_at": "2025-12-19",
"title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2026:20012-1",
"url": "https://www.suse.com/support/update/announcement/2026/suse-su-202620012-1"
},
{
"published_at": "2025-12-19",
"title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2026:20021-1",
"url": "https://www.suse.com/support/update/announcement/2026/suse-su-202620021-1"
},
{
"published_at": "2026-01-12",
"title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2026:0107-1",
"url": "https://www.suse.com/support/update/announcement/2026/suse-su-20260107-1"
}
]
}
CERTFR-2025-AVI-1140
Vulnerability from certfr_avis - Published: 2025-12-26 - Updated: 2025-12-26
De multiples vulnérabilités ont été découvertes dans le noyau Linux de SUSE. Certaines d'entre elles permettent à un attaquant de provoquer une atteinte à la confidentialité des données, un contournement de la politique de sécurité et un déni de service.
Solutions
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
| Vendor | Product | Description | ||
|---|---|---|---|---|
| SUSE | Public Cloud Module | Public Cloud Module 15-SP7 | ||
| SUSE | openSUSE Leap | openSUSE Leap 15.5 | ||
| SUSE | SUSE Linux Enterprise Real Time | SUSE Linux Enterprise Real Time 15 SP7 | ||
| SUSE | SUSE Linux Enterprise Server | SUSE Linux Enterprise Server for SAP Applications 15 SP6 | ||
| SUSE | SUSE Linux Enterprise High Performance Computing | SUSE Linux Enterprise High Performance Computing 12 SP5 | ||
| SUSE | SUSE Linux Enterprise Server | SUSE Linux Enterprise Server 12 SP5, SP5 LTSS et SP5 LTSS Extended Security | ||
| SUSE | SUSE Linux Enterprise Live Patching | SUSE Linux Enterprise Live Patching 12-SP5 | ||
| SUSE | SUSE Linux Enterprise Live Patching | SUSE Linux Enterprise Live Patching 15-SP6 | ||
| SUSE | SUSE Linux Enterprise Server | SUSE Linux Enterprise Server for SAP Applications 12 SP5 | ||
| SUSE | SUSE Linux Enterprise Live Patching | SUSE Linux Enterprise Live Patching 15-SP7 | ||
| SUSE | SUSE Linux Enterprise Server | SUSE Linux Enterprise Server for SAP Applications 15 SP5 | ||
| SUSE | Public Cloud Module | Public Cloud Module 15-SP6 | ||
| SUSE | openSUSE Leap | openSUSE Leap 15.6 | ||
| SUSE | SUSE Linux Enterprise Real Time | SUSE Linux Enterprise Real Time 15 SP5 | ||
| SUSE | SUSE Linux Enterprise Server | SUSE Linux Enterprise Server 15 SP6 | ||
| SUSE | SUSE Linux Enterprise Server | SUSE Linux Enterprise Real Time 15 SP5 et SP5 LTSS | ||
| SUSE | SUSE Real Time Module | SUSE Real Time Module 15-SP6 | ||
| SUSE | SUSE Linux Enterprise Server | SUSE Linux Enterprise Server for SAP Applications 15 SP7 | ||
| SUSE | SUSE Linux Enterprise High Performance Computing | SUSE Linux Enterprise High Performance Computing 15 SP5, ESPOS 15 SP5 et LTSS 15 SP5 | ||
| SUSE | SUSE Linux Enterprise Micro | SUSE Linux Enterprise Micro 5.5 | ||
| SUSE | SUSE Linux Enterprise Real Time | SUSE Linux Enterprise Real Time 15 SP6 | ||
| SUSE | SUSE Linux Enterprise Server | SUSE Linux Enterprise Server 15 SP7 | ||
| SUSE | SUSE Linux Enterprise Server | SUSE Linux Enterprise Server 11 SP4 et SP4 LTSS EXTREME CORE | ||
| SUSE | SUSE Real Time Module | SUSE Real Time Module 15-SP7 |
| Title | Publication Time | Tags | |||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||||||||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "Public Cloud Module 15-SP7",
"product": {
"name": "Public Cloud Module",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "openSUSE Leap 15.5",
"product": {
"name": "openSUSE Leap",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Real Time 15 SP7",
"product": {
"name": "SUSE Linux Enterprise Real Time",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Server for SAP Applications 15 SP6",
"product": {
"name": "SUSE Linux Enterprise Server",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise High Performance Computing 12 SP5",
"product": {
"name": "SUSE Linux Enterprise High Performance Computing",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Server 12 SP5, SP5 LTSS et SP5 LTSS Extended Security",
"product": {
"name": "SUSE Linux Enterprise Server",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Live Patching 12-SP5",
"product": {
"name": "SUSE Linux Enterprise Live Patching",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Live Patching 15-SP6",
"product": {
"name": "SUSE Linux Enterprise Live Patching",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Server for SAP Applications 12 SP5",
"product": {
"name": "SUSE Linux Enterprise Server",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Live Patching 15-SP7",
"product": {
"name": "SUSE Linux Enterprise Live Patching",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Server for SAP Applications 15 SP5",
"product": {
"name": "SUSE Linux Enterprise Server",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "Public Cloud Module 15-SP6",
"product": {
"name": "Public Cloud Module",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "openSUSE Leap 15.6",
"product": {
"name": "openSUSE Leap",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Real Time 15 SP5",
"product": {
"name": "SUSE Linux Enterprise Real Time",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Server 15 SP6",
"product": {
"name": "SUSE Linux Enterprise Server",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Real Time 15 SP5 et SP5 LTSS",
"product": {
"name": "SUSE Linux Enterprise Server",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Real Time Module 15-SP6",
"product": {
"name": "SUSE Real Time Module",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Server for SAP Applications 15 SP7",
"product": {
"name": "SUSE Linux Enterprise Server",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise High Performance Computing 15 SP5, ESPOS 15 SP5 et LTSS 15 SP5",
"product": {
"name": "SUSE Linux Enterprise High Performance Computing",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Micro 5.5",
"product": {
"name": "SUSE Linux Enterprise Micro",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Real Time 15 SP6",
"product": {
"name": "SUSE Linux Enterprise Real Time",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Server 15 SP7",
"product": {
"name": "SUSE Linux Enterprise Server",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Server 11 SP4 et SP4 LTSS EXTREME CORE",
"product": {
"name": "SUSE Linux Enterprise Server",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Real Time Module 15-SP7",
"product": {
"name": "SUSE Real Time Module",
"vendor": {
"name": "SUSE",
"scada": false
}
}
}
],
"affected_systems_content": "",
"content": "## Solutions\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des correctifs (cf. section Documentation).",
"cves": [
{
"name": "CVE-2025-40064",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40064"
},
{
"name": "CVE-2025-40156",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40156"
},
{
"name": "CVE-2025-40055",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40055"
},
{
"name": "CVE-2025-40048",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40048"
},
{
"name": "CVE-2025-40121",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40121"
},
{
"name": "CVE-2025-40204",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40204"
},
{
"name": "CVE-2025-40171",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40171"
},
{
"name": "CVE-2022-50368",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50368"
},
{
"name": "CVE-2025-40139",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40139"
},
{
"name": "CVE-2025-39967",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39967"
},
{
"name": "CVE-2025-40107",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40107"
},
{
"name": "CVE-2025-40115",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40115"
},
{
"name": "CVE-2025-40198",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40198"
},
{
"name": "CVE-2025-40173",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40173"
},
{
"name": "CVE-2025-39944",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39944"
},
{
"name": "CVE-2025-40194",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40194"
},
{
"name": "CVE-2025-38436",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38436"
},
{
"name": "CVE-2025-40001",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40001"
},
{
"name": "CVE-2023-53431",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53431"
},
{
"name": "CVE-2025-39859",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39859"
},
{
"name": "CVE-2025-40172",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40172"
},
{
"name": "CVE-2022-50494",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50494"
},
{
"name": "CVE-2025-40188",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40188"
},
{
"name": "CVE-2025-40186",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40186"
},
{
"name": "CVE-2025-40086",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40086"
},
{
"name": "CVE-2025-40169",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40169"
},
{
"name": "CVE-2023-53369",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53369"
},
{
"name": "CVE-2023-53641",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53641"
},
{
"name": "CVE-2025-40070",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40070"
},
{
"name": "CVE-2025-40047",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40047"
},
{
"name": "CVE-2025-40205",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40205"
},
{
"name": "CVE-2022-50253",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50253"
},
{
"name": "CVE-2025-40075",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40075"
},
{
"name": "CVE-2025-40027",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40027"
},
{
"name": "CVE-2022-50280",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50280"
},
{
"name": "CVE-2025-40206",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40206"
},
{
"name": "CVE-2022-50578",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50578"
},
{
"name": "CVE-2025-39788",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39788"
},
{
"name": "CVE-2022-50551",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50551"
},
{
"name": "CVE-2025-40109",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40109"
},
{
"name": "CVE-2025-40038",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40038"
},
{
"name": "CVE-2025-39805",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39805"
},
{
"name": "CVE-2025-40176",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40176"
},
{
"name": "CVE-2025-40183",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40183"
},
{
"name": "CVE-2025-37916",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37916"
},
{
"name": "CVE-2025-38359",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38359"
},
{
"name": "CVE-2025-40074",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40074"
},
{
"name": "CVE-2025-40116",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40116"
},
{
"name": "CVE-2025-40127",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40127"
},
{
"name": "CVE-2025-40168",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40168"
},
{
"name": "CVE-2025-40120",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40120"
},
{
"name": "CVE-2025-40185",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40185"
},
{
"name": "CVE-2025-40098",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40098"
},
{
"name": "CVE-2025-40129",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40129"
},
{
"name": "CVE-2025-40040",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40040"
},
{
"name": "CVE-2025-40207",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40207"
},
{
"name": "CVE-2025-40118",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40118"
},
{
"name": "CVE-2025-40157",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40157"
},
{
"name": "CVE-2025-40021",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40021"
},
{
"name": "CVE-2025-40105",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40105"
},
{
"name": "CVE-2025-40083",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40083"
},
{
"name": "CVE-2025-40154",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40154"
},
{
"name": "CVE-2022-50364",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50364"
},
{
"name": "CVE-2025-40149",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40149"
},
{
"name": "CVE-2025-40164",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40164"
},
{
"name": "CVE-2023-53542",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53542"
},
{
"name": "CVE-2023-53229",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53229"
},
{
"name": "CVE-2025-40180",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40180"
},
{
"name": "CVE-2025-40200",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40200"
},
{
"name": "CVE-2025-40080",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40080"
},
{
"name": "CVE-2025-40111",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40111"
},
{
"name": "CVE-2025-40059",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40059"
},
{
"name": "CVE-2023-53676",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53676"
},
{
"name": "CVE-2022-50569",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50569"
},
{
"name": "CVE-2025-39822",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39822"
},
{
"name": "CVE-2025-40141",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40141"
},
{
"name": "CVE-2025-40110",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40110"
},
{
"name": "CVE-2025-39980",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39980"
},
{
"name": "CVE-2025-40030",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40030"
},
{
"name": "CVE-2025-39819",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39819"
},
{
"name": "CVE-2025-38360",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38360"
},
{
"name": "CVE-2022-50545",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50545"
},
{
"name": "CVE-2025-40140",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40140"
},
{
"name": "CVE-2025-21710",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21710"
},
{
"name": "CVE-2025-40159",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40159"
},
{
"name": "CVE-2023-53597",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53597"
},
{
"name": "CVE-2024-53093",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53093"
},
{
"name": "CVE-2025-38361",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38361"
}
],
"initial_release_date": "2025-12-26T00:00:00",
"last_revision_date": "2025-12-26T00:00:00",
"links": [],
"reference": "CERTFR-2025-AVI-1140",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2025-12-26T00:00:00.000000"
}
],
"risks": [
{
"description": "Non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur"
},
{
"description": "D\u00e9ni de service"
},
{
"description": "Contournement de la politique de s\u00e9curit\u00e9"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans le noyau Linux de SUSE. Certaines d\u0027entre elles permettent \u00e0 un attaquant de provoquer une atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es, un contournement de la politique de s\u00e9curit\u00e9 et un d\u00e9ni de service.",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans le noyau Linux de SUSE",
"vendor_advisories": [
{
"published_at": "2025-12-22",
"title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2025:4506-1",
"url": "https://www.suse.com/support/update/announcement/2025/suse-su-20254506-1"
},
{
"published_at": "2025-12-23",
"title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2025:4517-1",
"url": "https://www.suse.com/support/update/announcement/2025/suse-su-20254517-1"
},
{
"published_at": "2025-12-22",
"title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2025:4507-1",
"url": "https://www.suse.com/support/update/announcement/2025/suse-su-20254507-1"
},
{
"published_at": "2025-12-23",
"title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2025:4515-1",
"url": "https://www.suse.com/support/update/announcement/2025/suse-su-20254515-1"
},
{
"published_at": "2025-12-22",
"title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2025:4505-1",
"url": "https://www.suse.com/support/update/announcement/2025/suse-su-20254505-1"
},
{
"published_at": "2025-12-23",
"title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2025:4516-1",
"url": "https://www.suse.com/support/update/announcement/2025/suse-su-20254516-1"
},
{
"published_at": "2025-12-24",
"title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2025:4521-1",
"url": "https://www.suse.com/support/update/announcement/2025/suse-su-20254521-1"
}
]
}
GHSA-F2F6-PQF4-6HG9
Vulnerability from github – Published: 2025-11-12 12:30 – Updated: 2026-01-30 12:31In the Linux kernel, the following vulnerability has been resolved:
usbnet: Fix using smp_processor_id() in preemptible code warnings
Syzbot reported the following warning:
BUG: using smp_processor_id() in preemptible [00000000] code: dhcpcd/2879 caller is usbnet_skb_return+0x74/0x490 drivers/net/usb/usbnet.c:331 CPU: 1 UID: 0 PID: 2879 Comm: dhcpcd Not tainted 6.15.0-rc4-syzkaller-00098-g615dca38c2ea #0 PREEMPT(voluntary) Call Trace: __dump_stack lib/dump_stack.c:94 [inline] dump_stack_lvl+0x16c/0x1f0 lib/dump_stack.c:120 check_preemption_disabled+0xd0/0xe0 lib/smp_processor_id.c:49 usbnet_skb_return+0x74/0x490 drivers/net/usb/usbnet.c:331 usbnet_resume_rx+0x4b/0x170 drivers/net/usb/usbnet.c:708 usbnet_change_mtu+0x1be/0x220 drivers/net/usb/usbnet.c:417 __dev_set_mtu net/core/dev.c:9443 [inline] netif_set_mtu_ext+0x369/0x5c0 net/core/dev.c:9496 netif_set_mtu+0xb0/0x160 net/core/dev.c:9520 dev_set_mtu+0xae/0x170 net/core/dev_api.c:247 dev_ifsioc+0xa31/0x18d0 net/core/dev_ioctl.c:572 dev_ioctl+0x223/0x10e0 net/core/dev_ioctl.c:821 sock_do_ioctl+0x19d/0x280 net/socket.c:1204 sock_ioctl+0x42f/0x6a0 net/socket.c:1311 vfs_ioctl fs/ioctl.c:51 [inline] __do_sys_ioctl fs/ioctl.c:906 [inline] __se_sys_ioctl fs/ioctl.c:892 [inline] __x64_sys_ioctl+0x190/0x200 fs/ioctl.c:892 do_syscall_x64 arch/x86/entry/syscall_64.c:63 [inline] do_syscall_64+0xcd/0x260 arch/x86/entry/syscall_64.c:94 entry_SYSCALL_64_after_hwframe+0x77/0x7f
For historical and portability reasons, the netif_rx() is usually run in the softirq or interrupt context, this commit therefore add local_bh_disable/enable() protection in the usbnet_resume_rx().
{
"affected": [],
"aliases": [
"CVE-2025-40164"
],
"database_specific": {
"cwe_ids": [],
"github_reviewed": false,
"github_reviewed_at": null,
"nvd_published_at": "2025-11-12T11:15:46Z",
"severity": null
},
"details": "In the Linux kernel, the following vulnerability has been resolved:\n\nusbnet: Fix using smp_processor_id() in preemptible code warnings\n\nSyzbot reported the following warning:\n\nBUG: using smp_processor_id() in preemptible [00000000] code: dhcpcd/2879\ncaller is usbnet_skb_return+0x74/0x490 drivers/net/usb/usbnet.c:331\nCPU: 1 UID: 0 PID: 2879 Comm: dhcpcd Not tainted 6.15.0-rc4-syzkaller-00098-g615dca38c2ea #0 PREEMPT(voluntary)\nCall Trace:\n \u003cTASK\u003e\n __dump_stack lib/dump_stack.c:94 [inline]\n dump_stack_lvl+0x16c/0x1f0 lib/dump_stack.c:120\n check_preemption_disabled+0xd0/0xe0 lib/smp_processor_id.c:49\n usbnet_skb_return+0x74/0x490 drivers/net/usb/usbnet.c:331\n usbnet_resume_rx+0x4b/0x170 drivers/net/usb/usbnet.c:708\n usbnet_change_mtu+0x1be/0x220 drivers/net/usb/usbnet.c:417\n __dev_set_mtu net/core/dev.c:9443 [inline]\n netif_set_mtu_ext+0x369/0x5c0 net/core/dev.c:9496\n netif_set_mtu+0xb0/0x160 net/core/dev.c:9520\n dev_set_mtu+0xae/0x170 net/core/dev_api.c:247\n dev_ifsioc+0xa31/0x18d0 net/core/dev_ioctl.c:572\n dev_ioctl+0x223/0x10e0 net/core/dev_ioctl.c:821\n sock_do_ioctl+0x19d/0x280 net/socket.c:1204\n sock_ioctl+0x42f/0x6a0 net/socket.c:1311\n vfs_ioctl fs/ioctl.c:51 [inline]\n __do_sys_ioctl fs/ioctl.c:906 [inline]\n __se_sys_ioctl fs/ioctl.c:892 [inline]\n __x64_sys_ioctl+0x190/0x200 fs/ioctl.c:892\n do_syscall_x64 arch/x86/entry/syscall_64.c:63 [inline]\n do_syscall_64+0xcd/0x260 arch/x86/entry/syscall_64.c:94\n entry_SYSCALL_64_after_hwframe+0x77/0x7f\n\nFor historical and portability reasons, the netif_rx() is usually\nrun in the softirq or interrupt context, this commit therefore add\nlocal_bh_disable/enable() protection in the usbnet_resume_rx().",
"id": "GHSA-f2f6-pqf4-6hg9",
"modified": "2026-01-30T12:31:20Z",
"published": "2025-11-12T12:30:28Z",
"references": [
{
"type": "ADVISORY",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-40164"
},
{
"type": "WEB",
"url": "https://git.kernel.org/stable/c/0134c7bff14bd50314a4f92b182850ddfc38e255"
},
{
"type": "WEB",
"url": "https://git.kernel.org/stable/c/17fbad93879e87a334062882b45fa727ba1b3dd7"
},
{
"type": "WEB",
"url": "https://git.kernel.org/stable/c/327cd4b68b4398b6c24f10eb2b2533ffbfc10185"
},
{
"type": "WEB",
"url": "https://git.kernel.org/stable/c/d1944bab8e0c1511f0cbf364aa06547735bb0ddb"
}
],
"schema_version": "1.4.0",
"severity": []
}
OPENSUSE-SU-2025:20172-1
Vulnerability from csaf_opensuse - Published: 2025-12-19 17:38 - Updated: 2025-12-19 17:38Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Security update for the Linux Kernel",
"title": "Title of the patch"
},
{
"category": "description",
"text": "\nThe SUSE Linux Enterprise 16.0 kernel was updated to fix various security issues\n\nThe following security issues were fixed:\n\n- CVE-2022-50253: bpf: make sure skb-\u003elen != 0 when redirecting to a tunneling device (bsc#1249912).\n- CVE-2025-37916: pds_core: remove write-after-free of client_id (bsc#1243474).\n- CVE-2025-38084: mm/hugetlb: unshare page tables during VMA split, not before (bsc#1245431 bsc#1245498).\n- CVE-2025-38085: mm/hugetlb: fix huge_pmd_unshare() vs GUP-fast race (bsc#1245431 bsc#1245499).\n- CVE-2025-38321: smb: Log an error when close_all_cached_dirs fails (bsc#1246328).\n- CVE-2025-38728: smb3: fix for slab out of bounds on mount to ksmbd (bsc#1249256).\n- CVE-2025-39805: net: macb: fix unregister_netdev call order in macb_remove() (bsc#1249982).\n- CVE-2025-39819: fs/smb: Fix inconsistent refcnt update (bsc#1250176).\n- CVE-2025-39822: io_uring/kbuf: fix signedness in this_len calculation (bsc#1250034).\n- CVE-2025-39831: fbnic: Move phylink resume out of service_task and into open/close (bsc#1249977).\n- CVE-2025-39859: ptp: ocp: fix use-after-free bugs causing by ptp_ocp_watchdog (bsc#1250252).\n- CVE-2025-39897: net: xilinx: axienet: Add error handling for RX metadata pointer retrieval (bsc#1250746).\n- CVE-2025-39917: bpf: Fix out-of-bounds dynptr write in bpf_crypto_crypt (bsc#1250723).\n- CVE-2025-39944: octeontx2-pf: Fix use-after-free bugs in otx2_sync_tstamp() (bsc#1251120).\n- CVE-2025-39961: iommu/amd/pgtbl: Fix possible race while increase page table level (bsc#1251817).\n- CVE-2025-39980: nexthop: Forbid FDB status change while nexthop is in a group (bsc#1252063).\n- CVE-2025-39990: bpf: Check the helper function is valid in get_helper_proto (bsc#1252054).\n- CVE-2025-40001: scsi: mvsas: Fix use-after-free bugs in mvs_work_queue (bsc#1252303).\n- CVE-2025-40003: net: mscc: ocelot: Fix use-after-free caused by cyclic delayed work (bsc#1252301).\n- CVE-2025-40006: mm/hugetlb: fix folio is still mapped when deleted (bsc#1252342).\n- CVE-2025-40021: tracing: dynevent: Add a missing lockdown check on dynevent (bsc#1252681).\n- CVE-2025-40024: vhost: Take a reference on the task in struct vhost_task (bsc#1252686).\n- CVE-2025-40027: net/9p: fix double req put in p9_fd_cancelled (bsc#1252763).\n- CVE-2025-40031: tee: fix register_shm_helper() (bsc#1252779).\n- CVE-2025-40033: remoteproc: pru: Fix potential NULL pointer dereference in pru_rproc_set_ctable() (bsc#1252824).\n- CVE-2025-40038: KVM: SVM: Skip fastpath emulation on VM-Exit if next RIP isn\u0027t valid (bsc#1252817).\n- CVE-2025-40047: io_uring/waitid: always prune wait queue entry in io_waitid_wait() (bsc#1252790).\n- CVE-2025-40053: net: dlink: handle copy_thresh allocation failure (bsc#1252808).\n- CVE-2025-40055: ocfs2: fix double free in user_cluster_connect() (bsc#1252821).\n- CVE-2025-40059: coresight: Fix incorrect handling for return value of devm_kzalloc (bsc#1252809).\n- CVE-2025-40064: smc: Fix use-after-free in __pnet_find_base_ndev() (bsc#1252845).\n- CVE-2025-40070: pps: fix warning in pps_register_cdev when register device fail (bsc#1252836).\n- CVE-2025-40074: tcp: convert to dev_net_rcu() (bsc#1252794).\n- CVE-2025-40075: tcp_metrics: use dst_dev_net_rcu() (bsc#1252795).\n- CVE-2025-40081: perf: arm_spe: Prevent overflow in PERF_IDX2OFF() (bsc#1252776).\n- CVE-2025-40083: net/sched: sch_qfq: Fix null-deref in agg_dequeue (bsc#1252912).\n- CVE-2025-40086: drm/xe: Don\u0027t allow evicting of BOs in same VM in array of VM binds (bsc#1252923).\n- CVE-2025-40098: ALSA: hda: cs35l41: Fix NULL pointer dereference in cs35l41_get_acpi_mute_state() (bsc#1252917).\n- CVE-2025-40101: btrfs: fix memory leaks when rejecting a non SINGLE data profile without an RST (bsc#1252901).\n- CVE-2025-40102: KVM: arm64: Prevent access to vCPU events before init (bsc#1252919).\n- CVE-2025-40105: vfs: Don\u0027t leak disconnected dentries on umount (bsc#1252928).\n- CVE-2025-40133: mptcp: Call dst_release() in mptcp_active_enable() (bsc#1253328).\n- CVE-2025-40134: dm: fix NULL pointer dereference in __dm_suspend() (bsc#1253386).\n- CVE-2025-40135: ipv6: use RCU in ip6_xmit() (bsc#1253342).\n- CVE-2025-40139: smc: Use __sk_dst_get() and dst_dev_rcu() in in smc_clc_prfx_set() (bsc#1253409).\n- CVE-2025-40149: tls: Use __sk_dst_get() and dst_dev_rcu() in get_netdev_for_sock() (bsc#1253355).\n- CVE-2025-40153: mm: hugetlb: avoid soft lockup when mprotect to large memory area (bsc#1253408).\n- CVE-2025-40157: EDAC/i10nm: Skip DIMM enumeration on a disabled memory controller (bsc#1253423).\n- CVE-2025-40158: ipv6: use RCU in ip6_output() (bsc#1253402).\n- CVE-2025-40159: xsk: Harden userspace-supplied xdp_desc validation (bsc#1253403).\n- CVE-2025-40168: smc: Use __sk_dst_get() and dst_dev_rcu() in smc_clc_prfx_match() (bsc#1253427).\n- CVE-2025-40169: bpf: Reject negative offsets for ALU ops (bsc#1253416).\n- CVE-2025-40173: net/ip6_tunnel: Prevent perpetual tunnel growth (bsc#1253421).\n- CVE-2025-40175: idpf: cleanup remaining SKBs in PTP flows (bsc#1253426).\n- CVE-2025-40176: tls: wait for pending async decryptions if tls_strp_msg_hold fails (bsc#1253425).\n- CVE-2025-40178: pid: Add a judgment for ns null in pid_nr_ns (bsc#1253463).\n- CVE-2025-40185: ice: ice_adapter: release xa entry on adapter allocation failure (bsc#1253394).\n- CVE-2025-40201: kernel/sys.c: fix the racy usage of task_lock(tsk-\u003egroup_leader) in sys_prlimit64() paths (bsc#1253455).\n- CVE-2025-40203: listmount: don\u0027t call path_put() under namespace semaphore (bsc#1253457).\n\nThe following non security issues were fixed:\n\n- ACPI: scan: Update honor list for RPMI System MSI (stable-fixes).\n- ACPICA: Update dsmethod.c to get rid of unused variable warning (stable-fixes).\n- Disable CONFIG_CPU5_WDT The cpu5wdt driver doesn\u0027t implement a\n proper watchdog interface and has many code issues. It only handles\n obscure and obsolete hardware. Stop building and supporting this driver\n (jsc#PED-14062).\n- Fix \"drm/xe: Don\u0027t allow evicting of BOs in same VM in array of VM binds\" (bsc#1252923)\n- KVM: SVM: Delete IRTE link from previous vCPU before setting new IRTE (git-fixes).\n- KVM: SVM: Delete IRTE link from previous vCPU irrespective of new routing (git-fixes).\n- KVM: SVM: Mark VMCB_LBR dirty when MSR_IA32_DEBUGCTLMSR is updated (git-fixes).\n- KVM: s390: improve interrupt cpu for wakeup (bsc#1235463).\n- KVM: s390: kABI backport for \u0027last_sleep_cpu\u0027 (bsc#1252352).\n- KVM: x86/mmu: Return -EAGAIN if userspace deletes/moves memslot during prefault (git-fixes).\n- PCI/ERR: Update device error_state already after reset (stable-fixes).\n- PM: EM: Slightly reduce em_check_capacity_update() overhead (stable-fixes).\n- Revert \"net/mlx5e: Update and set Xon/Xoff upon MTU set\" (git-fixes).\n- Revert \"net/mlx5e: Update and set Xon/Xoff upon port speed set\" (git-fixes).\n- Update config files: enable zstd module decompression (jsc#PED-14115).\n- bpf/selftests: Fix test_tcpnotify_user (bsc#1253635).\n- btrfs: do not clear read-only when adding sprout device (bsc#1253238).\n- btrfs: do not update last_log_commit when logging inode due to a new name (git-fixes).\n- dm: fix queue start/stop imbalance under suspend/load/resume races (bsc#1253386)\n- drm/amd/display: Add AVI infoframe copy in copy_stream_update_to_stream (stable-fixes).\n- drm/amd/display: update color on atomic commit time (stable-fixes).\n- drm/amd/display: update dpp/disp clock from smu clock table (stable-fixes).\n- drm/radeon: delete radeon_fence_process in is_signaled, no deadlock (stable-fixes).\n- hwmon: (lenovo-ec-sensors) Update P8 supprt (stable-fixes).\n- media: amphion: Delete v4l2_fh synchronously in .release() (stable-fixes).\n- mount: handle NULL values in mnt_ns_release() (bsc#1254308)\n- net/smc: Remove validation of reserved bits in CLC Decline (bsc#1252357).\n- net: phy: move realtek PHY driver to its own subdirectory (jsc#PED-14353).\n- net: phy: realtek: add defines for shadowed c45 standard registers (jsc#PED-14353).\n- net: phy: realtek: add helper RTL822X_VND2_C22_REG (jsc#PED-14353).\n- net: phy: realtek: change order of calls in C22 read_status() (jsc#PED-14353).\n- net: phy: realtek: clear 1000Base-T link partner advertisement (jsc#PED-14353).\n- net: phy: realtek: improve mmd register access for internal PHY\u0027s (jsc#PED-14353).\n- net: phy: realtek: read duplex and gbit master from PHYSR register (jsc#PED-14353).\n- net: phy: realtek: switch from paged to MMD ops in rtl822x functions (jsc#PED-14353).\n- net: phy: realtek: use string choices helpers (jsc#PED-14353).\n- net: xilinx: axienet: Fix IRQ coalescing packet count overflow (bsc#1250746)\n- net: xilinx: axienet: Fix RX skb ring management in DMAengine mode (bsc#1250746)\n- net: xilinx: axienet: Fix Tx skb circular buffer occupancy check in dmaengine xmit (bsc#1250746)\n- nvmet-auth: update sc_c in host response (git-fixes bsc#1249397).\n- nvmet-auth: update sc_c in target host hash calculation (git-fixes).\n- perf list: Add IBM z17 event descriptions (jsc#PED-13611).\n- platform/x86:intel/pmc: Update Arrow Lake telemetry GUID (git-fixes).\n- powercap: intel_rapl: Add support for Panther Lake platform (jsc#PED-13949).\n- pwm: pca9685: Use bulk write to atomicially update registers (stable-fixes).\n- r8169: add PHY c45 ops for MDIO_MMD_VENDOR2 registers (jsc#PED-14353).\n- r8169: add support for Intel Killer E5000 (jsc#PED-14353).\n- r8169: add support for RTL8125BP rev.b (jsc#PED-14353).\n- r8169: add support for RTL8125D rev.b (jsc#PED-14353).\n- r8169: adjust version numbering for RTL8126 (jsc#PED-14353).\n- r8169: align RTL8125 EEE config with vendor driver (jsc#PED-14353).\n- r8169: align RTL8125/RTL8126 PHY config with vendor driver (jsc#PED-14353).\n- r8169: align RTL8126 EEE config with vendor driver (jsc#PED-14353).\n- r8169: align WAKE_PHY handling with r8125/r8126 vendor drivers (jsc#PED-14353).\n- r8169: avoid duplicated messages if loading firmware fails and switch to warn level (jsc#PED-14353).\n- r8169: don\u0027t take RTNL lock in rtl_task() (jsc#PED-14353).\n- r8169: enable EEE at 2.5G per default on RTL8125B (jsc#PED-14353).\n- r8169: enable RTL8168H/RTL8168EP/RTL8168FP ASPM support (jsc#PED-14353).\n- r8169: fix inconsistent indenting in rtl8169_get_eth_mac_stats (jsc#PED-14353).\n- r8169: implement additional ethtool stats ops (jsc#PED-14353).\n- r8169: improve __rtl8169_set_wol (jsc#PED-14353).\n- r8169: improve initialization of RSS registers on RTL8125/RTL8126 (jsc#PED-14353).\n- r8169: improve rtl_set_d3_pll_down (jsc#PED-14353).\n- r8169: increase max jumbo packet size on RTL8125/RTL8126 (jsc#PED-14353).\n- r8169: remove leftover locks after reverted change (jsc#PED-14353).\n- r8169: remove original workaround for RTL8125 broken rx issue (jsc#PED-14353).\n- r8169: remove rtl_dash_loop_wait_high/low (jsc#PED-14353).\n- r8169: remove support for chip version 11 (jsc#PED-14353).\n- r8169: remove unused flag RTL_FLAG_TASK_RESET_NO_QUEUE_WAKE (jsc#PED-14353).\n- r8169: replace custom flag with disable_work() et al (jsc#PED-14353).\n- r8169: switch away from deprecated pcim_iomap_table (jsc#PED-14353).\n- r8169: use helper r8169_mod_reg8_cond to simplify rtl_jumbo_config (jsc#PED-14353).\n- ring-buffer: Update pages_touched to reflect persistent buffer content (git-fixes).\n- s390/mm: Fix __ptep_rdp() inline assembly (bsc#1253643).\n- sched/fair: Get rid of sched_domains_curr_level hack for tl-\u003ecpumask() (bsc#1246843).\n- sched/fair: Have SD_SERIALIZE affect newidle balancing (bsc#1248792).\n- sched/fair: Proportional newidle balance (bsc#1248792).\n- sched/fair: Proportional newidle balance -KABI (bsc#1248792).\n- sched/fair: Revert max_newidle_lb_cost bump (bsc#1248792).\n- sched/fair: Skip sched_balance_running cmpxchg when balance is not due (bsc#1248792).\n- sched/fair: Small cleanup to sched_balance_newidle() (bsc#1248792).\n- sched/fair: Small cleanup to update_newidle_cost() (bsc#1248792).\n- scsi: lpfc: Add capability to register Platform Name ID to fabric (bsc#1254119).\n- scsi: lpfc: Allow support for BB credit recovery in point-to-point topology (bsc#1254119).\n- scsi: lpfc: Ensure unregistration of rpis for received PLOGIs (bsc#1254119).\n- scsi: lpfc: Fix leaked ndlp krefs when in point-to-point topology (bsc#1254119).\n- scsi: lpfc: Fix reusing an ndlp that is marked NLP_DROPPED during FLOGI (bsc#1254119).\n- scsi: lpfc: Modify kref handling for Fabric Controller ndlps (bsc#1254119).\n- scsi: lpfc: Remove redundant NULL ptr assignment in lpfc_els_free_iocb() (bsc#1254119).\n- scsi: lpfc: Revise discovery related function headers and comments (bsc#1254119).\n- scsi: lpfc: Update lpfc version to 14.4.0.12 (bsc#1254119).\n- scsi: lpfc: Update various NPIV diagnostic log messaging (bsc#1254119).\n- selftests/run_kselftest.sh: Add `--skip` argument option (bsc#1254221).\n- smpboot: introduce SDTL_INIT() helper to tidy sched topology setup (bsc#1246843).\n- soc/tegra: fuse: speedo-tegra210: Update speedo IDs (git-fixes).\n- spi: tegra210-quad: Check hardware status on timeout (bsc#1253155)\n- spi: tegra210-quad: Fix timeout handling (bsc#1253155)\n- spi: tegra210-quad: Refactor error handling into helper functions (bsc#1253155)\n- spi: tegra210-quad: Update dummy sequence configuration (git-fixes)\n- tcp_bpf: Call sk_msg_free() when tcp_bpf_send_verdict() fails to allocate psock-\u003ecork (bsc#1250705).\n- wifi: ath11k: Add quirk entries for Thinkpad T14s Gen3 AMD (bsc#1254181).\n- wifi: mt76: do not add wcid entries to sta poll list during MCU reset (bsc#1254315).\n- wifi: mt76: introduce mt792x_config_mac_addr_list routine (bsc#1254315).\n- wifi: mt76: mt7925: Fix logical vs bitwise typo (bsc#1254315).\n- wifi: mt76: mt7925: Remove unnecessary if-check (bsc#1254315).\n- wifi: mt76: mt7925: Simplify HIF suspend handling to avoid suspend fail (bsc#1254315).\n- wifi: mt76: mt7925: add EHT control support based on the CLC data (bsc#1254315).\n- wifi: mt76: mt7925: add handler to hif suspend/resume event (bsc#1254315).\n- wifi: mt76: mt7925: add pci restore for hibernate (bsc#1254315).\n- wifi: mt76: mt7925: config the dwell time by firmware (bsc#1254315).\n- wifi: mt76: mt7925: extend MCU support for testmode (bsc#1254315).\n- wifi: mt76: mt7925: fix CLC command timeout when suspend/resume (bsc#1254315).\n- wifi: mt76: mt7925: fix missing hdr_trans_tlv command for broadcast wtbl (bsc#1254315).\n- wifi: mt76: mt7925: fix the unfinished command of regd_notifier before suspend (bsc#1254315).\n- wifi: mt76: mt7925: refine the txpower initialization flow (bsc#1254315).\n- wifi: mt76: mt7925: replace zero-length array with flexible-array member (bsc#1254315).\n- wifi: mt76: mt7925: update the channel usage when the regd domain changed (bsc#1254315).\n- wifi: mt76: mt7925e: fix too long of wifi resume time (bsc#1254315).\n- x86/smpboot: avoid SMT domain attach/destroy if SMT is not enabled (bsc#1246843).\n- x86/smpboot: moves x86_topology to static initialize and truncate (bsc#1246843).\n- x86/smpboot: remove redundant CONFIG_SCHED_SMT (bsc#1246843).\n",
"title": "Description of the patch"
},
{
"category": "details",
"text": "openSUSE-Leap-16.0-113",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/opensuse-su-2025_20172-1.json"
},
{
"category": "self",
"summary": "SUSE Bug 1235463",
"url": "https://bugzilla.suse.com/1235463"
},
{
"category": "self",
"summary": "SUSE Bug 1243474",
"url": "https://bugzilla.suse.com/1243474"
},
{
"category": "self",
"summary": "SUSE Bug 1245193",
"url": "https://bugzilla.suse.com/1245193"
},
{
"category": "self",
"summary": "SUSE Bug 1245431",
"url": "https://bugzilla.suse.com/1245431"
},
{
"category": "self",
"summary": "SUSE Bug 1245498",
"url": "https://bugzilla.suse.com/1245498"
},
{
"category": "self",
"summary": "SUSE Bug 1245499",
"url": "https://bugzilla.suse.com/1245499"
},
{
"category": "self",
"summary": "SUSE Bug 1246328",
"url": "https://bugzilla.suse.com/1246328"
},
{
"category": "self",
"summary": "SUSE Bug 1246843",
"url": "https://bugzilla.suse.com/1246843"
},
{
"category": "self",
"summary": "SUSE Bug 1247500",
"url": "https://bugzilla.suse.com/1247500"
},
{
"category": "self",
"summary": "SUSE Bug 1248792",
"url": "https://bugzilla.suse.com/1248792"
},
{
"category": "self",
"summary": "SUSE Bug 1249256",
"url": "https://bugzilla.suse.com/1249256"
},
{
"category": "self",
"summary": "SUSE Bug 1249397",
"url": "https://bugzilla.suse.com/1249397"
},
{
"category": "self",
"summary": "SUSE Bug 1249912",
"url": "https://bugzilla.suse.com/1249912"
},
{
"category": "self",
"summary": "SUSE Bug 1249977",
"url": "https://bugzilla.suse.com/1249977"
},
{
"category": "self",
"summary": "SUSE Bug 1249982",
"url": "https://bugzilla.suse.com/1249982"
},
{
"category": "self",
"summary": "SUSE Bug 1250034",
"url": "https://bugzilla.suse.com/1250034"
},
{
"category": "self",
"summary": "SUSE Bug 1250176",
"url": "https://bugzilla.suse.com/1250176"
},
{
"category": "self",
"summary": "SUSE Bug 1250237",
"url": "https://bugzilla.suse.com/1250237"
},
{
"category": "self",
"summary": "SUSE Bug 1250252",
"url": "https://bugzilla.suse.com/1250252"
},
{
"category": "self",
"summary": "SUSE Bug 1250705",
"url": "https://bugzilla.suse.com/1250705"
},
{
"category": "self",
"summary": "SUSE Bug 1250723",
"url": "https://bugzilla.suse.com/1250723"
},
{
"category": "self",
"summary": "SUSE Bug 1250746",
"url": "https://bugzilla.suse.com/1250746"
},
{
"category": "self",
"summary": "SUSE Bug 1251120",
"url": "https://bugzilla.suse.com/1251120"
},
{
"category": "self",
"summary": "SUSE Bug 1251817",
"url": "https://bugzilla.suse.com/1251817"
},
{
"category": "self",
"summary": "SUSE Bug 1252054",
"url": "https://bugzilla.suse.com/1252054"
},
{
"category": "self",
"summary": "SUSE Bug 1252063",
"url": "https://bugzilla.suse.com/1252063"
},
{
"category": "self",
"summary": "SUSE Bug 1252301",
"url": "https://bugzilla.suse.com/1252301"
},
{
"category": "self",
"summary": "SUSE Bug 1252303",
"url": "https://bugzilla.suse.com/1252303"
},
{
"category": "self",
"summary": "SUSE Bug 1252342",
"url": "https://bugzilla.suse.com/1252342"
},
{
"category": "self",
"summary": "SUSE Bug 1252352",
"url": "https://bugzilla.suse.com/1252352"
},
{
"category": "self",
"summary": "SUSE Bug 1252357",
"url": "https://bugzilla.suse.com/1252357"
},
{
"category": "self",
"summary": "SUSE Bug 1252681",
"url": "https://bugzilla.suse.com/1252681"
},
{
"category": "self",
"summary": "SUSE Bug 1252686",
"url": "https://bugzilla.suse.com/1252686"
},
{
"category": "self",
"summary": "SUSE Bug 1252763",
"url": "https://bugzilla.suse.com/1252763"
},
{
"category": "self",
"summary": "SUSE Bug 1252776",
"url": "https://bugzilla.suse.com/1252776"
},
{
"category": "self",
"summary": "SUSE Bug 1252779",
"url": "https://bugzilla.suse.com/1252779"
},
{
"category": "self",
"summary": "SUSE Bug 1252790",
"url": "https://bugzilla.suse.com/1252790"
},
{
"category": "self",
"summary": "SUSE Bug 1252794",
"url": "https://bugzilla.suse.com/1252794"
},
{
"category": "self",
"summary": "SUSE Bug 1252795",
"url": "https://bugzilla.suse.com/1252795"
},
{
"category": "self",
"summary": "SUSE Bug 1252808",
"url": "https://bugzilla.suse.com/1252808"
},
{
"category": "self",
"summary": "SUSE Bug 1252809",
"url": "https://bugzilla.suse.com/1252809"
},
{
"category": "self",
"summary": "SUSE Bug 1252817",
"url": "https://bugzilla.suse.com/1252817"
},
{
"category": "self",
"summary": "SUSE Bug 1252821",
"url": "https://bugzilla.suse.com/1252821"
},
{
"category": "self",
"summary": "SUSE Bug 1252824",
"url": "https://bugzilla.suse.com/1252824"
},
{
"category": "self",
"summary": "SUSE Bug 1252836",
"url": "https://bugzilla.suse.com/1252836"
},
{
"category": "self",
"summary": "SUSE Bug 1252845",
"url": "https://bugzilla.suse.com/1252845"
},
{
"category": "self",
"summary": "SUSE Bug 1252901",
"url": "https://bugzilla.suse.com/1252901"
},
{
"category": "self",
"summary": "SUSE Bug 1252912",
"url": "https://bugzilla.suse.com/1252912"
},
{
"category": "self",
"summary": "SUSE Bug 1252917",
"url": "https://bugzilla.suse.com/1252917"
},
{
"category": "self",
"summary": "SUSE Bug 1252919",
"url": "https://bugzilla.suse.com/1252919"
},
{
"category": "self",
"summary": "SUSE Bug 1252923",
"url": "https://bugzilla.suse.com/1252923"
},
{
"category": "self",
"summary": "SUSE Bug 1252928",
"url": "https://bugzilla.suse.com/1252928"
},
{
"category": "self",
"summary": "SUSE Bug 1253018",
"url": "https://bugzilla.suse.com/1253018"
},
{
"category": "self",
"summary": "SUSE Bug 1253155",
"url": "https://bugzilla.suse.com/1253155"
},
{
"category": "self",
"summary": "SUSE Bug 1253176",
"url": "https://bugzilla.suse.com/1253176"
},
{
"category": "self",
"summary": "SUSE Bug 1253238",
"url": "https://bugzilla.suse.com/1253238"
},
{
"category": "self",
"summary": "SUSE Bug 1253275",
"url": "https://bugzilla.suse.com/1253275"
},
{
"category": "self",
"summary": "SUSE Bug 1253318",
"url": "https://bugzilla.suse.com/1253318"
},
{
"category": "self",
"summary": "SUSE Bug 1253324",
"url": "https://bugzilla.suse.com/1253324"
},
{
"category": "self",
"summary": "SUSE Bug 1253328",
"url": "https://bugzilla.suse.com/1253328"
},
{
"category": "self",
"summary": "SUSE Bug 1253330",
"url": "https://bugzilla.suse.com/1253330"
},
{
"category": "self",
"summary": "SUSE Bug 1253342",
"url": "https://bugzilla.suse.com/1253342"
},
{
"category": "self",
"summary": "SUSE Bug 1253348",
"url": "https://bugzilla.suse.com/1253348"
},
{
"category": "self",
"summary": "SUSE Bug 1253349",
"url": "https://bugzilla.suse.com/1253349"
},
{
"category": "self",
"summary": "SUSE Bug 1253352",
"url": "https://bugzilla.suse.com/1253352"
},
{
"category": "self",
"summary": "SUSE Bug 1253355",
"url": "https://bugzilla.suse.com/1253355"
},
{
"category": "self",
"summary": "SUSE Bug 1253360",
"url": "https://bugzilla.suse.com/1253360"
},
{
"category": "self",
"summary": "SUSE Bug 1253362",
"url": "https://bugzilla.suse.com/1253362"
},
{
"category": "self",
"summary": "SUSE Bug 1253363",
"url": "https://bugzilla.suse.com/1253363"
},
{
"category": "self",
"summary": "SUSE Bug 1253367",
"url": "https://bugzilla.suse.com/1253367"
},
{
"category": "self",
"summary": "SUSE Bug 1253369",
"url": "https://bugzilla.suse.com/1253369"
},
{
"category": "self",
"summary": "SUSE Bug 1253386",
"url": "https://bugzilla.suse.com/1253386"
},
{
"category": "self",
"summary": "SUSE Bug 1253394",
"url": "https://bugzilla.suse.com/1253394"
},
{
"category": "self",
"summary": "SUSE Bug 1253395",
"url": "https://bugzilla.suse.com/1253395"
},
{
"category": "self",
"summary": "SUSE Bug 1253402",
"url": "https://bugzilla.suse.com/1253402"
},
{
"category": "self",
"summary": "SUSE Bug 1253403",
"url": "https://bugzilla.suse.com/1253403"
},
{
"category": "self",
"summary": "SUSE Bug 1253405",
"url": "https://bugzilla.suse.com/1253405"
},
{
"category": "self",
"summary": "SUSE Bug 1253407",
"url": "https://bugzilla.suse.com/1253407"
},
{
"category": "self",
"summary": "SUSE Bug 1253408",
"url": "https://bugzilla.suse.com/1253408"
},
{
"category": "self",
"summary": "SUSE Bug 1253409",
"url": "https://bugzilla.suse.com/1253409"
},
{
"category": "self",
"summary": "SUSE Bug 1253410",
"url": "https://bugzilla.suse.com/1253410"
},
{
"category": "self",
"summary": "SUSE Bug 1253412",
"url": "https://bugzilla.suse.com/1253412"
},
{
"category": "self",
"summary": "SUSE Bug 1253416",
"url": "https://bugzilla.suse.com/1253416"
},
{
"category": "self",
"summary": "SUSE Bug 1253421",
"url": "https://bugzilla.suse.com/1253421"
},
{
"category": "self",
"summary": "SUSE Bug 1253422",
"url": "https://bugzilla.suse.com/1253422"
},
{
"category": "self",
"summary": "SUSE Bug 1253423",
"url": "https://bugzilla.suse.com/1253423"
},
{
"category": "self",
"summary": "SUSE Bug 1253424",
"url": "https://bugzilla.suse.com/1253424"
},
{
"category": "self",
"summary": "SUSE Bug 1253425",
"url": "https://bugzilla.suse.com/1253425"
},
{
"category": "self",
"summary": "SUSE Bug 1253426",
"url": "https://bugzilla.suse.com/1253426"
},
{
"category": "self",
"summary": "SUSE Bug 1253427",
"url": "https://bugzilla.suse.com/1253427"
},
{
"category": "self",
"summary": "SUSE Bug 1253428",
"url": "https://bugzilla.suse.com/1253428"
},
{
"category": "self",
"summary": "SUSE Bug 1253431",
"url": "https://bugzilla.suse.com/1253431"
},
{
"category": "self",
"summary": "SUSE Bug 1253433",
"url": "https://bugzilla.suse.com/1253433"
},
{
"category": "self",
"summary": "SUSE Bug 1253436",
"url": "https://bugzilla.suse.com/1253436"
},
{
"category": "self",
"summary": "SUSE Bug 1253438",
"url": "https://bugzilla.suse.com/1253438"
},
{
"category": "self",
"summary": "SUSE Bug 1253440",
"url": "https://bugzilla.suse.com/1253440"
},
{
"category": "self",
"summary": "SUSE Bug 1253441",
"url": "https://bugzilla.suse.com/1253441"
},
{
"category": "self",
"summary": "SUSE Bug 1253443",
"url": "https://bugzilla.suse.com/1253443"
},
{
"category": "self",
"summary": "SUSE Bug 1253445",
"url": "https://bugzilla.suse.com/1253445"
},
{
"category": "self",
"summary": "SUSE Bug 1253448",
"url": "https://bugzilla.suse.com/1253448"
},
{
"category": "self",
"summary": "SUSE Bug 1253449",
"url": "https://bugzilla.suse.com/1253449"
},
{
"category": "self",
"summary": "SUSE Bug 1253450",
"url": "https://bugzilla.suse.com/1253450"
},
{
"category": "self",
"summary": "SUSE Bug 1253451",
"url": "https://bugzilla.suse.com/1253451"
},
{
"category": "self",
"summary": "SUSE Bug 1253453",
"url": "https://bugzilla.suse.com/1253453"
},
{
"category": "self",
"summary": "SUSE Bug 1253455",
"url": "https://bugzilla.suse.com/1253455"
},
{
"category": "self",
"summary": "SUSE Bug 1253456",
"url": "https://bugzilla.suse.com/1253456"
},
{
"category": "self",
"summary": "SUSE Bug 1253457",
"url": "https://bugzilla.suse.com/1253457"
},
{
"category": "self",
"summary": "SUSE Bug 1253463",
"url": "https://bugzilla.suse.com/1253463"
},
{
"category": "self",
"summary": "SUSE Bug 1253472",
"url": "https://bugzilla.suse.com/1253472"
},
{
"category": "self",
"summary": "SUSE Bug 1253622",
"url": "https://bugzilla.suse.com/1253622"
},
{
"category": "self",
"summary": "SUSE Bug 1253624",
"url": "https://bugzilla.suse.com/1253624"
},
{
"category": "self",
"summary": "SUSE Bug 1253635",
"url": "https://bugzilla.suse.com/1253635"
},
{
"category": "self",
"summary": "SUSE Bug 1253643",
"url": "https://bugzilla.suse.com/1253643"
},
{
"category": "self",
"summary": "SUSE Bug 1253647",
"url": "https://bugzilla.suse.com/1253647"
},
{
"category": "self",
"summary": "SUSE Bug 1254119",
"url": "https://bugzilla.suse.com/1254119"
},
{
"category": "self",
"summary": "SUSE Bug 1254181",
"url": "https://bugzilla.suse.com/1254181"
},
{
"category": "self",
"summary": "SUSE Bug 1254221",
"url": "https://bugzilla.suse.com/1254221"
},
{
"category": "self",
"summary": "SUSE Bug 1254308",
"url": "https://bugzilla.suse.com/1254308"
},
{
"category": "self",
"summary": "SUSE Bug 1254315",
"url": "https://bugzilla.suse.com/1254315"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-50253 page",
"url": "https://www.suse.com/security/cve/CVE-2022-50253/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-37916 page",
"url": "https://www.suse.com/security/cve/CVE-2025-37916/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-38084 page",
"url": "https://www.suse.com/security/cve/CVE-2025-38084/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-38085 page",
"url": "https://www.suse.com/security/cve/CVE-2025-38085/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-38321 page",
"url": "https://www.suse.com/security/cve/CVE-2025-38321/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-38728 page",
"url": "https://www.suse.com/security/cve/CVE-2025-38728/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-39805 page",
"url": "https://www.suse.com/security/cve/CVE-2025-39805/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-39819 page",
"url": "https://www.suse.com/security/cve/CVE-2025-39819/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-39822 page",
"url": "https://www.suse.com/security/cve/CVE-2025-39822/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-39831 page",
"url": "https://www.suse.com/security/cve/CVE-2025-39831/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-39859 page",
"url": "https://www.suse.com/security/cve/CVE-2025-39859/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-39897 page",
"url": "https://www.suse.com/security/cve/CVE-2025-39897/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-39917 page",
"url": "https://www.suse.com/security/cve/CVE-2025-39917/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-39944 page",
"url": "https://www.suse.com/security/cve/CVE-2025-39944/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-39961 page",
"url": "https://www.suse.com/security/cve/CVE-2025-39961/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-39980 page",
"url": "https://www.suse.com/security/cve/CVE-2025-39980/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-39990 page",
"url": "https://www.suse.com/security/cve/CVE-2025-39990/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40001 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40001/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40003 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40003/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40006 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40006/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40021 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40021/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40024 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40024/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40027 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40027/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40031 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40031/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40033 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40033/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40038 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40038/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40047 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40047/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40053 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40053/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40055 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40055/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40059 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40059/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40064 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40064/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40070 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40070/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40074 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40074/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40075 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40075/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40081 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40081/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40083 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40083/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40086 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40086/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40098 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40098/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40101 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40101/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40102 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40102/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40105 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40105/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40107 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40107/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40109 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40109/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40110 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40110/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40111 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40111/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40115 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40115/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40116 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40116/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40118 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40118/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40120 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40120/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40121 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40121/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40127 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40127/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40129 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40129/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40132 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40132/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40133 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40133/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40134 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40134/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40135 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40135/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40139 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40139/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40140 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40140/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40141 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40141/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40142 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40142/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40149 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40149/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40153 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40153/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40154 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40154/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40156 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40156/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40157 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40157/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40158 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40158/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40159 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40159/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40161 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40161/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40162 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40162/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40164 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40164/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40165 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40165/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40166 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40166/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40168 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40168/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40169 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40169/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40171 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40171/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40172 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40172/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40173 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40173/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40175 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40175/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40176 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40176/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40177 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40177/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40178 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40178/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40180 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40180/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40183 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40183/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40185 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40185/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40186 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40186/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40187 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40187/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40188 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40188/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40192 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40192/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40194 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40194/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40196 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40196/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40197 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40197/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40198 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40198/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40200 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40200/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40201 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40201/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40202 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40202/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40203 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40203/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40204 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40204/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40205 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40205/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40206 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40206/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40207 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40207/"
}
],
"title": "Security update for the Linux Kernel",
"tracking": {
"current_release_date": "2025-12-19T17:38:16Z",
"generator": {
"date": "2025-12-19T17:38:16Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "openSUSE-SU-2025:20172-1",
"initial_release_date": "2025-12-19T17:38:16Z",
"revision_history": [
{
"date": "2025-12-19T17:38:16Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "cluster-md-kmp-64kb-6.12.0-160000.8.1.aarch64",
"product": {
"name": "cluster-md-kmp-64kb-6.12.0-160000.8.1.aarch64",
"product_id": "cluster-md-kmp-64kb-6.12.0-160000.8.1.aarch64"
}
},
{
"category": "product_version",
"name": "cluster-md-kmp-default-6.12.0-160000.8.1.aarch64",
"product": {
"name": "cluster-md-kmp-default-6.12.0-160000.8.1.aarch64",
"product_id": "cluster-md-kmp-default-6.12.0-160000.8.1.aarch64"
}
},
{
"category": "product_version",
"name": "cluster-md-kmp-rt-6.12.0-160000.8.1.aarch64",
"product": {
"name": "cluster-md-kmp-rt-6.12.0-160000.8.1.aarch64",
"product_id": "cluster-md-kmp-rt-6.12.0-160000.8.1.aarch64"
}
},
{
"category": "product_version",
"name": "dlm-kmp-64kb-6.12.0-160000.8.1.aarch64",
"product": {
"name": "dlm-kmp-64kb-6.12.0-160000.8.1.aarch64",
"product_id": "dlm-kmp-64kb-6.12.0-160000.8.1.aarch64"
}
},
{
"category": "product_version",
"name": "dlm-kmp-default-6.12.0-160000.8.1.aarch64",
"product": {
"name": "dlm-kmp-default-6.12.0-160000.8.1.aarch64",
"product_id": "dlm-kmp-default-6.12.0-160000.8.1.aarch64"
}
},
{
"category": "product_version",
"name": "dlm-kmp-rt-6.12.0-160000.8.1.aarch64",
"product": {
"name": "dlm-kmp-rt-6.12.0-160000.8.1.aarch64",
"product_id": "dlm-kmp-rt-6.12.0-160000.8.1.aarch64"
}
},
{
"category": "product_version",
"name": "dtb-allwinner-6.12.0-160000.8.1.aarch64",
"product": {
"name": "dtb-allwinner-6.12.0-160000.8.1.aarch64",
"product_id": "dtb-allwinner-6.12.0-160000.8.1.aarch64"
}
},
{
"category": "product_version",
"name": "dtb-altera-6.12.0-160000.8.1.aarch64",
"product": {
"name": "dtb-altera-6.12.0-160000.8.1.aarch64",
"product_id": "dtb-altera-6.12.0-160000.8.1.aarch64"
}
},
{
"category": "product_version",
"name": "dtb-amazon-6.12.0-160000.8.1.aarch64",
"product": {
"name": "dtb-amazon-6.12.0-160000.8.1.aarch64",
"product_id": "dtb-amazon-6.12.0-160000.8.1.aarch64"
}
},
{
"category": "product_version",
"name": "dtb-amd-6.12.0-160000.8.1.aarch64",
"product": {
"name": "dtb-amd-6.12.0-160000.8.1.aarch64",
"product_id": "dtb-amd-6.12.0-160000.8.1.aarch64"
}
},
{
"category": "product_version",
"name": "dtb-amlogic-6.12.0-160000.8.1.aarch64",
"product": {
"name": "dtb-amlogic-6.12.0-160000.8.1.aarch64",
"product_id": "dtb-amlogic-6.12.0-160000.8.1.aarch64"
}
},
{
"category": "product_version",
"name": "dtb-apm-6.12.0-160000.8.1.aarch64",
"product": {
"name": "dtb-apm-6.12.0-160000.8.1.aarch64",
"product_id": "dtb-apm-6.12.0-160000.8.1.aarch64"
}
},
{
"category": "product_version",
"name": "dtb-apple-6.12.0-160000.8.1.aarch64",
"product": {
"name": "dtb-apple-6.12.0-160000.8.1.aarch64",
"product_id": "dtb-apple-6.12.0-160000.8.1.aarch64"
}
},
{
"category": "product_version",
"name": "dtb-arm-6.12.0-160000.8.1.aarch64",
"product": {
"name": "dtb-arm-6.12.0-160000.8.1.aarch64",
"product_id": "dtb-arm-6.12.0-160000.8.1.aarch64"
}
},
{
"category": "product_version",
"name": "dtb-broadcom-6.12.0-160000.8.1.aarch64",
"product": {
"name": "dtb-broadcom-6.12.0-160000.8.1.aarch64",
"product_id": "dtb-broadcom-6.12.0-160000.8.1.aarch64"
}
},
{
"category": "product_version",
"name": "dtb-cavium-6.12.0-160000.8.1.aarch64",
"product": {
"name": "dtb-cavium-6.12.0-160000.8.1.aarch64",
"product_id": "dtb-cavium-6.12.0-160000.8.1.aarch64"
}
},
{
"category": "product_version",
"name": "dtb-exynos-6.12.0-160000.8.1.aarch64",
"product": {
"name": "dtb-exynos-6.12.0-160000.8.1.aarch64",
"product_id": "dtb-exynos-6.12.0-160000.8.1.aarch64"
}
},
{
"category": "product_version",
"name": "dtb-freescale-6.12.0-160000.8.1.aarch64",
"product": {
"name": "dtb-freescale-6.12.0-160000.8.1.aarch64",
"product_id": "dtb-freescale-6.12.0-160000.8.1.aarch64"
}
},
{
"category": "product_version",
"name": "dtb-hisilicon-6.12.0-160000.8.1.aarch64",
"product": {
"name": "dtb-hisilicon-6.12.0-160000.8.1.aarch64",
"product_id": "dtb-hisilicon-6.12.0-160000.8.1.aarch64"
}
},
{
"category": "product_version",
"name": "dtb-lg-6.12.0-160000.8.1.aarch64",
"product": {
"name": "dtb-lg-6.12.0-160000.8.1.aarch64",
"product_id": "dtb-lg-6.12.0-160000.8.1.aarch64"
}
},
{
"category": "product_version",
"name": "dtb-marvell-6.12.0-160000.8.1.aarch64",
"product": {
"name": "dtb-marvell-6.12.0-160000.8.1.aarch64",
"product_id": "dtb-marvell-6.12.0-160000.8.1.aarch64"
}
},
{
"category": "product_version",
"name": "dtb-mediatek-6.12.0-160000.8.1.aarch64",
"product": {
"name": "dtb-mediatek-6.12.0-160000.8.1.aarch64",
"product_id": "dtb-mediatek-6.12.0-160000.8.1.aarch64"
}
},
{
"category": "product_version",
"name": "dtb-nvidia-6.12.0-160000.8.1.aarch64",
"product": {
"name": "dtb-nvidia-6.12.0-160000.8.1.aarch64",
"product_id": "dtb-nvidia-6.12.0-160000.8.1.aarch64"
}
},
{
"category": "product_version",
"name": "dtb-qcom-6.12.0-160000.8.1.aarch64",
"product": {
"name": "dtb-qcom-6.12.0-160000.8.1.aarch64",
"product_id": "dtb-qcom-6.12.0-160000.8.1.aarch64"
}
},
{
"category": "product_version",
"name": "dtb-renesas-6.12.0-160000.8.1.aarch64",
"product": {
"name": "dtb-renesas-6.12.0-160000.8.1.aarch64",
"product_id": "dtb-renesas-6.12.0-160000.8.1.aarch64"
}
},
{
"category": "product_version",
"name": "dtb-rockchip-6.12.0-160000.8.1.aarch64",
"product": {
"name": "dtb-rockchip-6.12.0-160000.8.1.aarch64",
"product_id": "dtb-rockchip-6.12.0-160000.8.1.aarch64"
}
},
{
"category": "product_version",
"name": "dtb-socionext-6.12.0-160000.8.1.aarch64",
"product": {
"name": "dtb-socionext-6.12.0-160000.8.1.aarch64",
"product_id": "dtb-socionext-6.12.0-160000.8.1.aarch64"
}
},
{
"category": "product_version",
"name": "dtb-sprd-6.12.0-160000.8.1.aarch64",
"product": {
"name": "dtb-sprd-6.12.0-160000.8.1.aarch64",
"product_id": "dtb-sprd-6.12.0-160000.8.1.aarch64"
}
},
{
"category": "product_version",
"name": "dtb-xilinx-6.12.0-160000.8.1.aarch64",
"product": {
"name": "dtb-xilinx-6.12.0-160000.8.1.aarch64",
"product_id": "dtb-xilinx-6.12.0-160000.8.1.aarch64"
}
},
{
"category": "product_version",
"name": "gfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"product": {
"name": "gfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"product_id": "gfs2-kmp-64kb-6.12.0-160000.8.1.aarch64"
}
},
{
"category": "product_version",
"name": "gfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"product": {
"name": "gfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"product_id": "gfs2-kmp-default-6.12.0-160000.8.1.aarch64"
}
},
{
"category": "product_version",
"name": "gfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"product": {
"name": "gfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"product_id": "gfs2-kmp-rt-6.12.0-160000.8.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-64kb-6.12.0-160000.8.1.aarch64",
"product": {
"name": "kernel-64kb-6.12.0-160000.8.1.aarch64",
"product_id": "kernel-64kb-6.12.0-160000.8.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"product": {
"name": "kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"product_id": "kernel-64kb-devel-6.12.0-160000.8.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"product": {
"name": "kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"product_id": "kernel-64kb-extra-6.12.0-160000.8.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-64kb-optional-6.12.0-160000.8.1.aarch64",
"product": {
"name": "kernel-64kb-optional-6.12.0-160000.8.1.aarch64",
"product_id": "kernel-64kb-optional-6.12.0-160000.8.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-default-6.12.0-160000.8.1.aarch64",
"product": {
"name": "kernel-default-6.12.0-160000.8.1.aarch64",
"product_id": "kernel-default-6.12.0-160000.8.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"product": {
"name": "kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"product_id": "kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-default-devel-6.12.0-160000.8.1.aarch64",
"product": {
"name": "kernel-default-devel-6.12.0-160000.8.1.aarch64",
"product_id": "kernel-default-devel-6.12.0-160000.8.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-default-extra-6.12.0-160000.8.1.aarch64",
"product": {
"name": "kernel-default-extra-6.12.0-160000.8.1.aarch64",
"product_id": "kernel-default-extra-6.12.0-160000.8.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-default-optional-6.12.0-160000.8.1.aarch64",
"product": {
"name": "kernel-default-optional-6.12.0-160000.8.1.aarch64",
"product_id": "kernel-default-optional-6.12.0-160000.8.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"product": {
"name": "kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"product_id": "kernel-kvmsmall-6.12.0-160000.8.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"product": {
"name": "kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"product_id": "kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-obs-build-6.12.0-160000.8.1.aarch64",
"product": {
"name": "kernel-obs-build-6.12.0-160000.8.1.aarch64",
"product_id": "kernel-obs-build-6.12.0-160000.8.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"product": {
"name": "kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"product_id": "kernel-obs-qa-6.12.0-160000.8.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-rt-6.12.0-160000.8.1.aarch64",
"product": {
"name": "kernel-rt-6.12.0-160000.8.1.aarch64",
"product_id": "kernel-rt-6.12.0-160000.8.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"product": {
"name": "kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"product_id": "kernel-rt-devel-6.12.0-160000.8.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-rt-extra-6.12.0-160000.8.1.aarch64",
"product": {
"name": "kernel-rt-extra-6.12.0-160000.8.1.aarch64",
"product_id": "kernel-rt-extra-6.12.0-160000.8.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-rt-optional-6.12.0-160000.8.1.aarch64",
"product": {
"name": "kernel-rt-optional-6.12.0-160000.8.1.aarch64",
"product_id": "kernel-rt-optional-6.12.0-160000.8.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-syms-6.12.0-160000.8.1.aarch64",
"product": {
"name": "kernel-syms-6.12.0-160000.8.1.aarch64",
"product_id": "kernel-syms-6.12.0-160000.8.1.aarch64"
}
},
{
"category": "product_version",
"name": "kselftests-kmp-64kb-6.12.0-160000.8.1.aarch64",
"product": {
"name": "kselftests-kmp-64kb-6.12.0-160000.8.1.aarch64",
"product_id": "kselftests-kmp-64kb-6.12.0-160000.8.1.aarch64"
}
},
{
"category": "product_version",
"name": "kselftests-kmp-default-6.12.0-160000.8.1.aarch64",
"product": {
"name": "kselftests-kmp-default-6.12.0-160000.8.1.aarch64",
"product_id": "kselftests-kmp-default-6.12.0-160000.8.1.aarch64"
}
},
{
"category": "product_version",
"name": "kselftests-kmp-rt-6.12.0-160000.8.1.aarch64",
"product": {
"name": "kselftests-kmp-rt-6.12.0-160000.8.1.aarch64",
"product_id": "kselftests-kmp-rt-6.12.0-160000.8.1.aarch64"
}
},
{
"category": "product_version",
"name": "ocfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"product": {
"name": "ocfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"product_id": "ocfs2-kmp-64kb-6.12.0-160000.8.1.aarch64"
}
},
{
"category": "product_version",
"name": "ocfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"product": {
"name": "ocfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"product_id": "ocfs2-kmp-default-6.12.0-160000.8.1.aarch64"
}
},
{
"category": "product_version",
"name": "ocfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"product": {
"name": "ocfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"product_id": "ocfs2-kmp-rt-6.12.0-160000.8.1.aarch64"
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-devel-6.12.0-160000.8.1.noarch",
"product": {
"name": "kernel-devel-6.12.0-160000.8.1.noarch",
"product_id": "kernel-devel-6.12.0-160000.8.1.noarch"
}
},
{
"category": "product_version",
"name": "kernel-docs-6.12.0-160000.8.1.noarch",
"product": {
"name": "kernel-docs-6.12.0-160000.8.1.noarch",
"product_id": "kernel-docs-6.12.0-160000.8.1.noarch"
}
},
{
"category": "product_version",
"name": "kernel-docs-html-6.12.0-160000.8.1.noarch",
"product": {
"name": "kernel-docs-html-6.12.0-160000.8.1.noarch",
"product_id": "kernel-docs-html-6.12.0-160000.8.1.noarch"
}
},
{
"category": "product_version",
"name": "kernel-macros-6.12.0-160000.8.1.noarch",
"product": {
"name": "kernel-macros-6.12.0-160000.8.1.noarch",
"product_id": "kernel-macros-6.12.0-160000.8.1.noarch"
}
},
{
"category": "product_version",
"name": "kernel-source-6.12.0-160000.8.1.noarch",
"product": {
"name": "kernel-source-6.12.0-160000.8.1.noarch",
"product_id": "kernel-source-6.12.0-160000.8.1.noarch"
}
},
{
"category": "product_version",
"name": "kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"product": {
"name": "kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"product_id": "kernel-source-vanilla-6.12.0-160000.8.1.noarch"
}
}
],
"category": "architecture",
"name": "noarch"
},
{
"branches": [
{
"category": "product_version",
"name": "cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"product": {
"name": "cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"product_id": "cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le"
}
},
{
"category": "product_version",
"name": "dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"product": {
"name": "dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"product_id": "dlm-kmp-default-6.12.0-160000.8.1.ppc64le"
}
},
{
"category": "product_version",
"name": "gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"product": {
"name": "gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"product_id": "gfs2-kmp-default-6.12.0-160000.8.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-default-6.12.0-160000.8.1.ppc64le",
"product": {
"name": "kernel-default-6.12.0-160000.8.1.ppc64le",
"product_id": "kernel-default-6.12.0-160000.8.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"product": {
"name": "kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"product_id": "kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"product": {
"name": "kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"product_id": "kernel-default-devel-6.12.0-160000.8.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"product": {
"name": "kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"product_id": "kernel-default-extra-6.12.0-160000.8.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-default-optional-6.12.0-160000.8.1.ppc64le",
"product": {
"name": "kernel-default-optional-6.12.0-160000.8.1.ppc64le",
"product_id": "kernel-default-optional-6.12.0-160000.8.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"product": {
"name": "kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"product_id": "kernel-kvmsmall-6.12.0-160000.8.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"product": {
"name": "kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"product_id": "kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-obs-build-6.12.0-160000.8.1.ppc64le",
"product": {
"name": "kernel-obs-build-6.12.0-160000.8.1.ppc64le",
"product_id": "kernel-obs-build-6.12.0-160000.8.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"product": {
"name": "kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"product_id": "kernel-obs-qa-6.12.0-160000.8.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-syms-6.12.0-160000.8.1.ppc64le",
"product": {
"name": "kernel-syms-6.12.0-160000.8.1.ppc64le",
"product_id": "kernel-syms-6.12.0-160000.8.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kselftests-kmp-default-6.12.0-160000.8.1.ppc64le",
"product": {
"name": "kselftests-kmp-default-6.12.0-160000.8.1.ppc64le",
"product_id": "kselftests-kmp-default-6.12.0-160000.8.1.ppc64le"
}
},
{
"category": "product_version",
"name": "ocfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"product": {
"name": "ocfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"product_id": "ocfs2-kmp-default-6.12.0-160000.8.1.ppc64le"
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"product": {
"name": "cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"product_id": "cluster-md-kmp-default-6.12.0-160000.8.1.s390x"
}
},
{
"category": "product_version",
"name": "dlm-kmp-default-6.12.0-160000.8.1.s390x",
"product": {
"name": "dlm-kmp-default-6.12.0-160000.8.1.s390x",
"product_id": "dlm-kmp-default-6.12.0-160000.8.1.s390x"
}
},
{
"category": "product_version",
"name": "gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"product": {
"name": "gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"product_id": "gfs2-kmp-default-6.12.0-160000.8.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-default-6.12.0-160000.8.1.s390x",
"product": {
"name": "kernel-default-6.12.0-160000.8.1.s390x",
"product_id": "kernel-default-6.12.0-160000.8.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-default-devel-6.12.0-160000.8.1.s390x",
"product": {
"name": "kernel-default-devel-6.12.0-160000.8.1.s390x",
"product_id": "kernel-default-devel-6.12.0-160000.8.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-default-extra-6.12.0-160000.8.1.s390x",
"product": {
"name": "kernel-default-extra-6.12.0-160000.8.1.s390x",
"product_id": "kernel-default-extra-6.12.0-160000.8.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-default-optional-6.12.0-160000.8.1.s390x",
"product": {
"name": "kernel-default-optional-6.12.0-160000.8.1.s390x",
"product_id": "kernel-default-optional-6.12.0-160000.8.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-obs-build-6.12.0-160000.8.1.s390x",
"product": {
"name": "kernel-obs-build-6.12.0-160000.8.1.s390x",
"product_id": "kernel-obs-build-6.12.0-160000.8.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-obs-qa-6.12.0-160000.8.1.s390x",
"product": {
"name": "kernel-obs-qa-6.12.0-160000.8.1.s390x",
"product_id": "kernel-obs-qa-6.12.0-160000.8.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-syms-6.12.0-160000.8.1.s390x",
"product": {
"name": "kernel-syms-6.12.0-160000.8.1.s390x",
"product_id": "kernel-syms-6.12.0-160000.8.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"product": {
"name": "kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"product_id": "kernel-zfcpdump-6.12.0-160000.8.1.s390x"
}
},
{
"category": "product_version",
"name": "kselftests-kmp-default-6.12.0-160000.8.1.s390x",
"product": {
"name": "kselftests-kmp-default-6.12.0-160000.8.1.s390x",
"product_id": "kselftests-kmp-default-6.12.0-160000.8.1.s390x"
}
},
{
"category": "product_version",
"name": "ocfs2-kmp-default-6.12.0-160000.8.1.s390x",
"product": {
"name": "ocfs2-kmp-default-6.12.0-160000.8.1.s390x",
"product_id": "ocfs2-kmp-default-6.12.0-160000.8.1.s390x"
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"product": {
"name": "cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"product_id": "cluster-md-kmp-default-6.12.0-160000.8.1.x86_64"
}
},
{
"category": "product_version",
"name": "cluster-md-kmp-rt-6.12.0-160000.8.1.x86_64",
"product": {
"name": "cluster-md-kmp-rt-6.12.0-160000.8.1.x86_64",
"product_id": "cluster-md-kmp-rt-6.12.0-160000.8.1.x86_64"
}
},
{
"category": "product_version",
"name": "dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"product": {
"name": "dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"product_id": "dlm-kmp-default-6.12.0-160000.8.1.x86_64"
}
},
{
"category": "product_version",
"name": "dlm-kmp-rt-6.12.0-160000.8.1.x86_64",
"product": {
"name": "dlm-kmp-rt-6.12.0-160000.8.1.x86_64",
"product_id": "dlm-kmp-rt-6.12.0-160000.8.1.x86_64"
}
},
{
"category": "product_version",
"name": "gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"product": {
"name": "gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"product_id": "gfs2-kmp-default-6.12.0-160000.8.1.x86_64"
}
},
{
"category": "product_version",
"name": "gfs2-kmp-rt-6.12.0-160000.8.1.x86_64",
"product": {
"name": "gfs2-kmp-rt-6.12.0-160000.8.1.x86_64",
"product_id": "gfs2-kmp-rt-6.12.0-160000.8.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-default-6.12.0-160000.8.1.x86_64",
"product": {
"name": "kernel-default-6.12.0-160000.8.1.x86_64",
"product_id": "kernel-default-6.12.0-160000.8.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"product": {
"name": "kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"product_id": "kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-default-devel-6.12.0-160000.8.1.x86_64",
"product": {
"name": "kernel-default-devel-6.12.0-160000.8.1.x86_64",
"product_id": "kernel-default-devel-6.12.0-160000.8.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-default-extra-6.12.0-160000.8.1.x86_64",
"product": {
"name": "kernel-default-extra-6.12.0-160000.8.1.x86_64",
"product_id": "kernel-default-extra-6.12.0-160000.8.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-default-optional-6.12.0-160000.8.1.x86_64",
"product": {
"name": "kernel-default-optional-6.12.0-160000.8.1.x86_64",
"product_id": "kernel-default-optional-6.12.0-160000.8.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"product": {
"name": "kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"product_id": "kernel-default-vdso-6.12.0-160000.8.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"product": {
"name": "kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"product_id": "kernel-kvmsmall-6.12.0-160000.8.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"product": {
"name": "kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"product_id": "kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"product": {
"name": "kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"product_id": "kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-obs-build-6.12.0-160000.8.1.x86_64",
"product": {
"name": "kernel-obs-build-6.12.0-160000.8.1.x86_64",
"product_id": "kernel-obs-build-6.12.0-160000.8.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"product": {
"name": "kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"product_id": "kernel-obs-qa-6.12.0-160000.8.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-rt-6.12.0-160000.8.1.x86_64",
"product": {
"name": "kernel-rt-6.12.0-160000.8.1.x86_64",
"product_id": "kernel-rt-6.12.0-160000.8.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"product": {
"name": "kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"product_id": "kernel-rt-devel-6.12.0-160000.8.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-rt-extra-6.12.0-160000.8.1.x86_64",
"product": {
"name": "kernel-rt-extra-6.12.0-160000.8.1.x86_64",
"product_id": "kernel-rt-extra-6.12.0-160000.8.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-rt-optional-6.12.0-160000.8.1.x86_64",
"product": {
"name": "kernel-rt-optional-6.12.0-160000.8.1.x86_64",
"product_id": "kernel-rt-optional-6.12.0-160000.8.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-rt-vdso-6.12.0-160000.8.1.x86_64",
"product": {
"name": "kernel-rt-vdso-6.12.0-160000.8.1.x86_64",
"product_id": "kernel-rt-vdso-6.12.0-160000.8.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-syms-6.12.0-160000.8.1.x86_64",
"product": {
"name": "kernel-syms-6.12.0-160000.8.1.x86_64",
"product_id": "kernel-syms-6.12.0-160000.8.1.x86_64"
}
},
{
"category": "product_version",
"name": "kselftests-kmp-default-6.12.0-160000.8.1.x86_64",
"product": {
"name": "kselftests-kmp-default-6.12.0-160000.8.1.x86_64",
"product_id": "kselftests-kmp-default-6.12.0-160000.8.1.x86_64"
}
},
{
"category": "product_version",
"name": "kselftests-kmp-rt-6.12.0-160000.8.1.x86_64",
"product": {
"name": "kselftests-kmp-rt-6.12.0-160000.8.1.x86_64",
"product_id": "kselftests-kmp-rt-6.12.0-160000.8.1.x86_64"
}
},
{
"category": "product_version",
"name": "ocfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"product": {
"name": "ocfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"product_id": "ocfs2-kmp-default-6.12.0-160000.8.1.x86_64"
}
},
{
"category": "product_version",
"name": "ocfs2-kmp-rt-6.12.0-160000.8.1.x86_64",
"product": {
"name": "ocfs2-kmp-rt-6.12.0-160000.8.1.x86_64",
"product_id": "ocfs2-kmp-rt-6.12.0-160000.8.1.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "openSUSE Leap 16.0",
"product": {
"name": "openSUSE Leap 16.0",
"product_id": "openSUSE Leap 16.0"
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "cluster-md-kmp-64kb-6.12.0-160000.8.1.aarch64 as component of openSUSE Leap 16.0",
"product_id": "openSUSE Leap 16.0:cluster-md-kmp-64kb-6.12.0-160000.8.1.aarch64"
},
"product_reference": "cluster-md-kmp-64kb-6.12.0-160000.8.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cluster-md-kmp-default-6.12.0-160000.8.1.aarch64 as component of openSUSE Leap 16.0",
"product_id": "openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.aarch64"
},
"product_reference": "cluster-md-kmp-default-6.12.0-160000.8.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le as component of openSUSE Leap 16.0",
"product_id": "openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le"
},
"product_reference": "cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"relates_to_product_reference": "openSUSE Leap 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cluster-md-kmp-default-6.12.0-160000.8.1.s390x as component of openSUSE Leap 16.0",
"product_id": "openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x"
},
"product_reference": "cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"relates_to_product_reference": "openSUSE Leap 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cluster-md-kmp-default-6.12.0-160000.8.1.x86_64 as component of openSUSE Leap 16.0",
"product_id": "openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64"
},
"product_reference": "cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cluster-md-kmp-rt-6.12.0-160000.8.1.aarch64 as component of openSUSE Leap 16.0",
"product_id": "openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.aarch64"
},
"product_reference": "cluster-md-kmp-rt-6.12.0-160000.8.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cluster-md-kmp-rt-6.12.0-160000.8.1.x86_64 as component of openSUSE Leap 16.0",
"product_id": "openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.x86_64"
},
"product_reference": "cluster-md-kmp-rt-6.12.0-160000.8.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dlm-kmp-64kb-6.12.0-160000.8.1.aarch64 as component of openSUSE Leap 16.0",
"product_id": "openSUSE Leap 16.0:dlm-kmp-64kb-6.12.0-160000.8.1.aarch64"
},
"product_reference": "dlm-kmp-64kb-6.12.0-160000.8.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dlm-kmp-default-6.12.0-160000.8.1.aarch64 as component of openSUSE Leap 16.0",
"product_id": "openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.aarch64"
},
"product_reference": "dlm-kmp-default-6.12.0-160000.8.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dlm-kmp-default-6.12.0-160000.8.1.ppc64le as component of openSUSE Leap 16.0",
"product_id": "openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le"
},
"product_reference": "dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"relates_to_product_reference": "openSUSE Leap 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dlm-kmp-default-6.12.0-160000.8.1.s390x as component of openSUSE Leap 16.0",
"product_id": "openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x"
},
"product_reference": "dlm-kmp-default-6.12.0-160000.8.1.s390x",
"relates_to_product_reference": "openSUSE Leap 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dlm-kmp-default-6.12.0-160000.8.1.x86_64 as component of openSUSE Leap 16.0",
"product_id": "openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64"
},
"product_reference": "dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dlm-kmp-rt-6.12.0-160000.8.1.aarch64 as component of openSUSE Leap 16.0",
"product_id": "openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.aarch64"
},
"product_reference": "dlm-kmp-rt-6.12.0-160000.8.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dlm-kmp-rt-6.12.0-160000.8.1.x86_64 as component of openSUSE Leap 16.0",
"product_id": "openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.x86_64"
},
"product_reference": "dlm-kmp-rt-6.12.0-160000.8.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dtb-allwinner-6.12.0-160000.8.1.aarch64 as component of openSUSE Leap 16.0",
"product_id": "openSUSE Leap 16.0:dtb-allwinner-6.12.0-160000.8.1.aarch64"
},
"product_reference": "dtb-allwinner-6.12.0-160000.8.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dtb-altera-6.12.0-160000.8.1.aarch64 as component of openSUSE Leap 16.0",
"product_id": "openSUSE Leap 16.0:dtb-altera-6.12.0-160000.8.1.aarch64"
},
"product_reference": "dtb-altera-6.12.0-160000.8.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dtb-amazon-6.12.0-160000.8.1.aarch64 as component of openSUSE Leap 16.0",
"product_id": "openSUSE Leap 16.0:dtb-amazon-6.12.0-160000.8.1.aarch64"
},
"product_reference": "dtb-amazon-6.12.0-160000.8.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dtb-amd-6.12.0-160000.8.1.aarch64 as component of openSUSE Leap 16.0",
"product_id": "openSUSE Leap 16.0:dtb-amd-6.12.0-160000.8.1.aarch64"
},
"product_reference": "dtb-amd-6.12.0-160000.8.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dtb-amlogic-6.12.0-160000.8.1.aarch64 as component of openSUSE Leap 16.0",
"product_id": "openSUSE Leap 16.0:dtb-amlogic-6.12.0-160000.8.1.aarch64"
},
"product_reference": "dtb-amlogic-6.12.0-160000.8.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dtb-apm-6.12.0-160000.8.1.aarch64 as component of openSUSE Leap 16.0",
"product_id": "openSUSE Leap 16.0:dtb-apm-6.12.0-160000.8.1.aarch64"
},
"product_reference": "dtb-apm-6.12.0-160000.8.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dtb-apple-6.12.0-160000.8.1.aarch64 as component of openSUSE Leap 16.0",
"product_id": "openSUSE Leap 16.0:dtb-apple-6.12.0-160000.8.1.aarch64"
},
"product_reference": "dtb-apple-6.12.0-160000.8.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dtb-arm-6.12.0-160000.8.1.aarch64 as component of openSUSE Leap 16.0",
"product_id": "openSUSE Leap 16.0:dtb-arm-6.12.0-160000.8.1.aarch64"
},
"product_reference": "dtb-arm-6.12.0-160000.8.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dtb-broadcom-6.12.0-160000.8.1.aarch64 as component of openSUSE Leap 16.0",
"product_id": "openSUSE Leap 16.0:dtb-broadcom-6.12.0-160000.8.1.aarch64"
},
"product_reference": "dtb-broadcom-6.12.0-160000.8.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dtb-cavium-6.12.0-160000.8.1.aarch64 as component of openSUSE Leap 16.0",
"product_id": "openSUSE Leap 16.0:dtb-cavium-6.12.0-160000.8.1.aarch64"
},
"product_reference": "dtb-cavium-6.12.0-160000.8.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dtb-exynos-6.12.0-160000.8.1.aarch64 as component of openSUSE Leap 16.0",
"product_id": "openSUSE Leap 16.0:dtb-exynos-6.12.0-160000.8.1.aarch64"
},
"product_reference": "dtb-exynos-6.12.0-160000.8.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dtb-freescale-6.12.0-160000.8.1.aarch64 as component of openSUSE Leap 16.0",
"product_id": "openSUSE Leap 16.0:dtb-freescale-6.12.0-160000.8.1.aarch64"
},
"product_reference": "dtb-freescale-6.12.0-160000.8.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dtb-hisilicon-6.12.0-160000.8.1.aarch64 as component of openSUSE Leap 16.0",
"product_id": "openSUSE Leap 16.0:dtb-hisilicon-6.12.0-160000.8.1.aarch64"
},
"product_reference": "dtb-hisilicon-6.12.0-160000.8.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dtb-lg-6.12.0-160000.8.1.aarch64 as component of openSUSE Leap 16.0",
"product_id": "openSUSE Leap 16.0:dtb-lg-6.12.0-160000.8.1.aarch64"
},
"product_reference": "dtb-lg-6.12.0-160000.8.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dtb-marvell-6.12.0-160000.8.1.aarch64 as component of openSUSE Leap 16.0",
"product_id": "openSUSE Leap 16.0:dtb-marvell-6.12.0-160000.8.1.aarch64"
},
"product_reference": "dtb-marvell-6.12.0-160000.8.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dtb-mediatek-6.12.0-160000.8.1.aarch64 as component of openSUSE Leap 16.0",
"product_id": "openSUSE Leap 16.0:dtb-mediatek-6.12.0-160000.8.1.aarch64"
},
"product_reference": "dtb-mediatek-6.12.0-160000.8.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dtb-nvidia-6.12.0-160000.8.1.aarch64 as component of openSUSE Leap 16.0",
"product_id": "openSUSE Leap 16.0:dtb-nvidia-6.12.0-160000.8.1.aarch64"
},
"product_reference": "dtb-nvidia-6.12.0-160000.8.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dtb-qcom-6.12.0-160000.8.1.aarch64 as component of openSUSE Leap 16.0",
"product_id": "openSUSE Leap 16.0:dtb-qcom-6.12.0-160000.8.1.aarch64"
},
"product_reference": "dtb-qcom-6.12.0-160000.8.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dtb-renesas-6.12.0-160000.8.1.aarch64 as component of openSUSE Leap 16.0",
"product_id": "openSUSE Leap 16.0:dtb-renesas-6.12.0-160000.8.1.aarch64"
},
"product_reference": "dtb-renesas-6.12.0-160000.8.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dtb-rockchip-6.12.0-160000.8.1.aarch64 as component of openSUSE Leap 16.0",
"product_id": "openSUSE Leap 16.0:dtb-rockchip-6.12.0-160000.8.1.aarch64"
},
"product_reference": "dtb-rockchip-6.12.0-160000.8.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dtb-socionext-6.12.0-160000.8.1.aarch64 as component of openSUSE Leap 16.0",
"product_id": "openSUSE Leap 16.0:dtb-socionext-6.12.0-160000.8.1.aarch64"
},
"product_reference": "dtb-socionext-6.12.0-160000.8.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dtb-sprd-6.12.0-160000.8.1.aarch64 as component of openSUSE Leap 16.0",
"product_id": "openSUSE Leap 16.0:dtb-sprd-6.12.0-160000.8.1.aarch64"
},
"product_reference": "dtb-sprd-6.12.0-160000.8.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dtb-xilinx-6.12.0-160000.8.1.aarch64 as component of openSUSE Leap 16.0",
"product_id": "openSUSE Leap 16.0:dtb-xilinx-6.12.0-160000.8.1.aarch64"
},
"product_reference": "dtb-xilinx-6.12.0-160000.8.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gfs2-kmp-64kb-6.12.0-160000.8.1.aarch64 as component of openSUSE Leap 16.0",
"product_id": "openSUSE Leap 16.0:gfs2-kmp-64kb-6.12.0-160000.8.1.aarch64"
},
"product_reference": "gfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gfs2-kmp-default-6.12.0-160000.8.1.aarch64 as component of openSUSE Leap 16.0",
"product_id": "openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.aarch64"
},
"product_reference": "gfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gfs2-kmp-default-6.12.0-160000.8.1.ppc64le as component of openSUSE Leap 16.0",
"product_id": "openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le"
},
"product_reference": "gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"relates_to_product_reference": "openSUSE Leap 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gfs2-kmp-default-6.12.0-160000.8.1.s390x as component of openSUSE Leap 16.0",
"product_id": "openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x"
},
"product_reference": "gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"relates_to_product_reference": "openSUSE Leap 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gfs2-kmp-default-6.12.0-160000.8.1.x86_64 as component of openSUSE Leap 16.0",
"product_id": "openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64"
},
"product_reference": "gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gfs2-kmp-rt-6.12.0-160000.8.1.aarch64 as component of openSUSE Leap 16.0",
"product_id": "openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.aarch64"
},
"product_reference": "gfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gfs2-kmp-rt-6.12.0-160000.8.1.x86_64 as component of openSUSE Leap 16.0",
"product_id": "openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.x86_64"
},
"product_reference": "gfs2-kmp-rt-6.12.0-160000.8.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-64kb-6.12.0-160000.8.1.aarch64 as component of openSUSE Leap 16.0",
"product_id": "openSUSE Leap 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64"
},
"product_reference": "kernel-64kb-6.12.0-160000.8.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-64kb-devel-6.12.0-160000.8.1.aarch64 as component of openSUSE Leap 16.0",
"product_id": "openSUSE Leap 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64"
},
"product_reference": "kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-64kb-extra-6.12.0-160000.8.1.aarch64 as component of openSUSE Leap 16.0",
"product_id": "openSUSE Leap 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64"
},
"product_reference": "kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-64kb-optional-6.12.0-160000.8.1.aarch64 as component of openSUSE Leap 16.0",
"product_id": "openSUSE Leap 16.0:kernel-64kb-optional-6.12.0-160000.8.1.aarch64"
},
"product_reference": "kernel-64kb-optional-6.12.0-160000.8.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-6.12.0-160000.8.1.aarch64 as component of openSUSE Leap 16.0",
"product_id": "openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.aarch64"
},
"product_reference": "kernel-default-6.12.0-160000.8.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-6.12.0-160000.8.1.ppc64le as component of openSUSE Leap 16.0",
"product_id": "openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.ppc64le"
},
"product_reference": "kernel-default-6.12.0-160000.8.1.ppc64le",
"relates_to_product_reference": "openSUSE Leap 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-6.12.0-160000.8.1.s390x as component of openSUSE Leap 16.0",
"product_id": "openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.s390x"
},
"product_reference": "kernel-default-6.12.0-160000.8.1.s390x",
"relates_to_product_reference": "openSUSE Leap 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-6.12.0-160000.8.1.x86_64 as component of openSUSE Leap 16.0",
"product_id": "openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.x86_64"
},
"product_reference": "kernel-default-6.12.0-160000.8.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64 as component of openSUSE Leap 16.0",
"product_id": "openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64"
},
"product_reference": "kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"relates_to_product_reference": "openSUSE Leap 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le as component of openSUSE Leap 16.0",
"product_id": "openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le"
},
"product_reference": "kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"relates_to_product_reference": "openSUSE Leap 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64 as component of openSUSE Leap 16.0",
"product_id": "openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64"
},
"product_reference": "kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"relates_to_product_reference": "openSUSE Leap 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-devel-6.12.0-160000.8.1.aarch64 as component of openSUSE Leap 16.0",
"product_id": "openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64"
},
"product_reference": "kernel-default-devel-6.12.0-160000.8.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-devel-6.12.0-160000.8.1.ppc64le as component of openSUSE Leap 16.0",
"product_id": "openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le"
},
"product_reference": "kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"relates_to_product_reference": "openSUSE Leap 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-devel-6.12.0-160000.8.1.s390x as component of openSUSE Leap 16.0",
"product_id": "openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x"
},
"product_reference": "kernel-default-devel-6.12.0-160000.8.1.s390x",
"relates_to_product_reference": "openSUSE Leap 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-devel-6.12.0-160000.8.1.x86_64 as component of openSUSE Leap 16.0",
"product_id": "openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64"
},
"product_reference": "kernel-default-devel-6.12.0-160000.8.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-extra-6.12.0-160000.8.1.aarch64 as component of openSUSE Leap 16.0",
"product_id": "openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64"
},
"product_reference": "kernel-default-extra-6.12.0-160000.8.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-extra-6.12.0-160000.8.1.ppc64le as component of openSUSE Leap 16.0",
"product_id": "openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le"
},
"product_reference": "kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"relates_to_product_reference": "openSUSE Leap 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-extra-6.12.0-160000.8.1.s390x as component of openSUSE Leap 16.0",
"product_id": "openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x"
},
"product_reference": "kernel-default-extra-6.12.0-160000.8.1.s390x",
"relates_to_product_reference": "openSUSE Leap 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-extra-6.12.0-160000.8.1.x86_64 as component of openSUSE Leap 16.0",
"product_id": "openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64"
},
"product_reference": "kernel-default-extra-6.12.0-160000.8.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-optional-6.12.0-160000.8.1.aarch64 as component of openSUSE Leap 16.0",
"product_id": "openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.aarch64"
},
"product_reference": "kernel-default-optional-6.12.0-160000.8.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-optional-6.12.0-160000.8.1.ppc64le as component of openSUSE Leap 16.0",
"product_id": "openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.ppc64le"
},
"product_reference": "kernel-default-optional-6.12.0-160000.8.1.ppc64le",
"relates_to_product_reference": "openSUSE Leap 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-optional-6.12.0-160000.8.1.s390x as component of openSUSE Leap 16.0",
"product_id": "openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.s390x"
},
"product_reference": "kernel-default-optional-6.12.0-160000.8.1.s390x",
"relates_to_product_reference": "openSUSE Leap 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-optional-6.12.0-160000.8.1.x86_64 as component of openSUSE Leap 16.0",
"product_id": "openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.x86_64"
},
"product_reference": "kernel-default-optional-6.12.0-160000.8.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-vdso-6.12.0-160000.8.1.x86_64 as component of openSUSE Leap 16.0",
"product_id": "openSUSE Leap 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64"
},
"product_reference": "kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-6.12.0-160000.8.1.noarch as component of openSUSE Leap 16.0",
"product_id": "openSUSE Leap 16.0:kernel-devel-6.12.0-160000.8.1.noarch"
},
"product_reference": "kernel-devel-6.12.0-160000.8.1.noarch",
"relates_to_product_reference": "openSUSE Leap 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-docs-6.12.0-160000.8.1.noarch as component of openSUSE Leap 16.0",
"product_id": "openSUSE Leap 16.0:kernel-docs-6.12.0-160000.8.1.noarch"
},
"product_reference": "kernel-docs-6.12.0-160000.8.1.noarch",
"relates_to_product_reference": "openSUSE Leap 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-docs-html-6.12.0-160000.8.1.noarch as component of openSUSE Leap 16.0",
"product_id": "openSUSE Leap 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch"
},
"product_reference": "kernel-docs-html-6.12.0-160000.8.1.noarch",
"relates_to_product_reference": "openSUSE Leap 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kvmsmall-6.12.0-160000.8.1.aarch64 as component of openSUSE Leap 16.0",
"product_id": "openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64"
},
"product_reference": "kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kvmsmall-6.12.0-160000.8.1.ppc64le as component of openSUSE Leap 16.0",
"product_id": "openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le"
},
"product_reference": "kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"relates_to_product_reference": "openSUSE Leap 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kvmsmall-6.12.0-160000.8.1.x86_64 as component of openSUSE Leap 16.0",
"product_id": "openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64"
},
"product_reference": "kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64 as component of openSUSE Leap 16.0",
"product_id": "openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64"
},
"product_reference": "kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le as component of openSUSE Leap 16.0",
"product_id": "openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le"
},
"product_reference": "kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"relates_to_product_reference": "openSUSE Leap 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64 as component of openSUSE Leap 16.0",
"product_id": "openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64"
},
"product_reference": "kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64 as component of openSUSE Leap 16.0",
"product_id": "openSUSE Leap 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64"
},
"product_reference": "kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-macros-6.12.0-160000.8.1.noarch as component of openSUSE Leap 16.0",
"product_id": "openSUSE Leap 16.0:kernel-macros-6.12.0-160000.8.1.noarch"
},
"product_reference": "kernel-macros-6.12.0-160000.8.1.noarch",
"relates_to_product_reference": "openSUSE Leap 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-obs-build-6.12.0-160000.8.1.aarch64 as component of openSUSE Leap 16.0",
"product_id": "openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.aarch64"
},
"product_reference": "kernel-obs-build-6.12.0-160000.8.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-obs-build-6.12.0-160000.8.1.ppc64le as component of openSUSE Leap 16.0",
"product_id": "openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.ppc64le"
},
"product_reference": "kernel-obs-build-6.12.0-160000.8.1.ppc64le",
"relates_to_product_reference": "openSUSE Leap 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-obs-build-6.12.0-160000.8.1.s390x as component of openSUSE Leap 16.0",
"product_id": "openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.s390x"
},
"product_reference": "kernel-obs-build-6.12.0-160000.8.1.s390x",
"relates_to_product_reference": "openSUSE Leap 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-obs-build-6.12.0-160000.8.1.x86_64 as component of openSUSE Leap 16.0",
"product_id": "openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.x86_64"
},
"product_reference": "kernel-obs-build-6.12.0-160000.8.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-obs-qa-6.12.0-160000.8.1.aarch64 as component of openSUSE Leap 16.0",
"product_id": "openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64"
},
"product_reference": "kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-obs-qa-6.12.0-160000.8.1.ppc64le as component of openSUSE Leap 16.0",
"product_id": "openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le"
},
"product_reference": "kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"relates_to_product_reference": "openSUSE Leap 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-obs-qa-6.12.0-160000.8.1.s390x as component of openSUSE Leap 16.0",
"product_id": "openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x"
},
"product_reference": "kernel-obs-qa-6.12.0-160000.8.1.s390x",
"relates_to_product_reference": "openSUSE Leap 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-obs-qa-6.12.0-160000.8.1.x86_64 as component of openSUSE Leap 16.0",
"product_id": "openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64"
},
"product_reference": "kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-6.12.0-160000.8.1.aarch64 as component of openSUSE Leap 16.0",
"product_id": "openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.aarch64"
},
"product_reference": "kernel-rt-6.12.0-160000.8.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-6.12.0-160000.8.1.x86_64 as component of openSUSE Leap 16.0",
"product_id": "openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.x86_64"
},
"product_reference": "kernel-rt-6.12.0-160000.8.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-devel-6.12.0-160000.8.1.aarch64 as component of openSUSE Leap 16.0",
"product_id": "openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.aarch64"
},
"product_reference": "kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-devel-6.12.0-160000.8.1.x86_64 as component of openSUSE Leap 16.0",
"product_id": "openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.x86_64"
},
"product_reference": "kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-extra-6.12.0-160000.8.1.aarch64 as component of openSUSE Leap 16.0",
"product_id": "openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.aarch64"
},
"product_reference": "kernel-rt-extra-6.12.0-160000.8.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-extra-6.12.0-160000.8.1.x86_64 as component of openSUSE Leap 16.0",
"product_id": "openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.x86_64"
},
"product_reference": "kernel-rt-extra-6.12.0-160000.8.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-optional-6.12.0-160000.8.1.aarch64 as component of openSUSE Leap 16.0",
"product_id": "openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.aarch64"
},
"product_reference": "kernel-rt-optional-6.12.0-160000.8.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-optional-6.12.0-160000.8.1.x86_64 as component of openSUSE Leap 16.0",
"product_id": "openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.x86_64"
},
"product_reference": "kernel-rt-optional-6.12.0-160000.8.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-vdso-6.12.0-160000.8.1.x86_64 as component of openSUSE Leap 16.0",
"product_id": "openSUSE Leap 16.0:kernel-rt-vdso-6.12.0-160000.8.1.x86_64"
},
"product_reference": "kernel-rt-vdso-6.12.0-160000.8.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-source-6.12.0-160000.8.1.noarch as component of openSUSE Leap 16.0",
"product_id": "openSUSE Leap 16.0:kernel-source-6.12.0-160000.8.1.noarch"
},
"product_reference": "kernel-source-6.12.0-160000.8.1.noarch",
"relates_to_product_reference": "openSUSE Leap 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-source-vanilla-6.12.0-160000.8.1.noarch as component of openSUSE Leap 16.0",
"product_id": "openSUSE Leap 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch"
},
"product_reference": "kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"relates_to_product_reference": "openSUSE Leap 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-6.12.0-160000.8.1.aarch64 as component of openSUSE Leap 16.0",
"product_id": "openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.aarch64"
},
"product_reference": "kernel-syms-6.12.0-160000.8.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-6.12.0-160000.8.1.ppc64le as component of openSUSE Leap 16.0",
"product_id": "openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le"
},
"product_reference": "kernel-syms-6.12.0-160000.8.1.ppc64le",
"relates_to_product_reference": "openSUSE Leap 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-6.12.0-160000.8.1.s390x as component of openSUSE Leap 16.0",
"product_id": "openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.s390x"
},
"product_reference": "kernel-syms-6.12.0-160000.8.1.s390x",
"relates_to_product_reference": "openSUSE Leap 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-6.12.0-160000.8.1.x86_64 as component of openSUSE Leap 16.0",
"product_id": "openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.x86_64"
},
"product_reference": "kernel-syms-6.12.0-160000.8.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-6.12.0-160000.8.1.s390x as component of openSUSE Leap 16.0",
"product_id": "openSUSE Leap 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x"
},
"product_reference": "kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"relates_to_product_reference": "openSUSE Leap 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kselftests-kmp-64kb-6.12.0-160000.8.1.aarch64 as component of openSUSE Leap 16.0",
"product_id": "openSUSE Leap 16.0:kselftests-kmp-64kb-6.12.0-160000.8.1.aarch64"
},
"product_reference": "kselftests-kmp-64kb-6.12.0-160000.8.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kselftests-kmp-default-6.12.0-160000.8.1.aarch64 as component of openSUSE Leap 16.0",
"product_id": "openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.aarch64"
},
"product_reference": "kselftests-kmp-default-6.12.0-160000.8.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kselftests-kmp-default-6.12.0-160000.8.1.ppc64le as component of openSUSE Leap 16.0",
"product_id": "openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.ppc64le"
},
"product_reference": "kselftests-kmp-default-6.12.0-160000.8.1.ppc64le",
"relates_to_product_reference": "openSUSE Leap 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kselftests-kmp-default-6.12.0-160000.8.1.s390x as component of openSUSE Leap 16.0",
"product_id": "openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.s390x"
},
"product_reference": "kselftests-kmp-default-6.12.0-160000.8.1.s390x",
"relates_to_product_reference": "openSUSE Leap 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kselftests-kmp-default-6.12.0-160000.8.1.x86_64 as component of openSUSE Leap 16.0",
"product_id": "openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.x86_64"
},
"product_reference": "kselftests-kmp-default-6.12.0-160000.8.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kselftests-kmp-rt-6.12.0-160000.8.1.aarch64 as component of openSUSE Leap 16.0",
"product_id": "openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.aarch64"
},
"product_reference": "kselftests-kmp-rt-6.12.0-160000.8.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kselftests-kmp-rt-6.12.0-160000.8.1.x86_64 as component of openSUSE Leap 16.0",
"product_id": "openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.x86_64"
},
"product_reference": "kselftests-kmp-rt-6.12.0-160000.8.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ocfs2-kmp-64kb-6.12.0-160000.8.1.aarch64 as component of openSUSE Leap 16.0",
"product_id": "openSUSE Leap 16.0:ocfs2-kmp-64kb-6.12.0-160000.8.1.aarch64"
},
"product_reference": "ocfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ocfs2-kmp-default-6.12.0-160000.8.1.aarch64 as component of openSUSE Leap 16.0",
"product_id": "openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.aarch64"
},
"product_reference": "ocfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ocfs2-kmp-default-6.12.0-160000.8.1.ppc64le as component of openSUSE Leap 16.0",
"product_id": "openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.ppc64le"
},
"product_reference": "ocfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"relates_to_product_reference": "openSUSE Leap 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ocfs2-kmp-default-6.12.0-160000.8.1.s390x as component of openSUSE Leap 16.0",
"product_id": "openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.s390x"
},
"product_reference": "ocfs2-kmp-default-6.12.0-160000.8.1.s390x",
"relates_to_product_reference": "openSUSE Leap 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ocfs2-kmp-default-6.12.0-160000.8.1.x86_64 as component of openSUSE Leap 16.0",
"product_id": "openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.x86_64"
},
"product_reference": "ocfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ocfs2-kmp-rt-6.12.0-160000.8.1.aarch64 as component of openSUSE Leap 16.0",
"product_id": "openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.aarch64"
},
"product_reference": "ocfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ocfs2-kmp-rt-6.12.0-160000.8.1.x86_64 as component of openSUSE Leap 16.0",
"product_id": "openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.x86_64"
},
"product_reference": "ocfs2-kmp-rt-6.12.0-160000.8.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 16.0"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2022-50253",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-50253"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nbpf: make sure skb-\u003elen != 0 when redirecting to a tunneling device\n\nsyzkaller managed to trigger another case where skb-\u003elen == 0\nwhen we enter __dev_queue_xmit:\n\nWARNING: CPU: 0 PID: 2470 at include/linux/skbuff.h:2576 skb_assert_len include/linux/skbuff.h:2576 [inline]\nWARNING: CPU: 0 PID: 2470 at include/linux/skbuff.h:2576 __dev_queue_xmit+0x2069/0x35e0 net/core/dev.c:4295\n\nCall Trace:\n dev_queue_xmit+0x17/0x20 net/core/dev.c:4406\n __bpf_tx_skb net/core/filter.c:2115 [inline]\n __bpf_redirect_no_mac net/core/filter.c:2140 [inline]\n __bpf_redirect+0x5fb/0xda0 net/core/filter.c:2163\n ____bpf_clone_redirect net/core/filter.c:2447 [inline]\n bpf_clone_redirect+0x247/0x390 net/core/filter.c:2419\n bpf_prog_48159a89cb4a9a16+0x59/0x5e\n bpf_dispatcher_nop_func include/linux/bpf.h:897 [inline]\n __bpf_prog_run include/linux/filter.h:596 [inline]\n bpf_prog_run include/linux/filter.h:603 [inline]\n bpf_test_run+0x46c/0x890 net/bpf/test_run.c:402\n bpf_prog_test_run_skb+0xbdc/0x14c0 net/bpf/test_run.c:1170\n bpf_prog_test_run+0x345/0x3c0 kernel/bpf/syscall.c:3648\n __sys_bpf+0x43a/0x6c0 kernel/bpf/syscall.c:5005\n __do_sys_bpf kernel/bpf/syscall.c:5091 [inline]\n __se_sys_bpf kernel/bpf/syscall.c:5089 [inline]\n __x64_sys_bpf+0x7c/0x90 kernel/bpf/syscall.c:5089\n do_syscall_64+0x54/0x70 arch/x86/entry/common.c:48\n entry_SYSCALL_64_after_hwframe+0x61/0xc6\n\nThe reproducer doesn\u0027t really reproduce outside of syzkaller\nenvironment, so I\u0027m taking a guess here. It looks like we\ndo generate correct ETH_HLEN-sized packet, but we redirect\nthe packet to the tunneling device. Before we do so, we\n__skb_pull l2 header and arrive again at skb-\u003elen == 0.\nDoesn\u0027t seem like we can do anything better than having\nan explicit check after __skb_pull?",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 16.0:cluster-md-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dtb-allwinner-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-altera-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amazon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amlogic-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apple-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-arm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-broadcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-cavium-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-exynos-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-freescale-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-hisilicon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-lg-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-marvell-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-mediatek-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-nvidia-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-qcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-renesas-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-rockchip-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-socionext-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-sprd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-xilinx-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-50253",
"url": "https://www.suse.com/security/cve/CVE-2022-50253"
},
{
"category": "external",
"summary": "SUSE Bug 1249912 for CVE-2022-50253",
"url": "https://bugzilla.suse.com/1249912"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 16.0:cluster-md-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dtb-allwinner-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-altera-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amazon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amlogic-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apple-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-arm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-broadcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-cavium-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-exynos-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-freescale-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-hisilicon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-lg-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-marvell-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-mediatek-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-nvidia-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-qcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-renesas-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-rockchip-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-socionext-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-sprd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-xilinx-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Leap 16.0:cluster-md-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dtb-allwinner-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-altera-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amazon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amlogic-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apple-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-arm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-broadcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-cavium-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-exynos-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-freescale-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-hisilicon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-lg-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-marvell-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-mediatek-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-nvidia-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-qcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-renesas-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-rockchip-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-socionext-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-sprd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-xilinx-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-19T17:38:16Z",
"details": "moderate"
}
],
"title": "CVE-2022-50253"
},
{
"cve": "CVE-2025-37916",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-37916"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\npds_core: remove write-after-free of client_id\n\nA use-after-free error popped up in stress testing:\n\n[Mon Apr 21 21:21:33 2025] BUG: KFENCE: use-after-free write in pdsc_auxbus_dev_del+0xef/0x160 [pds_core]\n[Mon Apr 21 21:21:33 2025] Use-after-free write at 0x000000007013ecd1 (in kfence-#47):\n[Mon Apr 21 21:21:33 2025] pdsc_auxbus_dev_del+0xef/0x160 [pds_core]\n[Mon Apr 21 21:21:33 2025] pdsc_remove+0xc0/0x1b0 [pds_core]\n[Mon Apr 21 21:21:33 2025] pci_device_remove+0x24/0x70\n[Mon Apr 21 21:21:33 2025] device_release_driver_internal+0x11f/0x180\n[Mon Apr 21 21:21:33 2025] driver_detach+0x45/0x80\n[Mon Apr 21 21:21:33 2025] bus_remove_driver+0x83/0xe0\n[Mon Apr 21 21:21:33 2025] pci_unregister_driver+0x1a/0x80\n\nThe actual device uninit usually happens on a separate thread\nscheduled after this code runs, but there is no guarantee of order\nof thread execution, so this could be a problem. There\u0027s no\nactual need to clear the client_id at this point, so simply\nremove the offending code.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 16.0:cluster-md-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dtb-allwinner-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-altera-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amazon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amlogic-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apple-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-arm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-broadcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-cavium-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-exynos-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-freescale-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-hisilicon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-lg-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-marvell-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-mediatek-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-nvidia-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-qcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-renesas-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-rockchip-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-socionext-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-sprd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-xilinx-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-37916",
"url": "https://www.suse.com/security/cve/CVE-2025-37916"
},
{
"category": "external",
"summary": "SUSE Bug 1243474 for CVE-2025-37916",
"url": "https://bugzilla.suse.com/1243474"
},
{
"category": "external",
"summary": "SUSE Bug 1243535 for CVE-2025-37916",
"url": "https://bugzilla.suse.com/1243535"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 16.0:cluster-md-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dtb-allwinner-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-altera-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amazon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amlogic-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apple-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-arm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-broadcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-cavium-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-exynos-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-freescale-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-hisilicon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-lg-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-marvell-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-mediatek-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-nvidia-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-qcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-renesas-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-rockchip-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-socionext-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-sprd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-xilinx-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"openSUSE Leap 16.0:cluster-md-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dtb-allwinner-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-altera-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amazon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amlogic-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apple-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-arm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-broadcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-cavium-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-exynos-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-freescale-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-hisilicon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-lg-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-marvell-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-mediatek-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-nvidia-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-qcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-renesas-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-rockchip-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-socionext-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-sprd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-xilinx-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-19T17:38:16Z",
"details": "moderate"
}
],
"title": "CVE-2025-37916"
},
{
"cve": "CVE-2025-38084",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-38084"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nmm/hugetlb: unshare page tables during VMA split, not before\n\nCurrently, __split_vma() triggers hugetlb page table unsharing through\nvm_ops-\u003emay_split(). This happens before the VMA lock and rmap locks are\ntaken - which is too early, it allows racing VMA-locked page faults in our\nprocess and racing rmap walks from other processes to cause page tables to\nbe shared again before we actually perform the split.\n\nFix it by explicitly calling into the hugetlb unshare logic from\n__split_vma() in the same place where THP splitting also happens. At that\npoint, both the VMA and the rmap(s) are write-locked.\n\nAn annoying detail is that we can now call into the helper\nhugetlb_unshare_pmds() from two different locking contexts:\n\n1. from hugetlb_split(), holding:\n - mmap lock (exclusively)\n - VMA lock\n - file rmap lock (exclusively)\n2. hugetlb_unshare_all_pmds(), which I think is designed to be able to\n call us with only the mmap lock held (in shared mode), but currently\n only runs while holding mmap lock (exclusively) and VMA lock\n\nBackporting note:\nThis commit fixes a racy protection that was introduced in commit\nb30c14cd6102 (\"hugetlb: unshare some PMDs when splitting VMAs\"); that\ncommit claimed to fix an issue introduced in 5.13, but it should actually\nalso go all the way back.\n\n[jannh@google.com: v2]",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 16.0:cluster-md-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dtb-allwinner-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-altera-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amazon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amlogic-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apple-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-arm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-broadcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-cavium-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-exynos-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-freescale-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-hisilicon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-lg-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-marvell-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-mediatek-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-nvidia-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-qcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-renesas-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-rockchip-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-socionext-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-sprd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-xilinx-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-38084",
"url": "https://www.suse.com/security/cve/CVE-2025-38084"
},
{
"category": "external",
"summary": "SUSE Bug 1245498 for CVE-2025-38084",
"url": "https://bugzilla.suse.com/1245498"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 16.0:cluster-md-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dtb-allwinner-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-altera-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amazon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amlogic-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apple-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-arm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-broadcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-cavium-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-exynos-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-freescale-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-hisilicon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-lg-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-marvell-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-mediatek-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-nvidia-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-qcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-renesas-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-rockchip-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-socionext-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-sprd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-xilinx-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.8,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H",
"version": "3.1"
},
"products": [
"openSUSE Leap 16.0:cluster-md-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dtb-allwinner-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-altera-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amazon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amlogic-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apple-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-arm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-broadcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-cavium-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-exynos-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-freescale-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-hisilicon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-lg-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-marvell-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-mediatek-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-nvidia-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-qcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-renesas-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-rockchip-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-socionext-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-sprd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-xilinx-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-19T17:38:16Z",
"details": "moderate"
}
],
"title": "CVE-2025-38084"
},
{
"cve": "CVE-2025-38085",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-38085"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nmm/hugetlb: fix huge_pmd_unshare() vs GUP-fast race\n\nhuge_pmd_unshare() drops a reference on a page table that may have\npreviously been shared across processes, potentially turning it into a\nnormal page table used in another process in which unrelated VMAs can\nafterwards be installed.\n\nIf this happens in the middle of a concurrent gup_fast(), gup_fast() could\nend up walking the page tables of another process. While I don\u0027t see any\nway in which that immediately leads to kernel memory corruption, it is\nreally weird and unexpected.\n\nFix it with an explicit broadcast IPI through tlb_remove_table_sync_one(),\njust like we do in khugepaged when removing page tables for a THP\ncollapse.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 16.0:cluster-md-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dtb-allwinner-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-altera-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amazon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amlogic-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apple-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-arm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-broadcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-cavium-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-exynos-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-freescale-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-hisilicon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-lg-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-marvell-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-mediatek-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-nvidia-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-qcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-renesas-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-rockchip-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-socionext-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-sprd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-xilinx-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-38085",
"url": "https://www.suse.com/security/cve/CVE-2025-38085"
},
{
"category": "external",
"summary": "SUSE Bug 1245499 for CVE-2025-38085",
"url": "https://bugzilla.suse.com/1245499"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 16.0:cluster-md-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dtb-allwinner-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-altera-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amazon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amlogic-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apple-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-arm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-broadcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-cavium-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-exynos-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-freescale-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-hisilicon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-lg-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-marvell-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-mediatek-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-nvidia-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-qcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-renesas-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-rockchip-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-socionext-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-sprd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-xilinx-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.6,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H",
"version": "3.1"
},
"products": [
"openSUSE Leap 16.0:cluster-md-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dtb-allwinner-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-altera-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amazon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amlogic-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apple-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-arm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-broadcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-cavium-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-exynos-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-freescale-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-hisilicon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-lg-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-marvell-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-mediatek-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-nvidia-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-qcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-renesas-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-rockchip-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-socionext-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-sprd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-xilinx-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-19T17:38:16Z",
"details": "moderate"
}
],
"title": "CVE-2025-38085"
},
{
"cve": "CVE-2025-38321",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-38321"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nsmb: Log an error when close_all_cached_dirs fails\n\nUnder low-memory conditions, close_all_cached_dirs() can\u0027t move the\ndentries to a separate list to dput() them once the locks are dropped.\nThis will result in a \"Dentry still in use\" error, so add an error\nmessage that makes it clear this is what happened:\n\n[ 495.281119] CIFS: VFS: \\\\otters.example.com\\share Out of memory while dropping dentries\n[ 495.281595] ------------[ cut here ]------------\n[ 495.281887] BUG: Dentry ffff888115531138{i=78,n=/} still in use (2) [unmount of cifs cifs]\n[ 495.282391] WARNING: CPU: 1 PID: 2329 at fs/dcache.c:1536 umount_check+0xc8/0xf0\n\nAlso, bail out of looping through all tcons as soon as a single\nallocation fails, since we\u0027re already in trouble, and kmalloc() attempts\nfor subseqeuent tcons are likely to fail just like the first one did.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 16.0:cluster-md-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dtb-allwinner-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-altera-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amazon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amlogic-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apple-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-arm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-broadcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-cavium-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-exynos-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-freescale-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-hisilicon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-lg-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-marvell-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-mediatek-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-nvidia-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-qcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-renesas-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-rockchip-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-socionext-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-sprd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-xilinx-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-38321",
"url": "https://www.suse.com/security/cve/CVE-2025-38321"
},
{
"category": "external",
"summary": "SUSE Bug 1246328 for CVE-2025-38321",
"url": "https://bugzilla.suse.com/1246328"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 16.0:cluster-md-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dtb-allwinner-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-altera-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amazon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amlogic-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apple-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-arm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-broadcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-cavium-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-exynos-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-freescale-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-hisilicon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-lg-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-marvell-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-mediatek-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-nvidia-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-qcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-renesas-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-rockchip-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-socionext-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-sprd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-xilinx-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L",
"version": "3.1"
},
"products": [
"openSUSE Leap 16.0:cluster-md-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dtb-allwinner-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-altera-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amazon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amlogic-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apple-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-arm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-broadcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-cavium-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-exynos-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-freescale-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-hisilicon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-lg-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-marvell-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-mediatek-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-nvidia-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-qcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-renesas-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-rockchip-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-socionext-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-sprd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-xilinx-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-19T17:38:16Z",
"details": "moderate"
}
],
"title": "CVE-2025-38321"
},
{
"cve": "CVE-2025-38728",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-38728"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nsmb3: fix for slab out of bounds on mount to ksmbd\n\nWith KASAN enabled, it is possible to get a slab out of bounds\nduring mount to ksmbd due to missing check in parse_server_interfaces()\n(see below):\n\n BUG: KASAN: slab-out-of-bounds in\n parse_server_interfaces+0x14ee/0x1880 [cifs]\n Read of size 4 at addr ffff8881433dba98 by task mount/9827\n\n CPU: 5 UID: 0 PID: 9827 Comm: mount Tainted: G\n OE 6.16.0-rc2-kasan #2 PREEMPT(voluntary)\n Tainted: [O]=OOT_MODULE, [E]=UNSIGNED_MODULE\n Hardware name: Dell Inc. Precision Tower 3620/0MWYPT,\n BIOS 2.13.1 06/14/2019\n Call Trace:\n \u003cTASK\u003e\n dump_stack_lvl+0x9f/0xf0\n print_report+0xd1/0x670\n __virt_addr_valid+0x22c/0x430\n ? parse_server_interfaces+0x14ee/0x1880 [cifs]\n ? kasan_complete_mode_report_info+0x2a/0x1f0\n ? parse_server_interfaces+0x14ee/0x1880 [cifs]\n kasan_report+0xd6/0x110\n parse_server_interfaces+0x14ee/0x1880 [cifs]\n __asan_report_load_n_noabort+0x13/0x20\n parse_server_interfaces+0x14ee/0x1880 [cifs]\n ? __pfx_parse_server_interfaces+0x10/0x10 [cifs]\n ? trace_hardirqs_on+0x51/0x60\n SMB3_request_interfaces+0x1ad/0x3f0 [cifs]\n ? __pfx_SMB3_request_interfaces+0x10/0x10 [cifs]\n ? SMB2_tcon+0x23c/0x15d0 [cifs]\n smb3_qfs_tcon+0x173/0x2b0 [cifs]\n ? __pfx_smb3_qfs_tcon+0x10/0x10 [cifs]\n ? cifs_get_tcon+0x105d/0x2120 [cifs]\n ? do_raw_spin_unlock+0x5d/0x200\n ? cifs_get_tcon+0x105d/0x2120 [cifs]\n ? __pfx_smb3_qfs_tcon+0x10/0x10 [cifs]\n cifs_mount_get_tcon+0x369/0xb90 [cifs]\n ? dfs_cache_find+0xe7/0x150 [cifs]\n dfs_mount_share+0x985/0x2970 [cifs]\n ? check_path.constprop.0+0x28/0x50\n ? save_trace+0x54/0x370\n ? __pfx_dfs_mount_share+0x10/0x10 [cifs]\n ? __lock_acquire+0xb82/0x2ba0\n ? __kasan_check_write+0x18/0x20\n cifs_mount+0xbc/0x9e0 [cifs]\n ? __pfx_cifs_mount+0x10/0x10 [cifs]\n ? do_raw_spin_unlock+0x5d/0x200\n ? cifs_setup_cifs_sb+0x29d/0x810 [cifs]\n cifs_smb3_do_mount+0x263/0x1990 [cifs]",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 16.0:cluster-md-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dtb-allwinner-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-altera-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amazon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amlogic-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apple-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-arm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-broadcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-cavium-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-exynos-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-freescale-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-hisilicon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-lg-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-marvell-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-mediatek-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-nvidia-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-qcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-renesas-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-rockchip-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-socionext-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-sprd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-xilinx-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-38728",
"url": "https://www.suse.com/security/cve/CVE-2025-38728"
},
{
"category": "external",
"summary": "SUSE Bug 1249256 for CVE-2025-38728",
"url": "https://bugzilla.suse.com/1249256"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 16.0:cluster-md-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dtb-allwinner-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-altera-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amazon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amlogic-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apple-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-arm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-broadcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-cavium-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-exynos-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-freescale-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-hisilicon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-lg-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-marvell-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-mediatek-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-nvidia-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-qcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-renesas-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-rockchip-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-socionext-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-sprd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-xilinx-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Leap 16.0:cluster-md-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dtb-allwinner-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-altera-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amazon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amlogic-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apple-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-arm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-broadcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-cavium-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-exynos-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-freescale-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-hisilicon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-lg-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-marvell-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-mediatek-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-nvidia-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-qcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-renesas-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-rockchip-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-socionext-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-sprd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-xilinx-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-19T17:38:16Z",
"details": "moderate"
}
],
"title": "CVE-2025-38728"
},
{
"cve": "CVE-2025-39805",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-39805"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnet: macb: fix unregister_netdev call order in macb_remove()\n\nWhen removing a macb device, the driver calls phy_exit() before\nunregister_netdev(). This leads to a WARN from kernfs:\n\n ------------[ cut here ]------------\n kernfs: can not remove \u0027attached_dev\u0027, no directory\n WARNING: CPU: 1 PID: 27146 at fs/kernfs/dir.c:1683\n Call trace:\n kernfs_remove_by_name_ns+0xd8/0xf0\n sysfs_remove_link+0x24/0x58\n phy_detach+0x5c/0x168\n phy_disconnect+0x4c/0x70\n phylink_disconnect_phy+0x6c/0xc0 [phylink]\n macb_close+0x6c/0x170 [macb]\n ...\n macb_remove+0x60/0x168 [macb]\n platform_remove+0x5c/0x80\n ...\n\nThe warning happens because the PHY is being exited while the netdev\nis still registered. The correct order is to unregister the netdev\nbefore shutting down the PHY and cleaning up the MDIO bus.\n\nFix this by moving unregister_netdev() ahead of phy_exit() in\nmacb_remove().",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 16.0:cluster-md-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dtb-allwinner-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-altera-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amazon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amlogic-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apple-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-arm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-broadcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-cavium-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-exynos-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-freescale-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-hisilicon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-lg-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-marvell-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-mediatek-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-nvidia-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-qcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-renesas-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-rockchip-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-socionext-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-sprd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-xilinx-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-39805",
"url": "https://www.suse.com/security/cve/CVE-2025-39805"
},
{
"category": "external",
"summary": "SUSE Bug 1249982 for CVE-2025-39805",
"url": "https://bugzilla.suse.com/1249982"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 16.0:cluster-md-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dtb-allwinner-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-altera-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amazon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amlogic-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apple-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-arm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-broadcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-cavium-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-exynos-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-freescale-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-hisilicon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-lg-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-marvell-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-mediatek-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-nvidia-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-qcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-renesas-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-rockchip-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-socionext-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-sprd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-xilinx-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Leap 16.0:cluster-md-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dtb-allwinner-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-altera-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amazon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amlogic-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apple-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-arm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-broadcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-cavium-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-exynos-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-freescale-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-hisilicon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-lg-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-marvell-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-mediatek-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-nvidia-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-qcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-renesas-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-rockchip-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-socionext-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-sprd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-xilinx-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-19T17:38:16Z",
"details": "moderate"
}
],
"title": "CVE-2025-39805"
},
{
"cve": "CVE-2025-39819",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-39819"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nfs/smb: Fix inconsistent refcnt update\n\nA possible inconsistent update of refcount was identified in `smb2_compound_op`.\nSuch inconsistent update could lead to possible resource leaks.\n\nWhy it is a possible bug:\n1. In the comment section of the function, it clearly states that the\nreference to `cfile` should be dropped after calling this function.\n2. Every control flow path would check and drop the reference to\n`cfile`, except the patched one.\n3. Existing callers would not handle refcount update of `cfile` if\n-ENOMEM is returned.\n\nTo fix the bug, an extra goto label \"out\" is added, to make sure that the\ncleanup logic would always be respected. As the problem is caused by the\nallocation failure of `vars`, the cleanup logic between label \"finished\"\nand \"out\" can be safely ignored. According to the definition of function\n`is_replayable_error`, the error code of \"-ENOMEM\" is not recoverable.\nTherefore, the replay logic also gets ignored.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 16.0:cluster-md-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dtb-allwinner-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-altera-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amazon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amlogic-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apple-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-arm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-broadcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-cavium-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-exynos-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-freescale-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-hisilicon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-lg-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-marvell-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-mediatek-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-nvidia-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-qcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-renesas-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-rockchip-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-socionext-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-sprd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-xilinx-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-39819",
"url": "https://www.suse.com/security/cve/CVE-2025-39819"
},
{
"category": "external",
"summary": "SUSE Bug 1250176 for CVE-2025-39819",
"url": "https://bugzilla.suse.com/1250176"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 16.0:cluster-md-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dtb-allwinner-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-altera-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amazon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amlogic-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apple-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-arm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-broadcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-cavium-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-exynos-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-freescale-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-hisilicon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-lg-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-marvell-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-mediatek-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-nvidia-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-qcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-renesas-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-rockchip-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-socionext-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-sprd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-xilinx-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Leap 16.0:cluster-md-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dtb-allwinner-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-altera-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amazon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amlogic-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apple-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-arm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-broadcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-cavium-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-exynos-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-freescale-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-hisilicon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-lg-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-marvell-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-mediatek-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-nvidia-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-qcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-renesas-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-rockchip-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-socionext-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-sprd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-xilinx-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-19T17:38:16Z",
"details": "moderate"
}
],
"title": "CVE-2025-39819"
},
{
"cve": "CVE-2025-39822",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-39822"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nio_uring/kbuf: fix signedness in this_len calculation\n\nWhen importing and using buffers, buf-\u003elen is considered unsigned.\nHowever, buf-\u003elen is converted to signed int when committing. This can\nlead to unexpected behavior if the buffer is large enough to be\ninterpreted as a negative value. Make min_t calculation unsigned.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 16.0:cluster-md-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dtb-allwinner-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-altera-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amazon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amlogic-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apple-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-arm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-broadcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-cavium-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-exynos-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-freescale-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-hisilicon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-lg-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-marvell-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-mediatek-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-nvidia-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-qcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-renesas-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-rockchip-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-socionext-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-sprd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-xilinx-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-39822",
"url": "https://www.suse.com/security/cve/CVE-2025-39822"
},
{
"category": "external",
"summary": "SUSE Bug 1250034 for CVE-2025-39822",
"url": "https://bugzilla.suse.com/1250034"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 16.0:cluster-md-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dtb-allwinner-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-altera-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amazon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amlogic-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apple-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-arm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-broadcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-cavium-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-exynos-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-freescale-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-hisilicon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-lg-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-marvell-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-mediatek-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-nvidia-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-qcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-renesas-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-rockchip-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-socionext-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-sprd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-xilinx-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Leap 16.0:cluster-md-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dtb-allwinner-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-altera-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amazon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amlogic-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apple-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-arm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-broadcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-cavium-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-exynos-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-freescale-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-hisilicon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-lg-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-marvell-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-mediatek-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-nvidia-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-qcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-renesas-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-rockchip-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-socionext-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-sprd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-xilinx-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-19T17:38:16Z",
"details": "moderate"
}
],
"title": "CVE-2025-39822"
},
{
"cve": "CVE-2025-39831",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-39831"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nfbnic: Move phylink resume out of service_task and into open/close\n\nThe fbnic driver was presenting with the following locking assert coming\nout of a PM resume:\n[ 42.208116][ T164] RTNL: assertion failed at drivers/net/phy/phylink.c (2611)\n[ 42.208492][ T164] WARNING: CPU: 1 PID: 164 at drivers/net/phy/phylink.c:2611 phylink_resume+0x190/0x1e0\n[ 42.208872][ T164] Modules linked in:\n[ 42.209140][ T164] CPU: 1 UID: 0 PID: 164 Comm: bash Not tainted 6.17.0-rc2-virtme #134 PREEMPT(full)\n[ 42.209496][ T164] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.17.0-5.fc42 04/01/2014\n[ 42.209861][ T164] RIP: 0010:phylink_resume+0x190/0x1e0\n[ 42.210057][ T164] Code: 83 e5 01 0f 85 b0 fe ff ff c6 05 1c cd 3e 02 01 90 ba 33 0a 00 00 48 c7 c6 20 3a 1d a5 48 c7 c7 e0 3e 1d a5 e8 21 b8 90 fe 90 \u003c0f\u003e 0b 90 90 e9 86 fe ff ff e8 42 ea 1f ff e9 e2 fe ff ff 48 89 ef\n[ 42.210708][ T164] RSP: 0018:ffffc90000affbd8 EFLAGS: 00010296\n[ 42.210983][ T164] RAX: 0000000000000000 RBX: ffff8880078d8400 RCX: 0000000000000000\n[ 42.211235][ T164] RDX: 0000000000000000 RSI: 1ffffffff4f10938 RDI: 0000000000000001\n[ 42.211466][ T164] RBP: 0000000000000000 R08: ffffffffa2ae79ea R09: fffffbfff4b3eb84\n[ 42.211707][ T164] R10: 0000000000000003 R11: 0000000000000000 R12: ffff888007ad8000\n[ 42.211997][ T164] R13: 0000000000000002 R14: ffff888006a18800 R15: ffffffffa34c59e0\n[ 42.212234][ T164] FS: 00007f0dc8e39740(0000) GS:ffff88808f51f000(0000) knlGS:0000000000000000\n[ 42.212505][ T164] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033\n[ 42.212704][ T164] CR2: 00007f0dc8e9fe10 CR3: 000000000b56d003 CR4: 0000000000772ef0\n[ 42.213227][ T164] PKRU: 55555554\n[ 42.213366][ T164] Call Trace:\n[ 42.213483][ T164] \u003cTASK\u003e\n[ 42.213565][ T164] __fbnic_pm_attach.isra.0+0x8e/0xa0\n[ 42.213725][ T164] pci_reset_function+0x116/0x1d0\n[ 42.213895][ T164] reset_store+0xa0/0x100\n[ 42.214025][ T164] ? pci_dev_reset_attr_is_visible+0x50/0x50\n[ 42.214221][ T164] ? sysfs_file_kobj+0xc1/0x1e0\n[ 42.214374][ T164] ? sysfs_kf_write+0x65/0x160\n[ 42.214526][ T164] kernfs_fop_write_iter+0x2f8/0x4c0\n[ 42.214677][ T164] ? kernfs_vma_page_mkwrite+0x1f0/0x1f0\n[ 42.214836][ T164] new_sync_write+0x308/0x6f0\n[ 42.214987][ T164] ? __lock_acquire+0x34c/0x740\n[ 42.215135][ T164] ? new_sync_read+0x6f0/0x6f0\n[ 42.215288][ T164] ? lock_acquire.part.0+0xbc/0x260\n[ 42.215440][ T164] ? ksys_write+0xff/0x200\n[ 42.215590][ T164] ? perf_trace_sched_switch+0x6d0/0x6d0\n[ 42.215742][ T164] vfs_write+0x65e/0xbb0\n[ 42.215876][ T164] ksys_write+0xff/0x200\n[ 42.215994][ T164] ? __ia32_sys_read+0xc0/0xc0\n[ 42.216141][ T164] ? do_user_addr_fault+0x269/0x9f0\n[ 42.216292][ T164] ? rcu_is_watching+0x15/0xd0\n[ 42.216442][ T164] do_syscall_64+0xbb/0x360\n[ 42.216591][ T164] entry_SYSCALL_64_after_hwframe+0x4b/0x53\n[ 42.216784][ T164] RIP: 0033:0x7f0dc8ea9986\n\nA bit of digging showed that we were invoking the phylink_resume as a part\nof the fbnic_up path when we were enabling the service task while not\nholding the RTNL lock. We should be enabling this sooner as a part of the\nndo_open path and then just letting the service task come online later.\nThis will help to enforce the correct locking and brings the phylink\ninterface online at the same time as the network interface, instead of at a\nlater time.\n\nI tested this on QEMU to verify this was working by putting the system to\nsleep using \"echo mem \u003e /sys/power/state\" to put the system to sleep in the\nguest and then using the command \"system_wakeup\" in the QEMU monitor.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 16.0:cluster-md-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dtb-allwinner-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-altera-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amazon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amlogic-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apple-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-arm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-broadcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-cavium-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-exynos-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-freescale-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-hisilicon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-lg-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-marvell-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-mediatek-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-nvidia-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-qcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-renesas-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-rockchip-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-socionext-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-sprd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-xilinx-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-39831",
"url": "https://www.suse.com/security/cve/CVE-2025-39831"
},
{
"category": "external",
"summary": "SUSE Bug 1249977 for CVE-2025-39831",
"url": "https://bugzilla.suse.com/1249977"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 16.0:cluster-md-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dtb-allwinner-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-altera-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amazon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amlogic-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apple-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-arm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-broadcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-cavium-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-exynos-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-freescale-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-hisilicon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-lg-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-marvell-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-mediatek-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-nvidia-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-qcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-renesas-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-rockchip-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-socionext-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-sprd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-xilinx-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Leap 16.0:cluster-md-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dtb-allwinner-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-altera-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amazon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amlogic-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apple-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-arm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-broadcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-cavium-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-exynos-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-freescale-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-hisilicon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-lg-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-marvell-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-mediatek-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-nvidia-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-qcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-renesas-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-rockchip-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-socionext-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-sprd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-xilinx-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-19T17:38:16Z",
"details": "moderate"
}
],
"title": "CVE-2025-39831"
},
{
"cve": "CVE-2025-39859",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-39859"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nptp: ocp: fix use-after-free bugs causing by ptp_ocp_watchdog\n\nThe ptp_ocp_detach() only shuts down the watchdog timer if it is\npending. However, if the timer handler is already running, the\ntimer_delete_sync() is not called. This leads to race conditions\nwhere the devlink that contains the ptp_ocp is deallocated while\nthe timer handler is still accessing it, resulting in use-after-free\nbugs. The following details one of the race scenarios.\n\n(thread 1) | (thread 2)\nptp_ocp_remove() |\n ptp_ocp_detach() | ptp_ocp_watchdog()\n if (timer_pending(\u0026bp-\u003ewatchdog))| bp = timer_container_of()\n timer_delete_sync() |\n |\n devlink_free(devlink) //free |\n | bp-\u003e //use\n\nResolve this by unconditionally calling timer_delete_sync() to ensure\nthe timer is reliably deactivated, preventing any access after free.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 16.0:cluster-md-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dtb-allwinner-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-altera-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amazon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amlogic-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apple-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-arm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-broadcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-cavium-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-exynos-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-freescale-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-hisilicon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-lg-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-marvell-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-mediatek-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-nvidia-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-qcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-renesas-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-rockchip-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-socionext-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-sprd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-xilinx-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-39859",
"url": "https://www.suse.com/security/cve/CVE-2025-39859"
},
{
"category": "external",
"summary": "SUSE Bug 1250252 for CVE-2025-39859",
"url": "https://bugzilla.suse.com/1250252"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 16.0:cluster-md-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dtb-allwinner-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-altera-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amazon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amlogic-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apple-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-arm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-broadcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-cavium-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-exynos-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-freescale-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-hisilicon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-lg-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-marvell-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-mediatek-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-nvidia-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-qcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-renesas-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-rockchip-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-socionext-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-sprd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-xilinx-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Leap 16.0:cluster-md-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dtb-allwinner-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-altera-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amazon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amlogic-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apple-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-arm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-broadcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-cavium-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-exynos-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-freescale-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-hisilicon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-lg-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-marvell-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-mediatek-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-nvidia-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-qcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-renesas-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-rockchip-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-socionext-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-sprd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-xilinx-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-19T17:38:16Z",
"details": "moderate"
}
],
"title": "CVE-2025-39859"
},
{
"cve": "CVE-2025-39897",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-39897"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnet: xilinx: axienet: Add error handling for RX metadata pointer retrieval\n\nAdd proper error checking for dmaengine_desc_get_metadata_ptr() which\ncan return an error pointer and lead to potential crashes or undefined\nbehaviour if the pointer retrieval fails.\n\nProperly handle the error by unmapping DMA buffer, freeing the skb and\nreturning early to prevent further processing with invalid data.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 16.0:cluster-md-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dtb-allwinner-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-altera-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amazon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amlogic-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apple-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-arm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-broadcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-cavium-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-exynos-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-freescale-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-hisilicon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-lg-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-marvell-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-mediatek-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-nvidia-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-qcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-renesas-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-rockchip-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-socionext-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-sprd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-xilinx-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-39897",
"url": "https://www.suse.com/security/cve/CVE-2025-39897"
},
{
"category": "external",
"summary": "SUSE Bug 1250746 for CVE-2025-39897",
"url": "https://bugzilla.suse.com/1250746"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 16.0:cluster-md-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dtb-allwinner-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-altera-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amazon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amlogic-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apple-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-arm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-broadcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-cavium-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-exynos-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-freescale-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-hisilicon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-lg-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-marvell-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-mediatek-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-nvidia-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-qcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-renesas-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-rockchip-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-socionext-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-sprd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-xilinx-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.6,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H",
"version": "3.1"
},
"products": [
"openSUSE Leap 16.0:cluster-md-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dtb-allwinner-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-altera-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amazon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amlogic-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apple-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-arm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-broadcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-cavium-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-exynos-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-freescale-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-hisilicon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-lg-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-marvell-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-mediatek-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-nvidia-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-qcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-renesas-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-rockchip-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-socionext-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-sprd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-xilinx-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-19T17:38:16Z",
"details": "moderate"
}
],
"title": "CVE-2025-39897"
},
{
"cve": "CVE-2025-39917",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-39917"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nbpf: Fix out-of-bounds dynptr write in bpf_crypto_crypt\n\nStanislav reported that in bpf_crypto_crypt() the destination dynptr\u0027s\nsize is not validated to be at least as large as the source dynptr\u0027s\nsize before calling into the crypto backend with \u0027len = src_len\u0027. This\ncan result in an OOB write when the destination is smaller than the\nsource.\n\nConcretely, in mentioned function, psrc and pdst are both linear\nbuffers fetched from each dynptr:\n\n psrc = __bpf_dynptr_data(src, src_len);\n [...]\n pdst = __bpf_dynptr_data_rw(dst, dst_len);\n [...]\n err = decrypt ?\n ctx-\u003etype-\u003edecrypt(ctx-\u003etfm, psrc, pdst, src_len, piv) :\n ctx-\u003etype-\u003eencrypt(ctx-\u003etfm, psrc, pdst, src_len, piv);\n\nThe crypto backend expects pdst to be large enough with a src_len length\nthat can be written. Add an additional src_len \u003e dst_len check and bail\nout if it\u0027s the case. Note that these kfuncs are accessible under root\nprivileges only.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 16.0:cluster-md-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dtb-allwinner-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-altera-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amazon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amlogic-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apple-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-arm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-broadcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-cavium-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-exynos-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-freescale-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-hisilicon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-lg-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-marvell-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-mediatek-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-nvidia-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-qcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-renesas-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-rockchip-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-socionext-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-sprd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-xilinx-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-39917",
"url": "https://www.suse.com/security/cve/CVE-2025-39917"
},
{
"category": "external",
"summary": "SUSE Bug 1250723 for CVE-2025-39917",
"url": "https://bugzilla.suse.com/1250723"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 16.0:cluster-md-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dtb-allwinner-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-altera-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amazon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amlogic-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apple-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-arm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-broadcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-cavium-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-exynos-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-freescale-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-hisilicon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-lg-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-marvell-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-mediatek-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-nvidia-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-qcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-renesas-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-rockchip-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-socionext-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-sprd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-xilinx-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:N",
"version": "3.1"
},
"products": [
"openSUSE Leap 16.0:cluster-md-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dtb-allwinner-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-altera-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amazon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amlogic-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apple-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-arm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-broadcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-cavium-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-exynos-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-freescale-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-hisilicon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-lg-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-marvell-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-mediatek-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-nvidia-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-qcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-renesas-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-rockchip-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-socionext-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-sprd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-xilinx-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-19T17:38:16Z",
"details": "moderate"
}
],
"title": "CVE-2025-39917"
},
{
"cve": "CVE-2025-39944",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-39944"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nocteontx2-pf: Fix use-after-free bugs in otx2_sync_tstamp()\n\nThe original code relies on cancel_delayed_work() in otx2_ptp_destroy(),\nwhich does not ensure that the delayed work item synctstamp_work has fully\ncompleted if it was already running. This leads to use-after-free scenarios\nwhere otx2_ptp is deallocated by otx2_ptp_destroy(), while synctstamp_work\nremains active and attempts to dereference otx2_ptp in otx2_sync_tstamp().\nFurthermore, the synctstamp_work is cyclic, the likelihood of triggering\nthe bug is nonnegligible.\n\nA typical race condition is illustrated below:\n\nCPU 0 (cleanup) | CPU 1 (delayed work callback)\notx2_remove() |\n otx2_ptp_destroy() | otx2_sync_tstamp()\n cancel_delayed_work() |\n kfree(ptp) |\n | ptp = container_of(...); //UAF\n | ptp-\u003e //UAF\n\nThis is confirmed by a KASAN report:\n\nBUG: KASAN: slab-use-after-free in __run_timer_base.part.0+0x7d7/0x8c0\nWrite of size 8 at addr ffff88800aa09a18 by task bash/136\n...\nCall Trace:\n \u003cIRQ\u003e\n dump_stack_lvl+0x55/0x70\n print_report+0xcf/0x610\n ? __run_timer_base.part.0+0x7d7/0x8c0\n kasan_report+0xb8/0xf0\n ? __run_timer_base.part.0+0x7d7/0x8c0\n __run_timer_base.part.0+0x7d7/0x8c0\n ? __pfx___run_timer_base.part.0+0x10/0x10\n ? __pfx_read_tsc+0x10/0x10\n ? ktime_get+0x60/0x140\n ? lapic_next_event+0x11/0x20\n ? clockevents_program_event+0x1d4/0x2a0\n run_timer_softirq+0xd1/0x190\n handle_softirqs+0x16a/0x550\n irq_exit_rcu+0xaf/0xe0\n sysvec_apic_timer_interrupt+0x70/0x80\n \u003c/IRQ\u003e\n...\nAllocated by task 1:\n kasan_save_stack+0x24/0x50\n kasan_save_track+0x14/0x30\n __kasan_kmalloc+0x7f/0x90\n otx2_ptp_init+0xb1/0x860\n otx2_probe+0x4eb/0xc30\n local_pci_probe+0xdc/0x190\n pci_device_probe+0x2fe/0x470\n really_probe+0x1ca/0x5c0\n __driver_probe_device+0x248/0x310\n driver_probe_device+0x44/0x120\n __driver_attach+0xd2/0x310\n bus_for_each_dev+0xed/0x170\n bus_add_driver+0x208/0x500\n driver_register+0x132/0x460\n do_one_initcall+0x89/0x300\n kernel_init_freeable+0x40d/0x720\n kernel_init+0x1a/0x150\n ret_from_fork+0x10c/0x1a0\n ret_from_fork_asm+0x1a/0x30\n\nFreed by task 136:\n kasan_save_stack+0x24/0x50\n kasan_save_track+0x14/0x30\n kasan_save_free_info+0x3a/0x60\n __kasan_slab_free+0x3f/0x50\n kfree+0x137/0x370\n otx2_ptp_destroy+0x38/0x80\n otx2_remove+0x10d/0x4c0\n pci_device_remove+0xa6/0x1d0\n device_release_driver_internal+0xf8/0x210\n pci_stop_bus_device+0x105/0x150\n pci_stop_and_remove_bus_device_locked+0x15/0x30\n remove_store+0xcc/0xe0\n kernfs_fop_write_iter+0x2c3/0x440\n vfs_write+0x871/0xd70\n ksys_write+0xee/0x1c0\n do_syscall_64+0xac/0x280\n entry_SYSCALL_64_after_hwframe+0x77/0x7f\n...\n\nReplace cancel_delayed_work() with cancel_delayed_work_sync() to ensure\nthat the delayed work item is properly canceled before the otx2_ptp is\ndeallocated.\n\nThis bug was initially identified through static analysis. To reproduce\nand test it, I simulated the OcteonTX2 PCI device in QEMU and introduced\nartificial delays within the otx2_sync_tstamp() function to increase the\nlikelihood of triggering the bug.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 16.0:cluster-md-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dtb-allwinner-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-altera-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amazon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amlogic-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apple-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-arm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-broadcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-cavium-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-exynos-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-freescale-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-hisilicon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-lg-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-marvell-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-mediatek-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-nvidia-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-qcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-renesas-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-rockchip-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-socionext-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-sprd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-xilinx-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-39944",
"url": "https://www.suse.com/security/cve/CVE-2025-39944"
},
{
"category": "external",
"summary": "SUSE Bug 1251120 for CVE-2025-39944",
"url": "https://bugzilla.suse.com/1251120"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 16.0:cluster-md-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dtb-allwinner-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-altera-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amazon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amlogic-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apple-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-arm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-broadcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-cavium-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-exynos-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-freescale-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-hisilicon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-lg-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-marvell-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-mediatek-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-nvidia-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-qcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-renesas-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-rockchip-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-socionext-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-sprd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-xilinx-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Leap 16.0:cluster-md-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dtb-allwinner-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-altera-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amazon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amlogic-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apple-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-arm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-broadcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-cavium-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-exynos-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-freescale-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-hisilicon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-lg-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-marvell-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-mediatek-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-nvidia-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-qcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-renesas-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-rockchip-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-socionext-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-sprd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-xilinx-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-19T17:38:16Z",
"details": "moderate"
}
],
"title": "CVE-2025-39944"
},
{
"cve": "CVE-2025-39961",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-39961"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\niommu/amd/pgtbl: Fix possible race while increase page table level\n\nThe AMD IOMMU host page table implementation supports dynamic page table levels\n(up to 6 levels), starting with a 3-level configuration that expands based on\nIOVA address. The kernel maintains a root pointer and current page table level\nto enable proper page table walks in alloc_pte()/fetch_pte() operations.\n\nThe IOMMU IOVA allocator initially starts with 32-bit address and onces its\nexhuasted it switches to 64-bit address (max address is determined based\non IOMMU and device DMA capability). To support larger IOVA, AMD IOMMU\ndriver increases page table level.\n\nBut in unmap path (iommu_v1_unmap_pages()), fetch_pte() reads\npgtable-\u003e[root/mode] without lock. So its possible that in exteme corner case,\nwhen increase_address_space() is updating pgtable-\u003e[root/mode], fetch_pte()\nreads wrong page table level (pgtable-\u003emode). It does compare the value with\nlevel encoded in page table and returns NULL. This will result is\niommu_unmap ops to fail and upper layer may retry/log WARN_ON.\n\nCPU 0 CPU 1\n------ ------\nmap pages unmap pages\nalloc_pte() -\u003e increase_address_space() iommu_v1_unmap_pages() -\u003e fetch_pte()\n pgtable-\u003eroot = pte (new root value)\n READ pgtable-\u003e[mode/root]\n\t\t\t\t\t Reads new root, old mode\n Updates mode (pgtable-\u003emode += 1)\n\nSince Page table level updates are infrequent and already synchronized with a\nspinlock, implement seqcount to enable lock-free read operations on the read path.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 16.0:cluster-md-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dtb-allwinner-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-altera-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amazon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amlogic-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apple-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-arm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-broadcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-cavium-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-exynos-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-freescale-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-hisilicon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-lg-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-marvell-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-mediatek-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-nvidia-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-qcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-renesas-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-rockchip-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-socionext-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-sprd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-xilinx-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-39961",
"url": "https://www.suse.com/security/cve/CVE-2025-39961"
},
{
"category": "external",
"summary": "SUSE Bug 1251817 for CVE-2025-39961",
"url": "https://bugzilla.suse.com/1251817"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 16.0:cluster-md-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dtb-allwinner-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-altera-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amazon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amlogic-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apple-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-arm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-broadcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-cavium-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-exynos-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-freescale-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-hisilicon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-lg-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-marvell-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-mediatek-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-nvidia-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-qcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-renesas-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-rockchip-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-socionext-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-sprd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-xilinx-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.8,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H",
"version": "3.1"
},
"products": [
"openSUSE Leap 16.0:cluster-md-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dtb-allwinner-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-altera-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amazon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amlogic-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apple-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-arm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-broadcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-cavium-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-exynos-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-freescale-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-hisilicon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-lg-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-marvell-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-mediatek-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-nvidia-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-qcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-renesas-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-rockchip-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-socionext-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-sprd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-xilinx-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-19T17:38:16Z",
"details": "moderate"
}
],
"title": "CVE-2025-39961"
},
{
"cve": "CVE-2025-39980",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-39980"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnexthop: Forbid FDB status change while nexthop is in a group\n\nThe kernel forbids the creation of non-FDB nexthop groups with FDB\nnexthops:\n\n # ip nexthop add id 1 via 192.0.2.1 fdb\n # ip nexthop add id 2 group 1\n Error: Non FDB nexthop group cannot have fdb nexthops.\n\nAnd vice versa:\n\n # ip nexthop add id 3 via 192.0.2.2 dev dummy1\n # ip nexthop add id 4 group 3 fdb\n Error: FDB nexthop group can only have fdb nexthops.\n\nHowever, as long as no routes are pointing to a non-FDB nexthop group,\nthe kernel allows changing the type of a nexthop from FDB to non-FDB and\nvice versa:\n\n # ip nexthop add id 5 via 192.0.2.2 dev dummy1\n # ip nexthop add id 6 group 5\n # ip nexthop replace id 5 via 192.0.2.2 fdb\n # echo $?\n 0\n\nThis configuration is invalid and can result in a NPD [1] since FDB\nnexthops are not associated with a nexthop device:\n\n # ip route add 198.51.100.1/32 nhid 6\n # ping 198.51.100.1\n\nFix by preventing nexthop FDB status change while the nexthop is in a\ngroup:\n\n # ip nexthop add id 7 via 192.0.2.2 dev dummy1\n # ip nexthop add id 8 group 7\n # ip nexthop replace id 7 via 192.0.2.2 fdb\n Error: Cannot change nexthop FDB status while in a group.\n\n[1]\nBUG: kernel NULL pointer dereference, address: 00000000000003c0\n[...]\nOops: Oops: 0000 [#1] SMP\nCPU: 6 UID: 0 PID: 367 Comm: ping Not tainted 6.17.0-rc6-virtme-gb65678cacc03 #1 PREEMPT(voluntary)\nHardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.17.0-4.fc41 04/01/2014\nRIP: 0010:fib_lookup_good_nhc+0x1e/0x80\n[...]\nCall Trace:\n \u003cTASK\u003e\n fib_table_lookup+0x541/0x650\n ip_route_output_key_hash_rcu+0x2ea/0x970\n ip_route_output_key_hash+0x55/0x80\n __ip4_datagram_connect+0x250/0x330\n udp_connect+0x2b/0x60\n __sys_connect+0x9c/0xd0\n __x64_sys_connect+0x18/0x20\n do_syscall_64+0xa4/0x2a0\n entry_SYSCALL_64_after_hwframe+0x4b/0x53",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 16.0:cluster-md-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dtb-allwinner-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-altera-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amazon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amlogic-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apple-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-arm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-broadcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-cavium-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-exynos-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-freescale-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-hisilicon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-lg-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-marvell-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-mediatek-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-nvidia-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-qcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-renesas-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-rockchip-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-socionext-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-sprd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-xilinx-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-39980",
"url": "https://www.suse.com/security/cve/CVE-2025-39980"
},
{
"category": "external",
"summary": "SUSE Bug 1252063 for CVE-2025-39980",
"url": "https://bugzilla.suse.com/1252063"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 16.0:cluster-md-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dtb-allwinner-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-altera-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amazon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amlogic-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apple-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-arm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-broadcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-cavium-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-exynos-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-freescale-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-hisilicon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-lg-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-marvell-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-mediatek-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-nvidia-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-qcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-renesas-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-rockchip-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-socionext-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-sprd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-xilinx-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Leap 16.0:cluster-md-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dtb-allwinner-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-altera-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amazon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amlogic-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apple-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-arm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-broadcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-cavium-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-exynos-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-freescale-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-hisilicon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-lg-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-marvell-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-mediatek-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-nvidia-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-qcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-renesas-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-rockchip-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-socionext-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-sprd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-xilinx-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-19T17:38:16Z",
"details": "moderate"
}
],
"title": "CVE-2025-39980"
},
{
"cve": "CVE-2025-39990",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-39990"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nbpf: Check the helper function is valid in get_helper_proto\n\nkernel test robot reported verifier bug [1] where the helper func\npointer could be NULL due to disabled config option.\n\nAs Alexei suggested we could check on that in get_helper_proto\ndirectly. Marking tail_call helper func with BPF_PTR_POISON,\nbecause it is unused by design.\n\n [1] https://lore.kernel.org/oe-lkp/202507160818.68358831-lkp@intel.com",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 16.0:cluster-md-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dtb-allwinner-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-altera-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amazon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amlogic-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apple-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-arm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-broadcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-cavium-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-exynos-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-freescale-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-hisilicon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-lg-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-marvell-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-mediatek-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-nvidia-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-qcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-renesas-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-rockchip-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-socionext-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-sprd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-xilinx-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-39990",
"url": "https://www.suse.com/security/cve/CVE-2025-39990"
},
{
"category": "external",
"summary": "SUSE Bug 1252054 for CVE-2025-39990",
"url": "https://bugzilla.suse.com/1252054"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 16.0:cluster-md-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dtb-allwinner-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-altera-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amazon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amlogic-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apple-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-arm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-broadcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-cavium-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-exynos-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-freescale-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-hisilicon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-lg-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-marvell-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-mediatek-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-nvidia-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-qcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-renesas-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-rockchip-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-socionext-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-sprd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-xilinx-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Leap 16.0:cluster-md-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dtb-allwinner-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-altera-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amazon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amlogic-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apple-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-arm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-broadcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-cavium-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-exynos-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-freescale-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-hisilicon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-lg-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-marvell-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-mediatek-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-nvidia-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-qcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-renesas-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-rockchip-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-socionext-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-sprd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-xilinx-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-19T17:38:16Z",
"details": "moderate"
}
],
"title": "CVE-2025-39990"
},
{
"cve": "CVE-2025-40001",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40001"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nscsi: mvsas: Fix use-after-free bugs in mvs_work_queue\n\nDuring the detaching of Marvell\u0027s SAS/SATA controller, the original code\ncalls cancel_delayed_work() in mvs_free() to cancel the delayed work\nitem mwq-\u003ework_q. However, if mwq-\u003ework_q is already running, the\ncancel_delayed_work() may fail to cancel it. This can lead to\nuse-after-free scenarios where mvs_free() frees the mvs_info while\nmvs_work_queue() is still executing and attempts to access the\nalready-freed mvs_info.\n\nA typical race condition is illustrated below:\n\nCPU 0 (remove) | CPU 1 (delayed work callback)\nmvs_pci_remove() |\n mvs_free() | mvs_work_queue()\n cancel_delayed_work() |\n kfree(mvi) |\n | mvi-\u003e // UAF\n\nReplace cancel_delayed_work() with cancel_delayed_work_sync() to ensure\nthat the delayed work item is properly canceled and any executing\ndelayed work item completes before the mvs_info is deallocated.\n\nThis bug was found by static analysis.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 16.0:cluster-md-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dtb-allwinner-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-altera-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amazon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amlogic-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apple-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-arm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-broadcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-cavium-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-exynos-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-freescale-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-hisilicon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-lg-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-marvell-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-mediatek-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-nvidia-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-qcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-renesas-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-rockchip-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-socionext-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-sprd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-xilinx-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40001",
"url": "https://www.suse.com/security/cve/CVE-2025-40001"
},
{
"category": "external",
"summary": "SUSE Bug 1252303 for CVE-2025-40001",
"url": "https://bugzilla.suse.com/1252303"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 16.0:cluster-md-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dtb-allwinner-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-altera-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amazon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amlogic-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apple-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-arm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-broadcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-cavium-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-exynos-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-freescale-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-hisilicon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-lg-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-marvell-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-mediatek-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-nvidia-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-qcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-renesas-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-rockchip-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-socionext-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-sprd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-xilinx-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.8,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H",
"version": "3.1"
},
"products": [
"openSUSE Leap 16.0:cluster-md-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dtb-allwinner-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-altera-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amazon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amlogic-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apple-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-arm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-broadcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-cavium-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-exynos-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-freescale-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-hisilicon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-lg-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-marvell-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-mediatek-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-nvidia-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-qcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-renesas-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-rockchip-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-socionext-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-sprd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-xilinx-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-19T17:38:16Z",
"details": "moderate"
}
],
"title": "CVE-2025-40001"
},
{
"cve": "CVE-2025-40003",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40003"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnet: mscc: ocelot: Fix use-after-free caused by cyclic delayed work\n\nThe origin code calls cancel_delayed_work() in ocelot_stats_deinit()\nto cancel the cyclic delayed work item ocelot-\u003estats_work. However,\ncancel_delayed_work() may fail to cancel the work item if it is already\nexecuting. While destroy_workqueue() does wait for all pending work items\nin the work queue to complete before destroying the work queue, it cannot\nprevent the delayed work item from being rescheduled within the\nocelot_check_stats_work() function. This limitation exists because the\ndelayed work item is only enqueued into the work queue after its timer\nexpires. Before the timer expiration, destroy_workqueue() has no visibility\nof this pending work item. Once the work queue appears empty,\ndestroy_workqueue() proceeds with destruction. When the timer eventually\nexpires, the delayed work item gets queued again, leading to the following\nwarning:\n\nworkqueue: cannot queue ocelot_check_stats_work on wq ocelot-switch-stats\nWARNING: CPU: 2 PID: 0 at kernel/workqueue.c:2255 __queue_work+0x875/0xaf0\n...\nRIP: 0010:__queue_work+0x875/0xaf0\n...\nRSP: 0018:ffff88806d108b10 EFLAGS: 00010086\nRAX: 0000000000000000 RBX: 0000000000000101 RCX: 0000000000000027\nRDX: 0000000000000027 RSI: 0000000000000004 RDI: ffff88806d123e88\nRBP: ffffffff813c3170 R08: 0000000000000000 R09: ffffed100da247d2\nR10: ffffed100da247d1 R11: ffff88806d123e8b R12: ffff88800c00f000\nR13: ffff88800d7285c0 R14: ffff88806d0a5580 R15: ffff88800d7285a0\nFS: 0000000000000000(0000) GS:ffff8880e5725000(0000) knlGS:0000000000000000\nCS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033\nCR2: 00007fe18e45ea10 CR3: 0000000005e6c000 CR4: 00000000000006f0\nCall Trace:\n \u003cIRQ\u003e\n ? kasan_report+0xc6/0xf0\n ? __pfx_delayed_work_timer_fn+0x10/0x10\n ? __pfx_delayed_work_timer_fn+0x10/0x10\n call_timer_fn+0x25/0x1c0\n __run_timer_base.part.0+0x3be/0x8c0\n ? __pfx_delayed_work_timer_fn+0x10/0x10\n ? rcu_sched_clock_irq+0xb06/0x27d0\n ? __pfx___run_timer_base.part.0+0x10/0x10\n ? try_to_wake_up+0xb15/0x1960\n ? _raw_spin_lock_irq+0x80/0xe0\n ? __pfx__raw_spin_lock_irq+0x10/0x10\n tmigr_handle_remote_up+0x603/0x7e0\n ? __pfx_tmigr_handle_remote_up+0x10/0x10\n ? sched_balance_trigger+0x1c0/0x9f0\n ? sched_tick+0x221/0x5a0\n ? _raw_spin_lock_irq+0x80/0xe0\n ? __pfx__raw_spin_lock_irq+0x10/0x10\n ? tick_nohz_handler+0x339/0x440\n ? __pfx_tmigr_handle_remote_up+0x10/0x10\n __walk_groups.isra.0+0x42/0x150\n tmigr_handle_remote+0x1f4/0x2e0\n ? __pfx_tmigr_handle_remote+0x10/0x10\n ? ktime_get+0x60/0x140\n ? lapic_next_event+0x11/0x20\n ? clockevents_program_event+0x1d4/0x2a0\n ? hrtimer_interrupt+0x322/0x780\n handle_softirqs+0x16a/0x550\n irq_exit_rcu+0xaf/0xe0\n sysvec_apic_timer_interrupt+0x70/0x80\n \u003c/IRQ\u003e\n...\n\nThe following diagram reveals the cause of the above warning:\n\nCPU 0 (remove) | CPU 1 (delayed work callback)\nmscc_ocelot_remove() |\n ocelot_deinit() | ocelot_check_stats_work()\n ocelot_stats_deinit() |\n cancel_delayed_work()| ...\n | queue_delayed_work()\n destroy_workqueue() | (wait a time)\n | __queue_work() //UAF\n\nThe above scenario actually constitutes a UAF vulnerability.\n\nThe ocelot_stats_deinit() is only invoked when initialization\nfailure or resource destruction, so we must ensure that any\ndelayed work items cannot be rescheduled.\n\nReplace cancel_delayed_work() with disable_delayed_work_sync()\nto guarantee proper cancellation of the delayed work item and\nensure completion of any currently executing work before the\nworkqueue is deallocated.\n\nA deadlock concern was considered: ocelot_stats_deinit() is called\nin a process context and is not holding any locks that the delayed\nwork item might also need. Therefore, the use of the _sync() variant\nis safe here.\n\nThis bug was identified through static analysis. To reproduce the\nissue and validate the fix, I simulated ocelot-swit\n---truncated---",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 16.0:cluster-md-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dtb-allwinner-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-altera-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amazon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amlogic-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apple-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-arm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-broadcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-cavium-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-exynos-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-freescale-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-hisilicon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-lg-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-marvell-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-mediatek-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-nvidia-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-qcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-renesas-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-rockchip-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-socionext-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-sprd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-xilinx-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40003",
"url": "https://www.suse.com/security/cve/CVE-2025-40003"
},
{
"category": "external",
"summary": "SUSE Bug 1252301 for CVE-2025-40003",
"url": "https://bugzilla.suse.com/1252301"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 16.0:cluster-md-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dtb-allwinner-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-altera-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amazon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amlogic-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apple-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-arm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-broadcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-cavium-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-exynos-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-freescale-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-hisilicon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-lg-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-marvell-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-mediatek-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-nvidia-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-qcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-renesas-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-rockchip-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-socionext-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-sprd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-xilinx-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:H",
"version": "3.1"
},
"products": [
"openSUSE Leap 16.0:cluster-md-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dtb-allwinner-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-altera-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amazon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amlogic-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apple-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-arm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-broadcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-cavium-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-exynos-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-freescale-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-hisilicon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-lg-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-marvell-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-mediatek-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-nvidia-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-qcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-renesas-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-rockchip-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-socionext-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-sprd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-xilinx-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-19T17:38:16Z",
"details": "moderate"
}
],
"title": "CVE-2025-40003"
},
{
"cve": "CVE-2025-40006",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40006"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nmm/hugetlb: fix folio is still mapped when deleted\n\nMigration may be raced with fallocating hole. remove_inode_single_folio\nwill unmap the folio if the folio is still mapped. However, it\u0027s called\nwithout folio lock. If the folio is migrated and the mapped pte has been\nconverted to migration entry, folio_mapped() returns false, and won\u0027t\nunmap it. Due to extra refcount held by remove_inode_single_folio,\nmigration fails, restores migration entry to normal pte, and the folio is\nmapped again. As a result, we triggered BUG in filemap_unaccount_folio.\n\nThe log is as follows:\n BUG: Bad page cache in process hugetlb pfn:156c00\n page: refcount:515 mapcount:0 mapping:0000000099fef6e1 index:0x0 pfn:0x156c00\n head: order:9 mapcount:1 entire_mapcount:1 nr_pages_mapped:0 pincount:0\n aops:hugetlbfs_aops ino:dcc dentry name(?):\"my_hugepage_file\"\n flags: 0x17ffffc00000c1(locked|waiters|head|node=0|zone=2|lastcpupid=0x1fffff)\n page_type: f4(hugetlb)\n page dumped because: still mapped when deleted\n CPU: 1 UID: 0 PID: 395 Comm: hugetlb Not tainted 6.17.0-rc5-00044-g7aac71907bde-dirty #484 NONE\n Hardware name: QEMU Ubuntu 24.04 PC (i440FX + PIIX, 1996), BIOS 0.0.0 02/06/2015\n Call Trace:\n \u003cTASK\u003e\n dump_stack_lvl+0x4f/0x70\n filemap_unaccount_folio+0xc4/0x1c0\n __filemap_remove_folio+0x38/0x1c0\n filemap_remove_folio+0x41/0xd0\n remove_inode_hugepages+0x142/0x250\n hugetlbfs_fallocate+0x471/0x5a0\n vfs_fallocate+0x149/0x380\n\nHold folio lock before checking if the folio is mapped to avold race with\nmigration.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 16.0:cluster-md-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dtb-allwinner-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-altera-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amazon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amlogic-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apple-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-arm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-broadcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-cavium-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-exynos-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-freescale-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-hisilicon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-lg-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-marvell-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-mediatek-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-nvidia-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-qcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-renesas-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-rockchip-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-socionext-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-sprd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-xilinx-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40006",
"url": "https://www.suse.com/security/cve/CVE-2025-40006"
},
{
"category": "external",
"summary": "SUSE Bug 1252342 for CVE-2025-40006",
"url": "https://bugzilla.suse.com/1252342"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 16.0:cluster-md-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dtb-allwinner-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-altera-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amazon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amlogic-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apple-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-arm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-broadcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-cavium-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-exynos-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-freescale-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-hisilicon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-lg-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-marvell-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-mediatek-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-nvidia-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-qcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-renesas-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-rockchip-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-socionext-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-sprd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-xilinx-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.7,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Leap 16.0:cluster-md-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dtb-allwinner-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-altera-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amazon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amlogic-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apple-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-arm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-broadcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-cavium-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-exynos-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-freescale-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-hisilicon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-lg-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-marvell-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-mediatek-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-nvidia-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-qcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-renesas-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-rockchip-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-socionext-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-sprd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-xilinx-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-19T17:38:16Z",
"details": "moderate"
}
],
"title": "CVE-2025-40006"
},
{
"cve": "CVE-2025-40021",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40021"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\ntracing: dynevent: Add a missing lockdown check on dynevent\n\nSince dynamic_events interface on tracefs is compatible with\nkprobe_events and uprobe_events, it should also check the lockdown\nstatus and reject if it is set.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 16.0:cluster-md-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dtb-allwinner-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-altera-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amazon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amlogic-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apple-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-arm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-broadcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-cavium-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-exynos-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-freescale-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-hisilicon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-lg-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-marvell-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-mediatek-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-nvidia-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-qcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-renesas-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-rockchip-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-socionext-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-sprd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-xilinx-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40021",
"url": "https://www.suse.com/security/cve/CVE-2025-40021"
},
{
"category": "external",
"summary": "SUSE Bug 1252681 for CVE-2025-40021",
"url": "https://bugzilla.suse.com/1252681"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 16.0:cluster-md-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dtb-allwinner-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-altera-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amazon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amlogic-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apple-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-arm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-broadcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-cavium-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-exynos-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-freescale-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-hisilicon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-lg-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-marvell-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-mediatek-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-nvidia-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-qcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-renesas-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-rockchip-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-socionext-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-sprd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-xilinx-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N",
"version": "3.1"
},
"products": [
"openSUSE Leap 16.0:cluster-md-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dtb-allwinner-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-altera-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amazon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amlogic-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apple-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-arm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-broadcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-cavium-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-exynos-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-freescale-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-hisilicon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-lg-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-marvell-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-mediatek-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-nvidia-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-qcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-renesas-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-rockchip-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-socionext-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-sprd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-xilinx-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-19T17:38:16Z",
"details": "moderate"
}
],
"title": "CVE-2025-40021"
},
{
"cve": "CVE-2025-40024",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40024"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nvhost: Take a reference on the task in struct vhost_task.\n\nvhost_task_create() creates a task and keeps a reference to its\ntask_struct. That task may exit early via a signal and its task_struct\nwill be released.\nA pending vhost_task_wake() will then attempt to wake the task and\naccess a task_struct which is no longer there.\n\nAcquire a reference on the task_struct while creating the thread and\nrelease the reference while the struct vhost_task itself is removed.\nIf the task exits early due to a signal, then the vhost_task_wake() will\nstill access a valid task_struct. The wake is safe and will be skipped\nin this case.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 16.0:cluster-md-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dtb-allwinner-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-altera-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amazon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amlogic-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apple-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-arm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-broadcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-cavium-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-exynos-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-freescale-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-hisilicon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-lg-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-marvell-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-mediatek-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-nvidia-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-qcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-renesas-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-rockchip-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-socionext-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-sprd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-xilinx-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40024",
"url": "https://www.suse.com/security/cve/CVE-2025-40024"
},
{
"category": "external",
"summary": "SUSE Bug 1252686 for CVE-2025-40024",
"url": "https://bugzilla.suse.com/1252686"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 16.0:cluster-md-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dtb-allwinner-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-altera-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amazon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amlogic-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apple-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-arm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-broadcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-cavium-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-exynos-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-freescale-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-hisilicon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-lg-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-marvell-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-mediatek-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-nvidia-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-qcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-renesas-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-rockchip-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-socionext-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-sprd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-xilinx-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Leap 16.0:cluster-md-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dtb-allwinner-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-altera-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amazon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amlogic-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apple-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-arm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-broadcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-cavium-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-exynos-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-freescale-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-hisilicon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-lg-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-marvell-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-mediatek-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-nvidia-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-qcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-renesas-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-rockchip-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-socionext-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-sprd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-xilinx-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-19T17:38:16Z",
"details": "moderate"
}
],
"title": "CVE-2025-40024"
},
{
"cve": "CVE-2025-40027",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40027"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnet/9p: fix double req put in p9_fd_cancelled\n\nSyzkaller reports a KASAN issue as below:\n\ngeneral protection fault, probably for non-canonical address 0xfbd59c0000000021: 0000 [#1] PREEMPT SMP KASAN NOPTI\nKASAN: maybe wild-memory-access in range [0xdead000000000108-0xdead00000000010f]\nCPU: 0 PID: 5083 Comm: syz-executor.2 Not tainted 6.1.134-syzkaller-00037-g855bd1d7d838 #0\nHardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014\nRIP: 0010:__list_del include/linux/list.h:114 [inline]\nRIP: 0010:__list_del_entry include/linux/list.h:137 [inline]\nRIP: 0010:list_del include/linux/list.h:148 [inline]\nRIP: 0010:p9_fd_cancelled+0xe9/0x200 net/9p/trans_fd.c:734\n\nCall Trace:\n \u003cTASK\u003e\n p9_client_flush+0x351/0x440 net/9p/client.c:614\n p9_client_rpc+0xb6b/0xc70 net/9p/client.c:734\n p9_client_version net/9p/client.c:920 [inline]\n p9_client_create+0xb51/0x1240 net/9p/client.c:1027\n v9fs_session_init+0x1f0/0x18f0 fs/9p/v9fs.c:408\n v9fs_mount+0xba/0xcb0 fs/9p/vfs_super.c:126\n legacy_get_tree+0x108/0x220 fs/fs_context.c:632\n vfs_get_tree+0x8e/0x300 fs/super.c:1573\n do_new_mount fs/namespace.c:3056 [inline]\n path_mount+0x6a6/0x1e90 fs/namespace.c:3386\n do_mount fs/namespace.c:3399 [inline]\n __do_sys_mount fs/namespace.c:3607 [inline]\n __se_sys_mount fs/namespace.c:3584 [inline]\n __x64_sys_mount+0x283/0x300 fs/namespace.c:3584\n do_syscall_x64 arch/x86/entry/common.c:51 [inline]\n do_syscall_64+0x35/0x80 arch/x86/entry/common.c:81\n entry_SYSCALL_64_after_hwframe+0x6e/0xd8\n\nThis happens because of a race condition between:\n\n- The 9p client sending an invalid flush request and later cleaning it up;\n- The 9p client in p9_read_work() canceled all pending requests.\n\n Thread 1 Thread 2\n ...\n p9_client_create()\n ...\n p9_fd_create()\n ...\n p9_conn_create()\n ...\n // start Thread 2\n INIT_WORK(\u0026m-\u003erq, p9_read_work);\n p9_read_work()\n ...\n p9_client_rpc()\n ...\n ...\n p9_conn_cancel()\n ...\n spin_lock(\u0026m-\u003ereq_lock);\n ...\n p9_fd_cancelled()\n ...\n ...\n spin_unlock(\u0026m-\u003ereq_lock);\n // status rewrite\n p9_client_cb(m-\u003eclient, req, REQ_STATUS_ERROR)\n // first remove\n list_del(\u0026req-\u003ereq_list);\n ...\n\n spin_lock(\u0026m-\u003ereq_lock)\n ...\n // second remove\n list_del(\u0026req-\u003ereq_list);\n spin_unlock(\u0026m-\u003ereq_lock)\n ...\n\nCommit 74d6a5d56629 (\"9p/trans_fd: Fix concurrency del of req_list in\np9_fd_cancelled/p9_read_work\") fixes a concurrency issue in the 9p filesystem\nclient where the req_list could be deleted simultaneously by both\np9_read_work and p9_fd_cancelled functions, but for the case where req-\u003estatus\nequals REQ_STATUS_RCVD.\n\nUpdate the check for req-\u003estatus in p9_fd_cancelled to skip processing not\njust received requests, but anything that is not SENT, as whatever\nchanged the state from SENT also removed the request from its list.\n\nFound by Linux Verification Center (linuxtesting.org) with Syzkaller.\n\n[updated the check from status == RECV || status == ERROR to status != SENT]",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 16.0:cluster-md-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dtb-allwinner-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-altera-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amazon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amlogic-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apple-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-arm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-broadcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-cavium-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-exynos-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-freescale-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-hisilicon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-lg-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-marvell-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-mediatek-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-nvidia-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-qcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-renesas-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-rockchip-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-socionext-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-sprd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-xilinx-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40027",
"url": "https://www.suse.com/security/cve/CVE-2025-40027"
},
{
"category": "external",
"summary": "SUSE Bug 1252763 for CVE-2025-40027",
"url": "https://bugzilla.suse.com/1252763"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 16.0:cluster-md-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dtb-allwinner-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-altera-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amazon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amlogic-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apple-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-arm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-broadcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-cavium-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-exynos-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-freescale-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-hisilicon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-lg-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-marvell-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-mediatek-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-nvidia-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-qcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-renesas-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-rockchip-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-socionext-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-sprd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-xilinx-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:H",
"version": "3.1"
},
"products": [
"openSUSE Leap 16.0:cluster-md-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dtb-allwinner-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-altera-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amazon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amlogic-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apple-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-arm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-broadcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-cavium-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-exynos-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-freescale-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-hisilicon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-lg-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-marvell-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-mediatek-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-nvidia-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-qcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-renesas-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-rockchip-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-socionext-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-sprd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-xilinx-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-19T17:38:16Z",
"details": "moderate"
}
],
"title": "CVE-2025-40027"
},
{
"cve": "CVE-2025-40031",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40031"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\ntee: fix register_shm_helper()\n\nIn register_shm_helper(), fix incorrect error handling for a call to\niov_iter_extract_pages(). A case is missing for when\niov_iter_extract_pages() only got some pages and return a number larger\nthan 0, but not the requested amount.\n\nThis fixes a possible NULL pointer dereference following a bad input from\nioctl(TEE_IOC_SHM_REGISTER) where parts of the buffer isn\u0027t mapped.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 16.0:cluster-md-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dtb-allwinner-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-altera-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amazon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amlogic-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apple-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-arm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-broadcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-cavium-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-exynos-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-freescale-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-hisilicon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-lg-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-marvell-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-mediatek-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-nvidia-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-qcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-renesas-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-rockchip-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-socionext-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-sprd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-xilinx-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40031",
"url": "https://www.suse.com/security/cve/CVE-2025-40031"
},
{
"category": "external",
"summary": "SUSE Bug 1252779 for CVE-2025-40031",
"url": "https://bugzilla.suse.com/1252779"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 16.0:cluster-md-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dtb-allwinner-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-altera-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amazon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amlogic-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apple-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-arm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-broadcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-cavium-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-exynos-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-freescale-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-hisilicon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-lg-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-marvell-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-mediatek-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-nvidia-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-qcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-renesas-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-rockchip-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-socionext-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-sprd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-xilinx-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Leap 16.0:cluster-md-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dtb-allwinner-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-altera-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amazon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amlogic-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apple-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-arm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-broadcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-cavium-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-exynos-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-freescale-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-hisilicon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-lg-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-marvell-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-mediatek-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-nvidia-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-qcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-renesas-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-rockchip-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-socionext-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-sprd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-xilinx-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-19T17:38:16Z",
"details": "moderate"
}
],
"title": "CVE-2025-40031"
},
{
"cve": "CVE-2025-40033",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40033"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nremoteproc: pru: Fix potential NULL pointer dereference in pru_rproc_set_ctable()\n\npru_rproc_set_ctable() accessed rproc-\u003epriv before the IS_ERR_OR_NULL\ncheck, which could lead to a null pointer dereference. Move the pru\nassignment, ensuring we never dereference a NULL rproc pointer.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 16.0:cluster-md-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dtb-allwinner-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-altera-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amazon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amlogic-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apple-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-arm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-broadcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-cavium-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-exynos-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-freescale-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-hisilicon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-lg-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-marvell-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-mediatek-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-nvidia-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-qcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-renesas-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-rockchip-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-socionext-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-sprd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-xilinx-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40033",
"url": "https://www.suse.com/security/cve/CVE-2025-40033"
},
{
"category": "external",
"summary": "SUSE Bug 1252824 for CVE-2025-40033",
"url": "https://bugzilla.suse.com/1252824"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 16.0:cluster-md-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dtb-allwinner-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-altera-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amazon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amlogic-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apple-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-arm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-broadcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-cavium-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-exynos-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-freescale-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-hisilicon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-lg-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-marvell-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-mediatek-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-nvidia-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-qcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-renesas-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-rockchip-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-socionext-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-sprd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-xilinx-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Leap 16.0:cluster-md-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dtb-allwinner-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-altera-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amazon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amlogic-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apple-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-arm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-broadcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-cavium-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-exynos-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-freescale-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-hisilicon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-lg-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-marvell-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-mediatek-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-nvidia-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-qcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-renesas-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-rockchip-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-socionext-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-sprd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-xilinx-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-19T17:38:16Z",
"details": "moderate"
}
],
"title": "CVE-2025-40033"
},
{
"cve": "CVE-2025-40038",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40038"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nKVM: SVM: Skip fastpath emulation on VM-Exit if next RIP isn\u0027t valid\n\nSkip the WRMSR and HLT fastpaths in SVM\u0027s VM-Exit handler if the next RIP\nisn\u0027t valid, e.g. because KVM is running with nrips=false. SVM must\ndecode and emulate to skip the instruction if the CPU doesn\u0027t provide the\nnext RIP, and getting the instruction bytes to decode requires reading\nguest memory. Reading guest memory through the emulator can fault, i.e.\ncan sleep, which is disallowed since the fastpath handlers run with IRQs\ndisabled.\n\n BUG: sleeping function called from invalid context at ./include/linux/uaccess.h:106\n in_atomic(): 1, irqs_disabled(): 1, non_block: 0, pid: 32611, name: qemu\n preempt_count: 1, expected: 0\n INFO: lockdep is turned off.\n irq event stamp: 30580\n hardirqs last enabled at (30579): [\u003cffffffffc08b2527\u003e] vcpu_run+0x1787/0x1db0 [kvm]\n hardirqs last disabled at (30580): [\u003cffffffffb4f62e32\u003e] __schedule+0x1e2/0xed0\n softirqs last enabled at (30570): [\u003cffffffffb4247a64\u003e] fpu_swap_kvm_fpstate+0x44/0x210\n softirqs last disabled at (30568): [\u003cffffffffb4247a64\u003e] fpu_swap_kvm_fpstate+0x44/0x210\n CPU: 298 UID: 0 PID: 32611 Comm: qemu Tainted: G U 6.16.0-smp--e6c618b51cfe-sleep #782 NONE\n Tainted: [U]=USER\n Hardware name: Google Astoria-Turin/astoria, BIOS 0.20241223.2-0 01/17/2025\n Call Trace:\n \u003cTASK\u003e\n dump_stack_lvl+0x7d/0xb0\n __might_resched+0x271/0x290\n __might_fault+0x28/0x80\n kvm_vcpu_read_guest_page+0x8d/0xc0 [kvm]\n kvm_fetch_guest_virt+0x92/0xc0 [kvm]\n __do_insn_fetch_bytes+0xf3/0x1e0 [kvm]\n x86_decode_insn+0xd1/0x1010 [kvm]\n x86_emulate_instruction+0x105/0x810 [kvm]\n __svm_skip_emulated_instruction+0xc4/0x140 [kvm_amd]\n handle_fastpath_invd+0xc4/0x1a0 [kvm]\n vcpu_run+0x11a1/0x1db0 [kvm]\n kvm_arch_vcpu_ioctl_run+0x5cc/0x730 [kvm]\n kvm_vcpu_ioctl+0x578/0x6a0 [kvm]\n __se_sys_ioctl+0x6d/0xb0\n do_syscall_64+0x8a/0x2c0\n entry_SYSCALL_64_after_hwframe+0x4b/0x53\n RIP: 0033:0x7f479d57a94b\n \u003c/TASK\u003e\n\nNote, this is essentially a reapply of commit 5c30e8101e8d (\"KVM: SVM:\nSkip WRMSR fastpath on VM-Exit if next RIP isn\u0027t valid\"), but with\ndifferent justification (KVM now grabs SRCU when skipping the instruction\nfor other reasons).",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 16.0:cluster-md-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dtb-allwinner-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-altera-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amazon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amlogic-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apple-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-arm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-broadcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-cavium-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-exynos-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-freescale-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-hisilicon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-lg-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-marvell-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-mediatek-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-nvidia-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-qcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-renesas-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-rockchip-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-socionext-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-sprd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-xilinx-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40038",
"url": "https://www.suse.com/security/cve/CVE-2025-40038"
},
{
"category": "external",
"summary": "SUSE Bug 1252817 for CVE-2025-40038",
"url": "https://bugzilla.suse.com/1252817"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 16.0:cluster-md-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dtb-allwinner-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-altera-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amazon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amlogic-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apple-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-arm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-broadcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-cavium-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-exynos-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-freescale-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-hisilicon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-lg-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-marvell-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-mediatek-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-nvidia-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-qcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-renesas-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-rockchip-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-socionext-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-sprd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-xilinx-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Leap 16.0:cluster-md-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dtb-allwinner-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-altera-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amazon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amlogic-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apple-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-arm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-broadcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-cavium-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-exynos-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-freescale-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-hisilicon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-lg-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-marvell-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-mediatek-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-nvidia-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-qcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-renesas-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-rockchip-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-socionext-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-sprd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-xilinx-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-19T17:38:16Z",
"details": "moderate"
}
],
"title": "CVE-2025-40038"
},
{
"cve": "CVE-2025-40047",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40047"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nio_uring/waitid: always prune wait queue entry in io_waitid_wait()\n\nFor a successful return, always remove our entry from the wait queue\nentry list. Previously this was skipped if a cancelation was in\nprogress, but this can race with another invocation of the wait queue\nentry callback.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 16.0:cluster-md-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dtb-allwinner-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-altera-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amazon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amlogic-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apple-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-arm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-broadcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-cavium-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-exynos-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-freescale-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-hisilicon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-lg-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-marvell-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-mediatek-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-nvidia-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-qcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-renesas-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-rockchip-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-socionext-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-sprd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-xilinx-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40047",
"url": "https://www.suse.com/security/cve/CVE-2025-40047"
},
{
"category": "external",
"summary": "SUSE Bug 1252790 for CVE-2025-40047",
"url": "https://bugzilla.suse.com/1252790"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 16.0:cluster-md-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dtb-allwinner-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-altera-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amazon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amlogic-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apple-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-arm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-broadcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-cavium-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-exynos-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-freescale-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-hisilicon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-lg-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-marvell-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-mediatek-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-nvidia-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-qcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-renesas-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-rockchip-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-socionext-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-sprd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-xilinx-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.7,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Leap 16.0:cluster-md-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dtb-allwinner-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-altera-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amazon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amlogic-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apple-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-arm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-broadcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-cavium-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-exynos-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-freescale-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-hisilicon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-lg-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-marvell-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-mediatek-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-nvidia-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-qcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-renesas-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-rockchip-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-socionext-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-sprd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-xilinx-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-19T17:38:16Z",
"details": "moderate"
}
],
"title": "CVE-2025-40047"
},
{
"cve": "CVE-2025-40053",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40053"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnet: dlink: handle copy_thresh allocation failure\n\nThe driver did not handle failure of `netdev_alloc_skb_ip_align()`.\nIf the allocation failed, dereferencing `skb-\u003eprotocol` could lead to\na NULL pointer dereference.\n\nThis patch tries to allocate `skb`. If the allocation fails, it falls\nback to the normal path.\n\nTested-on: D-Link DGE-550T Rev-A3",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 16.0:cluster-md-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dtb-allwinner-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-altera-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amazon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amlogic-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apple-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-arm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-broadcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-cavium-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-exynos-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-freescale-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-hisilicon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-lg-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-marvell-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-mediatek-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-nvidia-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-qcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-renesas-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-rockchip-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-socionext-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-sprd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-xilinx-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40053",
"url": "https://www.suse.com/security/cve/CVE-2025-40053"
},
{
"category": "external",
"summary": "SUSE Bug 1252808 for CVE-2025-40053",
"url": "https://bugzilla.suse.com/1252808"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 16.0:cluster-md-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dtb-allwinner-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-altera-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amazon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amlogic-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apple-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-arm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-broadcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-cavium-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-exynos-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-freescale-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-hisilicon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-lg-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-marvell-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-mediatek-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-nvidia-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-qcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-renesas-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-rockchip-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-socionext-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-sprd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-xilinx-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Leap 16.0:cluster-md-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dtb-allwinner-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-altera-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amazon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amlogic-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apple-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-arm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-broadcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-cavium-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-exynos-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-freescale-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-hisilicon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-lg-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-marvell-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-mediatek-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-nvidia-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-qcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-renesas-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-rockchip-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-socionext-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-sprd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-xilinx-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-19T17:38:16Z",
"details": "moderate"
}
],
"title": "CVE-2025-40053"
},
{
"cve": "CVE-2025-40055",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40055"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nocfs2: fix double free in user_cluster_connect()\n\nuser_cluster_disconnect() frees \"conn-\u003ecc_private\" which is \"lc\" but then\nthe error handling frees \"lc\" a second time. Set \"lc\" to NULL on this\npath to avoid a double free.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 16.0:cluster-md-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dtb-allwinner-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-altera-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amazon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amlogic-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apple-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-arm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-broadcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-cavium-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-exynos-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-freescale-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-hisilicon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-lg-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-marvell-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-mediatek-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-nvidia-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-qcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-renesas-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-rockchip-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-socionext-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-sprd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-xilinx-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40055",
"url": "https://www.suse.com/security/cve/CVE-2025-40055"
},
{
"category": "external",
"summary": "SUSE Bug 1252821 for CVE-2025-40055",
"url": "https://bugzilla.suse.com/1252821"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 16.0:cluster-md-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dtb-allwinner-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-altera-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amazon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amlogic-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apple-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-arm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-broadcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-cavium-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-exynos-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-freescale-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-hisilicon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-lg-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-marvell-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-mediatek-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-nvidia-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-qcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-renesas-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-rockchip-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-socionext-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-sprd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-xilinx-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Leap 16.0:cluster-md-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dtb-allwinner-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-altera-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amazon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amlogic-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apple-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-arm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-broadcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-cavium-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-exynos-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-freescale-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-hisilicon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-lg-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-marvell-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-mediatek-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-nvidia-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-qcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-renesas-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-rockchip-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-socionext-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-sprd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-xilinx-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-19T17:38:16Z",
"details": "moderate"
}
],
"title": "CVE-2025-40055"
},
{
"cve": "CVE-2025-40059",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40059"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\ncoresight: Fix incorrect handling for return value of devm_kzalloc\n\nThe return value of devm_kzalloc could be an null pointer,\nuse \"!desc.pdata\" to fix incorrect handling return value\nof devm_kzalloc.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 16.0:cluster-md-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dtb-allwinner-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-altera-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amazon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amlogic-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apple-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-arm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-broadcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-cavium-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-exynos-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-freescale-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-hisilicon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-lg-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-marvell-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-mediatek-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-nvidia-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-qcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-renesas-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-rockchip-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-socionext-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-sprd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-xilinx-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40059",
"url": "https://www.suse.com/security/cve/CVE-2025-40059"
},
{
"category": "external",
"summary": "SUSE Bug 1252809 for CVE-2025-40059",
"url": "https://bugzilla.suse.com/1252809"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 16.0:cluster-md-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dtb-allwinner-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-altera-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amazon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amlogic-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apple-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-arm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-broadcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-cavium-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-exynos-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-freescale-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-hisilicon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-lg-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-marvell-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-mediatek-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-nvidia-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-qcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-renesas-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-rockchip-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-socionext-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-sprd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-xilinx-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Leap 16.0:cluster-md-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dtb-allwinner-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-altera-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amazon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amlogic-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apple-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-arm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-broadcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-cavium-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-exynos-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-freescale-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-hisilicon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-lg-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-marvell-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-mediatek-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-nvidia-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-qcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-renesas-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-rockchip-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-socionext-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-sprd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-xilinx-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-19T17:38:16Z",
"details": "moderate"
}
],
"title": "CVE-2025-40059"
},
{
"cve": "CVE-2025-40064",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40064"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nsmc: Fix use-after-free in __pnet_find_base_ndev().\n\nsyzbot reported use-after-free of net_device in __pnet_find_base_ndev(),\nwhich was called during connect(). [0]\n\nsmc_pnet_find_ism_resource() fetches sk_dst_get(sk)-\u003edev and passes\ndown to pnet_find_base_ndev(), where RTNL is held. Then, UAF happened\nat __pnet_find_base_ndev() when the dev is first used.\n\nThis means dev had already been freed before acquiring RTNL in\npnet_find_base_ndev().\n\nWhile dev is going away, dst-\u003edev could be swapped with blackhole_netdev,\nand the dev\u0027s refcnt by dst will be released.\n\nWe must hold dev\u0027s refcnt before calling smc_pnet_find_ism_resource().\n\nAlso, smc_pnet_find_roce_resource() has the same problem.\n\nLet\u0027s use __sk_dst_get() and dst_dev_rcu() in the two functions.\n\n[0]:\nBUG: KASAN: use-after-free in __pnet_find_base_ndev+0x1b1/0x1c0 net/smc/smc_pnet.c:926\nRead of size 1 at addr ffff888036bac33a by task syz.0.3632/18609\n\nCPU: 1 UID: 0 PID: 18609 Comm: syz.0.3632 Not tainted syzkaller #0 PREEMPT(full)\nHardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/18/2025\nCall Trace:\n \u003cTASK\u003e\n dump_stack_lvl+0x189/0x250 lib/dump_stack.c:120\n print_address_description mm/kasan/report.c:378 [inline]\n print_report+0xca/0x240 mm/kasan/report.c:482\n kasan_report+0x118/0x150 mm/kasan/report.c:595\n __pnet_find_base_ndev+0x1b1/0x1c0 net/smc/smc_pnet.c:926\n pnet_find_base_ndev net/smc/smc_pnet.c:946 [inline]\n smc_pnet_find_ism_by_pnetid net/smc/smc_pnet.c:1103 [inline]\n smc_pnet_find_ism_resource+0xef/0x390 net/smc/smc_pnet.c:1154\n smc_find_ism_device net/smc/af_smc.c:1030 [inline]\n smc_find_proposal_devices net/smc/af_smc.c:1115 [inline]\n __smc_connect+0x372/0x1890 net/smc/af_smc.c:1545\n smc_connect+0x877/0xd90 net/smc/af_smc.c:1715\n __sys_connect_file net/socket.c:2086 [inline]\n __sys_connect+0x313/0x440 net/socket.c:2105\n __do_sys_connect net/socket.c:2111 [inline]\n __se_sys_connect net/socket.c:2108 [inline]\n __x64_sys_connect+0x7a/0x90 net/socket.c:2108\n do_syscall_x64 arch/x86/entry/syscall_64.c:63 [inline]\n do_syscall_64+0xfa/0x3b0 arch/x86/entry/syscall_64.c:94\n entry_SYSCALL_64_after_hwframe+0x77/0x7f\nRIP: 0033:0x7f47cbf8eba9\nCode: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 \u003c48\u003e 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48\nRSP: 002b:00007f47ccdb1038 EFLAGS: 00000246 ORIG_RAX: 000000000000002a\nRAX: ffffffffffffffda RBX: 00007f47cc1d5fa0 RCX: 00007f47cbf8eba9\nRDX: 0000000000000010 RSI: 0000200000000280 RDI: 000000000000000b\nRBP: 00007f47cc011e19 R08: 0000000000000000 R09: 0000000000000000\nR10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000\nR13: 00007f47cc1d6038 R14: 00007f47cc1d5fa0 R15: 00007ffc512f8aa8\n \u003c/TASK\u003e\n\nThe buggy address belongs to the physical page:\npage: refcount:0 mapcount:0 mapping:0000000000000000 index:0xffff888036bacd00 pfn:0x36bac\nflags: 0xfff00000000000(node=0|zone=1|lastcpupid=0x7ff)\nraw: 00fff00000000000 ffffea0001243d08 ffff8880b863fdc0 0000000000000000\nraw: ffff888036bacd00 0000000000000000 00000000ffffffff 0000000000000000\npage dumped because: kasan: bad access detected\npage_owner tracks the page as freed\npage last allocated via order 2, migratetype Unmovable, gfp_mask 0x446dc0(GFP_KERNEL_ACCOUNT|__GFP_ZERO|__GFP_NOWARN|__GFP_RETRY_MAYFAIL|__GFP_COMP), pid 16741, tgid 16741 (syz-executor), ts 343313197788, free_ts 380670750466\n set_page_owner include/linux/page_owner.h:32 [inline]\n post_alloc_hook+0x240/0x2a0 mm/page_alloc.c:1851\n prep_new_page mm/page_alloc.c:1859 [inline]\n get_page_from_freelist+0x21e4/0x22c0 mm/page_alloc.c:3858\n __alloc_frozen_pages_noprof+0x181/0x370 mm/page_alloc.c:5148\n alloc_pages_mpol+0x232/0x4a0 mm/mempolicy.c:2416\n ___kmalloc_large_node+0x5f/0x1b0 mm/slub.c:4317\n __kmalloc_large_node_noprof+0x18/0x90 mm/slub.c:4348\n __do_kmalloc_node mm/slub.c:4364 [inline]\n __kvmalloc_node\n---truncated---",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 16.0:cluster-md-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dtb-allwinner-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-altera-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amazon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amlogic-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apple-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-arm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-broadcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-cavium-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-exynos-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-freescale-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-hisilicon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-lg-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-marvell-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-mediatek-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-nvidia-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-qcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-renesas-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-rockchip-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-socionext-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-sprd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-xilinx-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40064",
"url": "https://www.suse.com/security/cve/CVE-2025-40064"
},
{
"category": "external",
"summary": "SUSE Bug 1252845 for CVE-2025-40064",
"url": "https://bugzilla.suse.com/1252845"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 16.0:cluster-md-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dtb-allwinner-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-altera-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amazon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amlogic-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apple-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-arm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-broadcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-cavium-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-exynos-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-freescale-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-hisilicon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-lg-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-marvell-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-mediatek-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-nvidia-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-qcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-renesas-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-rockchip-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-socionext-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-sprd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-xilinx-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Leap 16.0:cluster-md-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dtb-allwinner-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-altera-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amazon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amlogic-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apple-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-arm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-broadcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-cavium-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-exynos-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-freescale-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-hisilicon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-lg-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-marvell-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-mediatek-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-nvidia-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-qcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-renesas-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-rockchip-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-socionext-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-sprd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-xilinx-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-19T17:38:16Z",
"details": "moderate"
}
],
"title": "CVE-2025-40064"
},
{
"cve": "CVE-2025-40070",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40070"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\npps: fix warning in pps_register_cdev when register device fail\n\nSimilar to previous commit 2a934fdb01db (\"media: v4l2-dev: fix error\nhandling in __video_register_device()\"), the release hook should be set\nbefore device_register(). Otherwise, when device_register() return error\nand put_device() try to callback the release function, the below warning\nmay happen.\n\n ------------[ cut here ]------------\n WARNING: CPU: 1 PID: 4760 at drivers/base/core.c:2567 device_release+0x1bd/0x240 drivers/base/core.c:2567\n Modules linked in:\n CPU: 1 UID: 0 PID: 4760 Comm: syz.4.914 Not tainted 6.17.0-rc3+ #1 NONE\n RIP: 0010:device_release+0x1bd/0x240 drivers/base/core.c:2567\n Call Trace:\n \u003cTASK\u003e\n kobject_cleanup+0x136/0x410 lib/kobject.c:689\n kobject_release lib/kobject.c:720 [inline]\n kref_put include/linux/kref.h:65 [inline]\n kobject_put+0xe9/0x130 lib/kobject.c:737\n put_device+0x24/0x30 drivers/base/core.c:3797\n pps_register_cdev+0x2da/0x370 drivers/pps/pps.c:402\n pps_register_source+0x2f6/0x480 drivers/pps/kapi.c:108\n pps_tty_open+0x190/0x310 drivers/pps/clients/pps-ldisc.c:57\n tty_ldisc_open+0xa7/0x120 drivers/tty/tty_ldisc.c:432\n tty_set_ldisc+0x333/0x780 drivers/tty/tty_ldisc.c:563\n tiocsetd drivers/tty/tty_io.c:2429 [inline]\n tty_ioctl+0x5d1/0x1700 drivers/tty/tty_io.c:2728\n vfs_ioctl fs/ioctl.c:51 [inline]\n __do_sys_ioctl fs/ioctl.c:598 [inline]\n __se_sys_ioctl fs/ioctl.c:584 [inline]\n __x64_sys_ioctl+0x194/0x210 fs/ioctl.c:584\n do_syscall_x64 arch/x86/entry/syscall_64.c:63 [inline]\n do_syscall_64+0x5f/0x2a0 arch/x86/entry/syscall_64.c:94\n entry_SYSCALL_64_after_hwframe+0x76/0x7e\n \u003c/TASK\u003e\n\nBefore commit c79a39dc8d06 (\"pps: Fix a use-after-free\"),\npps_register_cdev() call device_create() to create pps-\u003edev, which will\ninit dev-\u003erelease to device_create_release(). Now the comment is outdated,\njust remove it.\n\nThanks for the reminder from Calvin Owens, \u0027kfree_pps\u0027 should be removed\nin pps_register_source() to avoid a double free in the failure case.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 16.0:cluster-md-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dtb-allwinner-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-altera-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amazon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amlogic-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apple-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-arm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-broadcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-cavium-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-exynos-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-freescale-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-hisilicon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-lg-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-marvell-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-mediatek-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-nvidia-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-qcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-renesas-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-rockchip-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-socionext-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-sprd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-xilinx-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40070",
"url": "https://www.suse.com/security/cve/CVE-2025-40070"
},
{
"category": "external",
"summary": "SUSE Bug 1252836 for CVE-2025-40070",
"url": "https://bugzilla.suse.com/1252836"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 16.0:cluster-md-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dtb-allwinner-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-altera-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amazon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amlogic-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apple-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-arm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-broadcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-cavium-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-exynos-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-freescale-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-hisilicon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-lg-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-marvell-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-mediatek-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-nvidia-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-qcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-renesas-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-rockchip-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-socionext-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-sprd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-xilinx-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Leap 16.0:cluster-md-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dtb-allwinner-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-altera-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amazon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amlogic-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apple-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-arm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-broadcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-cavium-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-exynos-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-freescale-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-hisilicon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-lg-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-marvell-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-mediatek-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-nvidia-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-qcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-renesas-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-rockchip-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-socionext-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-sprd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-xilinx-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-19T17:38:16Z",
"details": "moderate"
}
],
"title": "CVE-2025-40070"
},
{
"cve": "CVE-2025-40074",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40074"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nipv4: start using dst_dev_rcu()\n\nChange icmpv4_xrlim_allow(), ip_defrag() to prevent possible UAF.\n\nChange ipmr_prepare_xmit(), ipmr_queue_fwd_xmit(), ip_mr_output(),\nipv4_neigh_lookup() to use lockdep enabled dst_dev_rcu().",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 16.0:cluster-md-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dtb-allwinner-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-altera-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amazon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amlogic-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apple-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-arm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-broadcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-cavium-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-exynos-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-freescale-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-hisilicon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-lg-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-marvell-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-mediatek-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-nvidia-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-qcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-renesas-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-rockchip-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-socionext-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-sprd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-xilinx-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40074",
"url": "https://www.suse.com/security/cve/CVE-2025-40074"
},
{
"category": "external",
"summary": "SUSE Bug 1252794 for CVE-2025-40074",
"url": "https://bugzilla.suse.com/1252794"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 16.0:cluster-md-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dtb-allwinner-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-altera-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amazon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amlogic-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apple-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-arm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-broadcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-cavium-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-exynos-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-freescale-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-hisilicon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-lg-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-marvell-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-mediatek-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-nvidia-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-qcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-renesas-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-rockchip-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-socionext-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-sprd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-xilinx-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Leap 16.0:cluster-md-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dtb-allwinner-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-altera-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amazon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amlogic-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apple-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-arm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-broadcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-cavium-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-exynos-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-freescale-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-hisilicon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-lg-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-marvell-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-mediatek-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-nvidia-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-qcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-renesas-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-rockchip-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-socionext-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-sprd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-xilinx-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-19T17:38:16Z",
"details": "moderate"
}
],
"title": "CVE-2025-40074"
},
{
"cve": "CVE-2025-40075",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40075"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\ntcp_metrics: use dst_dev_net_rcu()\n\nReplace three dst_dev() with a lockdep enabled helper.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 16.0:cluster-md-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dtb-allwinner-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-altera-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amazon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amlogic-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apple-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-arm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-broadcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-cavium-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-exynos-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-freescale-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-hisilicon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-lg-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-marvell-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-mediatek-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-nvidia-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-qcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-renesas-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-rockchip-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-socionext-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-sprd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-xilinx-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40075",
"url": "https://www.suse.com/security/cve/CVE-2025-40075"
},
{
"category": "external",
"summary": "SUSE Bug 1252795 for CVE-2025-40075",
"url": "https://bugzilla.suse.com/1252795"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 16.0:cluster-md-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dtb-allwinner-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-altera-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amazon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amlogic-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apple-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-arm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-broadcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-cavium-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-exynos-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-freescale-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-hisilicon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-lg-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-marvell-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-mediatek-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-nvidia-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-qcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-renesas-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-rockchip-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-socionext-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-sprd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-xilinx-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Leap 16.0:cluster-md-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dtb-allwinner-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-altera-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amazon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amlogic-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apple-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-arm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-broadcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-cavium-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-exynos-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-freescale-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-hisilicon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-lg-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-marvell-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-mediatek-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-nvidia-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-qcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-renesas-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-rockchip-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-socionext-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-sprd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-xilinx-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-19T17:38:16Z",
"details": "moderate"
}
],
"title": "CVE-2025-40075"
},
{
"cve": "CVE-2025-40081",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40081"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nperf: arm_spe: Prevent overflow in PERF_IDX2OFF()\n\nCast nr_pages to unsigned long to avoid overflow when handling large\nAUX buffer sizes (\u003e= 2 GiB).",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 16.0:cluster-md-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dtb-allwinner-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-altera-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amazon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amlogic-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apple-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-arm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-broadcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-cavium-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-exynos-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-freescale-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-hisilicon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-lg-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-marvell-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-mediatek-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-nvidia-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-qcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-renesas-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-rockchip-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-socionext-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-sprd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-xilinx-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40081",
"url": "https://www.suse.com/security/cve/CVE-2025-40081"
},
{
"category": "external",
"summary": "SUSE Bug 1252776 for CVE-2025-40081",
"url": "https://bugzilla.suse.com/1252776"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 16.0:cluster-md-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dtb-allwinner-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-altera-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amazon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amlogic-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apple-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-arm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-broadcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-cavium-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-exynos-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-freescale-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-hisilicon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-lg-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-marvell-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-mediatek-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-nvidia-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-qcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-renesas-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-rockchip-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-socionext-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-sprd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-xilinx-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Leap 16.0:cluster-md-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dtb-allwinner-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-altera-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amazon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amlogic-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apple-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-arm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-broadcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-cavium-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-exynos-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-freescale-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-hisilicon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-lg-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-marvell-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-mediatek-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-nvidia-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-qcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-renesas-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-rockchip-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-socionext-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-sprd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-xilinx-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-19T17:38:16Z",
"details": "moderate"
}
],
"title": "CVE-2025-40081"
},
{
"cve": "CVE-2025-40083",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40083"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnet/sched: sch_qfq: Fix null-deref in agg_dequeue\n\nTo prevent a potential crash in agg_dequeue (net/sched/sch_qfq.c)\nwhen cl-\u003eqdisc-\u003eops-\u003epeek(cl-\u003eqdisc) returns NULL, we check the return\nvalue before using it, similar to the existing approach in sch_hfsc.c.\n\nTo avoid code duplication, the following changes are made:\n\n1. Changed qdisc_warn_nonwc(include/net/pkt_sched.h) into a static\ninline function.\n\n2. Moved qdisc_peek_len from net/sched/sch_hfsc.c to\ninclude/net/pkt_sched.h so that sch_qfq can reuse it.\n\n3. Applied qdisc_peek_len in agg_dequeue to avoid crashing.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 16.0:cluster-md-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dtb-allwinner-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-altera-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amazon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amlogic-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apple-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-arm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-broadcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-cavium-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-exynos-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-freescale-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-hisilicon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-lg-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-marvell-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-mediatek-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-nvidia-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-qcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-renesas-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-rockchip-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-socionext-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-sprd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-xilinx-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40083",
"url": "https://www.suse.com/security/cve/CVE-2025-40083"
},
{
"category": "external",
"summary": "SUSE Bug 1252912 for CVE-2025-40083",
"url": "https://bugzilla.suse.com/1252912"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 16.0:cluster-md-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dtb-allwinner-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-altera-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amazon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amlogic-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apple-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-arm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-broadcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-cavium-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-exynos-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-freescale-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-hisilicon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-lg-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-marvell-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-mediatek-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-nvidia-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-qcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-renesas-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-rockchip-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-socionext-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-sprd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-xilinx-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Leap 16.0:cluster-md-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dtb-allwinner-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-altera-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amazon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amlogic-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apple-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-arm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-broadcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-cavium-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-exynos-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-freescale-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-hisilicon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-lg-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-marvell-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-mediatek-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-nvidia-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-qcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-renesas-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-rockchip-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-socionext-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-sprd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-xilinx-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-19T17:38:16Z",
"details": "moderate"
}
],
"title": "CVE-2025-40083"
},
{
"cve": "CVE-2025-40086",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40086"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\ndrm/xe: Don\u0027t allow evicting of BOs in same VM in array of VM binds\n\nAn array of VM binds can potentially evict other buffer objects (BOs)\nwithin the same VM under certain conditions, which may lead to NULL\npointer dereferences later in the bind pipeline. To prevent this, clear\nthe allow_res_evict flag in the xe_bo_validate call.\n\nv2:\n - Invert polarity of no_res_evict (Thomas)\n - Add comment in code explaining issue (Thomas)\n\n(cherry picked from commit 8b9ba8d6d95fe75fed6b0480bb03da4b321bea08)",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 16.0:cluster-md-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dtb-allwinner-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-altera-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amazon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amlogic-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apple-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-arm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-broadcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-cavium-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-exynos-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-freescale-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-hisilicon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-lg-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-marvell-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-mediatek-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-nvidia-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-qcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-renesas-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-rockchip-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-socionext-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-sprd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-xilinx-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40086",
"url": "https://www.suse.com/security/cve/CVE-2025-40086"
},
{
"category": "external",
"summary": "SUSE Bug 1252923 for CVE-2025-40086",
"url": "https://bugzilla.suse.com/1252923"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 16.0:cluster-md-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dtb-allwinner-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-altera-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amazon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amlogic-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apple-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-arm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-broadcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-cavium-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-exynos-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-freescale-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-hisilicon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-lg-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-marvell-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-mediatek-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-nvidia-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-qcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-renesas-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-rockchip-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-socionext-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-sprd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-xilinx-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.1,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H",
"version": "3.1"
},
"products": [
"openSUSE Leap 16.0:cluster-md-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dtb-allwinner-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-altera-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amazon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amlogic-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apple-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-arm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-broadcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-cavium-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-exynos-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-freescale-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-hisilicon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-lg-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-marvell-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-mediatek-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-nvidia-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-qcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-renesas-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-rockchip-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-socionext-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-sprd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-xilinx-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-19T17:38:16Z",
"details": "moderate"
}
],
"title": "CVE-2025-40086"
},
{
"cve": "CVE-2025-40098",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40098"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nALSA: hda: cs35l41: Fix NULL pointer dereference in cs35l41_get_acpi_mute_state()\n\nReturn value of a function acpi_evaluate_dsm() is dereferenced without\nchecking for NULL, but it is usually checked for this function.\n\nacpi_evaluate_dsm() may return NULL, when acpi_evaluate_object() returns\nacpi_status other than ACPI_SUCCESS, so add a check to prevent the crach.\n\nFound by Linux Verification Center (linuxtesting.org) with SVACE.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 16.0:cluster-md-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dtb-allwinner-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-altera-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amazon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amlogic-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apple-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-arm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-broadcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-cavium-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-exynos-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-freescale-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-hisilicon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-lg-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-marvell-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-mediatek-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-nvidia-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-qcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-renesas-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-rockchip-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-socionext-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-sprd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-xilinx-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40098",
"url": "https://www.suse.com/security/cve/CVE-2025-40098"
},
{
"category": "external",
"summary": "SUSE Bug 1252917 for CVE-2025-40098",
"url": "https://bugzilla.suse.com/1252917"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 16.0:cluster-md-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dtb-allwinner-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-altera-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amazon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amlogic-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apple-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-arm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-broadcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-cavium-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-exynos-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-freescale-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-hisilicon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-lg-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-marvell-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-mediatek-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-nvidia-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-qcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-renesas-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-rockchip-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-socionext-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-sprd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-xilinx-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Leap 16.0:cluster-md-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dtb-allwinner-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-altera-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amazon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amlogic-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apple-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-arm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-broadcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-cavium-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-exynos-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-freescale-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-hisilicon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-lg-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-marvell-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-mediatek-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-nvidia-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-qcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-renesas-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-rockchip-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-socionext-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-sprd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-xilinx-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-19T17:38:16Z",
"details": "moderate"
}
],
"title": "CVE-2025-40098"
},
{
"cve": "CVE-2025-40101",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40101"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nbtrfs: fix memory leaks when rejecting a non SINGLE data profile without an RST\n\nAt the end of btrfs_load_block_group_zone_info() the first thing we do\nis to ensure that if the mapping type is not a SINGLE one and there is\nno RAID stripe tree, then we return early with an error.\n\nDoing that, though, prevents the code from running the last calls from\nthis function which are about freeing memory allocated during its\nrun. Hence, in this case, instead of returning early, we set the ret\nvalue and fall through the rest of the cleanup code.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 16.0:cluster-md-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dtb-allwinner-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-altera-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amazon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amlogic-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apple-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-arm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-broadcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-cavium-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-exynos-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-freescale-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-hisilicon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-lg-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-marvell-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-mediatek-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-nvidia-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-qcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-renesas-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-rockchip-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-socionext-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-sprd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-xilinx-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40101",
"url": "https://www.suse.com/security/cve/CVE-2025-40101"
},
{
"category": "external",
"summary": "SUSE Bug 1252901 for CVE-2025-40101",
"url": "https://bugzilla.suse.com/1252901"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 16.0:cluster-md-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dtb-allwinner-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-altera-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amazon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amlogic-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apple-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-arm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-broadcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-cavium-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-exynos-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-freescale-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-hisilicon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-lg-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-marvell-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-mediatek-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-nvidia-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-qcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-renesas-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-rockchip-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-socionext-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-sprd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-xilinx-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.3,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"openSUSE Leap 16.0:cluster-md-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dtb-allwinner-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-altera-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amazon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amlogic-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apple-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-arm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-broadcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-cavium-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-exynos-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-freescale-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-hisilicon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-lg-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-marvell-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-mediatek-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-nvidia-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-qcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-renesas-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-rockchip-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-socionext-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-sprd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-xilinx-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-19T17:38:16Z",
"details": "low"
}
],
"title": "CVE-2025-40101"
},
{
"cve": "CVE-2025-40102",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40102"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nKVM: arm64: Prevent access to vCPU events before init\n\nAnother day, another syzkaller bug. KVM erroneously allows userspace to\npend vCPU events for a vCPU that hasn\u0027t been initialized yet, leading to\nKVM interpreting a bunch of uninitialized garbage for routing /\ninjecting the exception.\n\nIn one case the injection code and the hyp disagree on whether the vCPU\nhas a 32bit EL1 and put the vCPU into an illegal mode for AArch64,\ntripping the BUG() in exception_target_el() during the next injection:\n\n kernel BUG at arch/arm64/kvm/inject_fault.c:40!\n Internal error: Oops - BUG: 00000000f2000800 [#1] SMP\n CPU: 3 UID: 0 PID: 318 Comm: repro Not tainted 6.17.0-rc4-00104-g10fd0285305d #6 PREEMPT\n Hardware name: linux,dummy-virt (DT)\n pstate: 21402009 (nzCv daif +PAN -UAO -TCO +DIT -SSBS BTYPE=--)\n pc : exception_target_el+0x88/0x8c\n lr : pend_serror_exception+0x18/0x13c\n sp : ffff800082f03a10\n x29: ffff800082f03a10 x28: ffff0000cb132280 x27: 0000000000000000\n x26: 0000000000000000 x25: ffff0000c2a99c20 x24: 0000000000000000\n x23: 0000000000008000 x22: 0000000000000002 x21: 0000000000000004\n x20: 0000000000008000 x19: ffff0000c2a99c20 x18: 0000000000000000\n x17: 0000000000000000 x16: 0000000000000000 x15: 00000000200000c0\n x14: 0000000000000000 x13: 0000000000000000 x12: 0000000000000000\n x11: 0000000000000000 x10: 0000000000000000 x9 : 0000000000000000\n x8 : ffff800082f03af8 x7 : 0000000000000000 x6 : 0000000000000000\n x5 : ffff800080f621f0 x4 : 0000000000000000 x3 : 0000000000000000\n x2 : 000000000040009b x1 : 0000000000000003 x0 : ffff0000c2a99c20\n Call trace:\n exception_target_el+0x88/0x8c (P)\n kvm_inject_serror_esr+0x40/0x3b4\n __kvm_arm_vcpu_set_events+0xf0/0x100\n kvm_arch_vcpu_ioctl+0x180/0x9d4\n kvm_vcpu_ioctl+0x60c/0x9f4\n __arm64_sys_ioctl+0xac/0x104\n invoke_syscall+0x48/0x110\n el0_svc_common.constprop.0+0x40/0xe0\n do_el0_svc+0x1c/0x28\n el0_svc+0x34/0xf0\n el0t_64_sync_handler+0xa0/0xe4\n el0t_64_sync+0x198/0x19c\n Code: f946bc01 b4fffe61 9101e020 17fffff2 (d4210000)\n\nReject the ioctls outright as no sane VMM would call these before\nKVM_ARM_VCPU_INIT anyway. Even if it did the exception would\u0027ve been\nthrown away by the eventual reset of the vCPU\u0027s state.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 16.0:cluster-md-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dtb-allwinner-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-altera-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amazon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amlogic-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apple-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-arm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-broadcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-cavium-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-exynos-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-freescale-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-hisilicon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-lg-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-marvell-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-mediatek-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-nvidia-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-qcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-renesas-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-rockchip-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-socionext-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-sprd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-xilinx-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40102",
"url": "https://www.suse.com/security/cve/CVE-2025-40102"
},
{
"category": "external",
"summary": "SUSE Bug 1252919 for CVE-2025-40102",
"url": "https://bugzilla.suse.com/1252919"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 16.0:cluster-md-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dtb-allwinner-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-altera-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amazon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amlogic-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apple-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-arm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-broadcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-cavium-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-exynos-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-freescale-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-hisilicon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-lg-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-marvell-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-mediatek-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-nvidia-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-qcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-renesas-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-rockchip-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-socionext-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-sprd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-xilinx-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 0,
"baseSeverity": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:N",
"version": "3.1"
},
"products": [
"openSUSE Leap 16.0:cluster-md-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dtb-allwinner-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-altera-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amazon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amlogic-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apple-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-arm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-broadcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-cavium-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-exynos-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-freescale-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-hisilicon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-lg-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-marvell-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-mediatek-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-nvidia-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-qcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-renesas-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-rockchip-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-socionext-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-sprd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-xilinx-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-19T17:38:16Z",
"details": "moderate"
}
],
"title": "CVE-2025-40102"
},
{
"cve": "CVE-2025-40105",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40105"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nvfs: Don\u0027t leak disconnected dentries on umount\n\nWhen user calls open_by_handle_at() on some inode that is not cached, we\nwill create disconnected dentry for it. If such dentry is a directory,\nexportfs_decode_fh_raw() will then try to connect this dentry to the\ndentry tree through reconnect_path(). It may happen for various reasons\n(such as corrupted fs or race with rename) that the call to\nlookup_one_unlocked() in reconnect_one() will fail to find the dentry we\nare trying to reconnect and instead create a new dentry under the\nparent. Now this dentry will not be marked as disconnected although the\nparent still may well be disconnected (at least in case this\ninconsistency happened because the fs is corrupted and .. doesn\u0027t point\nto the real parent directory). This creates inconsistency in\ndisconnected flags but AFAICS it was mostly harmless. At least until\ncommit f1ee616214cb (\"VFS: don\u0027t keep disconnected dentries on d_anon\")\nwhich removed adding of most disconnected dentries to sb-\u003es_anon list.\nThus after this commit cleanup of disconnected dentries implicitely\nrelies on the fact that dput() will immediately reclaim such dentries.\nHowever when some leaf dentry isn\u0027t marked as disconnected, as in the\nscenario described above, the reclaim doesn\u0027t happen and the dentries\nare \"leaked\". Memory reclaim can eventually reclaim them but otherwise\nthey stay in memory and if umount comes first, we hit infamous \"Busy\ninodes after unmount\" bug. Make sure all dentries created under a\ndisconnected parent are marked as disconnected as well.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 16.0:cluster-md-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dtb-allwinner-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-altera-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amazon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amlogic-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apple-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-arm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-broadcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-cavium-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-exynos-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-freescale-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-hisilicon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-lg-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-marvell-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-mediatek-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-nvidia-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-qcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-renesas-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-rockchip-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-socionext-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-sprd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-xilinx-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40105",
"url": "https://www.suse.com/security/cve/CVE-2025-40105"
},
{
"category": "external",
"summary": "SUSE Bug 1252928 for CVE-2025-40105",
"url": "https://bugzilla.suse.com/1252928"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 16.0:cluster-md-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dtb-allwinner-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-altera-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amazon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amlogic-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apple-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-arm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-broadcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-cavium-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-exynos-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-freescale-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-hisilicon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-lg-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-marvell-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-mediatek-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-nvidia-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-qcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-renesas-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-rockchip-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-socionext-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-sprd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-xilinx-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.3,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"openSUSE Leap 16.0:cluster-md-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dtb-allwinner-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-altera-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amazon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amlogic-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apple-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-arm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-broadcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-cavium-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-exynos-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-freescale-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-hisilicon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-lg-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-marvell-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-mediatek-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-nvidia-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-qcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-renesas-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-rockchip-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-socionext-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-sprd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-xilinx-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-19T17:38:16Z",
"details": "low"
}
],
"title": "CVE-2025-40105"
},
{
"cve": "CVE-2025-40107",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40107"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\ncan: hi311x: fix null pointer dereference when resuming from sleep before interface was enabled\n\nThis issue is similar to the vulnerability in the `mcp251x` driver,\nwhich was fixed in commit 03c427147b2d (\"can: mcp251x: fix resume from\nsleep before interface was brought up\").\n\nIn the `hi311x` driver, when the device resumes from sleep, the driver\nschedules `priv-\u003erestart_work`. However, if the network interface was\nnot previously enabled, the `priv-\u003ewq` (workqueue) is not allocated and\ninitialized, leading to a null pointer dereference.\n\nTo fix this, we move the allocation and initialization of the workqueue\nfrom the `hi3110_open` function to the `hi3110_can_probe` function.\nThis ensures that the workqueue is properly initialized before it is\nused during device resume. And added logic to destroy the workqueue\nin the error handling paths of `hi3110_can_probe` and in the\n`hi3110_can_remove` function to prevent resource leaks.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 16.0:cluster-md-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dtb-allwinner-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-altera-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amazon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amlogic-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apple-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-arm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-broadcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-cavium-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-exynos-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-freescale-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-hisilicon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-lg-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-marvell-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-mediatek-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-nvidia-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-qcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-renesas-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-rockchip-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-socionext-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-sprd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-xilinx-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40107",
"url": "https://www.suse.com/security/cve/CVE-2025-40107"
},
{
"category": "external",
"summary": "SUSE Bug 1253018 for CVE-2025-40107",
"url": "https://bugzilla.suse.com/1253018"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 16.0:cluster-md-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dtb-allwinner-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-altera-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amazon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amlogic-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apple-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-arm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-broadcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-cavium-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-exynos-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-freescale-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-hisilicon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-lg-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-marvell-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-mediatek-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-nvidia-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-qcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-renesas-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-rockchip-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-socionext-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-sprd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-xilinx-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Leap 16.0:cluster-md-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dtb-allwinner-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-altera-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amazon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amlogic-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apple-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-arm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-broadcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-cavium-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-exynos-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-freescale-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-hisilicon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-lg-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-marvell-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-mediatek-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-nvidia-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-qcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-renesas-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-rockchip-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-socionext-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-sprd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-xilinx-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-19T17:38:16Z",
"details": "moderate"
}
],
"title": "CVE-2025-40107"
},
{
"cve": "CVE-2025-40109",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40109"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\ncrypto: rng - Ensure set_ent is always present\n\nEnsure that set_ent is always set since only drbg provides it.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 16.0:cluster-md-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dtb-allwinner-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-altera-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amazon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amlogic-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apple-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-arm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-broadcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-cavium-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-exynos-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-freescale-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-hisilicon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-lg-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-marvell-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-mediatek-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-nvidia-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-qcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-renesas-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-rockchip-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-socionext-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-sprd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-xilinx-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40109",
"url": "https://www.suse.com/security/cve/CVE-2025-40109"
},
{
"category": "external",
"summary": "SUSE Bug 1253176 for CVE-2025-40109",
"url": "https://bugzilla.suse.com/1253176"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 16.0:cluster-md-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dtb-allwinner-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-altera-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amazon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amlogic-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apple-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-arm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-broadcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-cavium-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-exynos-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-freescale-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-hisilicon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-lg-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-marvell-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-mediatek-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-nvidia-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-qcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-renesas-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-rockchip-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-socionext-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-sprd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-xilinx-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Leap 16.0:cluster-md-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dtb-allwinner-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-altera-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amazon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amlogic-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apple-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-arm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-broadcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-cavium-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-exynos-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-freescale-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-hisilicon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-lg-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-marvell-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-mediatek-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-nvidia-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-qcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-renesas-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-rockchip-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-socionext-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-sprd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-xilinx-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-19T17:38:16Z",
"details": "moderate"
}
],
"title": "CVE-2025-40109"
},
{
"cve": "CVE-2025-40110",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40110"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\ndrm/vmwgfx: Fix a null-ptr access in the cursor snooper\n\nCheck that the resource which is converted to a surface exists before\ntrying to use the cursor snooper on it.\n\nvmw_cmd_res_check allows explicit invalid (SVGA3D_INVALID_ID) identifiers\nbecause some svga commands accept SVGA3D_INVALID_ID to mean \"no surface\",\nunfortunately functions that accept the actual surfaces as objects might\n(and in case of the cursor snooper, do not) be able to handle null\nobjects. Make sure that we validate not only the identifier (via the\nvmw_cmd_res_check) but also check that the actual resource exists before\ntrying to do something with it.\n\nFixes unchecked null-ptr reference in the snooping code.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 16.0:cluster-md-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dtb-allwinner-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-altera-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amazon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amlogic-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apple-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-arm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-broadcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-cavium-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-exynos-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-freescale-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-hisilicon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-lg-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-marvell-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-mediatek-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-nvidia-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-qcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-renesas-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-rockchip-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-socionext-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-sprd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-xilinx-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40110",
"url": "https://www.suse.com/security/cve/CVE-2025-40110"
},
{
"category": "external",
"summary": "SUSE Bug 1253275 for CVE-2025-40110",
"url": "https://bugzilla.suse.com/1253275"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 16.0:cluster-md-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dtb-allwinner-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-altera-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amazon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amlogic-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apple-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-arm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-broadcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-cavium-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-exynos-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-freescale-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-hisilicon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-lg-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-marvell-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-mediatek-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-nvidia-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-qcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-renesas-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-rockchip-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-socionext-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-sprd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-xilinx-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.1,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Leap 16.0:cluster-md-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dtb-allwinner-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-altera-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amazon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amlogic-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apple-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-arm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-broadcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-cavium-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-exynos-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-freescale-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-hisilicon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-lg-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-marvell-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-mediatek-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-nvidia-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-qcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-renesas-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-rockchip-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-socionext-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-sprd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-xilinx-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-19T17:38:16Z",
"details": "moderate"
}
],
"title": "CVE-2025-40110"
},
{
"cve": "CVE-2025-40111",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40111"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\ndrm/vmwgfx: Fix Use-after-free in validation\n\nNodes stored in the validation duplicates hashtable come from an arena\nallocator that is cleared at the end of vmw_execbuf_process. All nodes\nare expected to be cleared in vmw_validation_drop_ht but this node escaped\nbecause its resource was destroyed prematurely.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 16.0:cluster-md-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dtb-allwinner-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-altera-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amazon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amlogic-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apple-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-arm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-broadcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-cavium-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-exynos-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-freescale-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-hisilicon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-lg-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-marvell-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-mediatek-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-nvidia-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-qcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-renesas-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-rockchip-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-socionext-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-sprd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-xilinx-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40111",
"url": "https://www.suse.com/security/cve/CVE-2025-40111"
},
{
"category": "external",
"summary": "SUSE Bug 1253362 for CVE-2025-40111",
"url": "https://bugzilla.suse.com/1253362"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 16.0:cluster-md-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dtb-allwinner-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-altera-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amazon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amlogic-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apple-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-arm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-broadcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-cavium-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-exynos-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-freescale-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-hisilicon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-lg-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-marvell-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-mediatek-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-nvidia-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-qcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-renesas-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-rockchip-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-socionext-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-sprd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-xilinx-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.7,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:L/A:H",
"version": "3.1"
},
"products": [
"openSUSE Leap 16.0:cluster-md-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dtb-allwinner-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-altera-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amazon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amlogic-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apple-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-arm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-broadcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-cavium-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-exynos-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-freescale-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-hisilicon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-lg-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-marvell-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-mediatek-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-nvidia-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-qcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-renesas-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-rockchip-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-socionext-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-sprd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-xilinx-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-19T17:38:16Z",
"details": "moderate"
}
],
"title": "CVE-2025-40111"
},
{
"cve": "CVE-2025-40115",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40115"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nscsi: mpt3sas: Fix crash in transport port remove by using ioc_info()\n\nDuring mpt3sas_transport_port_remove(), messages were logged with\ndev_printk() against \u0026mpt3sas_port-\u003eport-\u003edev. At this point the SAS\ntransport device may already be partially unregistered or freed, leading\nto a crash when accessing its struct device.\n\nUsing ioc_info(), which logs via the PCI device (ioc-\u003epdev-\u003edev),\nguaranteed to remain valid until driver removal.\n\n[83428.295776] Oops: general protection fault, probably for non-canonical address 0x6f702f323a33312d: 0000 [#1] SMP NOPTI\n[83428.295785] CPU: 145 UID: 0 PID: 113296 Comm: rmmod Kdump: loaded Tainted: G OE 6.16.0-rc1+ #1 PREEMPT(voluntary)\n[83428.295792] Tainted: [O]=OOT_MODULE, [E]=UNSIGNED_MODULE\n[83428.295795] Hardware name: Dell Inc. Precision 7875 Tower/, BIOS 89.1.67 02/23/2024\n[83428.295799] RIP: 0010:__dev_printk+0x1f/0x70\n[83428.295805] Code: 90 90 90 90 90 90 90 90 90 90 90 0f 1f 44 00 00 49 89 d1 48 85 f6 74 52 4c 8b 46 50 4d 85 c0 74 1f 48 8b 46 68 48 85 c0 74 22 \u003c48\u003e 8b 08 0f b6 7f 01 48 c7 c2 db e8 42 ad 83 ef 30 e9 7b f8 ff ff\n[83428.295813] RSP: 0018:ff85aeafc3137bb0 EFLAGS: 00010206\n[83428.295817] RAX: 6f702f323a33312d RBX: ff4290ee81292860 RCX: 5000cca25103be32\n[83428.295820] RDX: ff85aeafc3137bb8 RSI: ff4290eeb1966c00 RDI: ffffffffc1560845\n[83428.295823] RBP: ff85aeafc3137c18 R08: 74726f702f303a33 R09: ff85aeafc3137bb8\n[83428.295826] R10: ff85aeafc3137b18 R11: ff4290f5bd60fe68 R12: ff4290ee81290000\n[83428.295830] R13: ff4290ee6e345de0 R14: ff4290ee81290000 R15: ff4290ee6e345e30\n[83428.295833] FS: 00007fd9472a6740(0000) GS:ff4290f5ce96b000(0000) knlGS:0000000000000000\n[83428.295837] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033\n[83428.295840] CR2: 00007f242b4db238 CR3: 00000002372b8006 CR4: 0000000000771ef0\n[83428.295844] PKRU: 55555554\n[83428.295846] Call Trace:\n[83428.295848] \u003cTASK\u003e\n[83428.295850] _dev_printk+0x5c/0x80\n[83428.295857] ? srso_alias_return_thunk+0x5/0xfbef5\n[83428.295863] mpt3sas_transport_port_remove+0x1c7/0x420 [mpt3sas]\n[83428.295882] _scsih_remove_device+0x21b/0x280 [mpt3sas]\n[83428.295894] ? _scsih_expander_node_remove+0x108/0x140 [mpt3sas]\n[83428.295906] ? srso_alias_return_thunk+0x5/0xfbef5\n[83428.295910] mpt3sas_device_remove_by_sas_address.part.0+0x8f/0x110 [mpt3sas]\n[83428.295921] _scsih_expander_node_remove+0x129/0x140 [mpt3sas]\n[83428.295933] _scsih_expander_node_remove+0x6a/0x140 [mpt3sas]\n[83428.295944] scsih_remove+0x3f0/0x4a0 [mpt3sas]\n[83428.295957] pci_device_remove+0x3b/0xb0\n[83428.295962] device_release_driver_internal+0x193/0x200\n[83428.295968] driver_detach+0x44/0x90\n[83428.295971] bus_remove_driver+0x69/0xf0\n[83428.295975] pci_unregister_driver+0x2a/0xb0\n[83428.295979] _mpt3sas_exit+0x1f/0x300 [mpt3sas]\n[83428.295991] __do_sys_delete_module.constprop.0+0x174/0x310\n[83428.295997] ? srso_alias_return_thunk+0x5/0xfbef5\n[83428.296000] ? __x64_sys_getdents64+0x9a/0x110\n[83428.296005] ? srso_alias_return_thunk+0x5/0xfbef5\n[83428.296009] ? syscall_trace_enter+0xf6/0x1b0\n[83428.296014] do_syscall_64+0x7b/0x2c0\n[83428.296019] ? srso_alias_return_thunk+0x5/0xfbef5\n[83428.296023] entry_SYSCALL_64_after_hwframe+0x76/0x7e",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 16.0:cluster-md-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dtb-allwinner-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-altera-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amazon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amlogic-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apple-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-arm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-broadcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-cavium-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-exynos-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-freescale-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-hisilicon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-lg-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-marvell-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-mediatek-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-nvidia-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-qcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-renesas-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-rockchip-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-socionext-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-sprd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-xilinx-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40115",
"url": "https://www.suse.com/security/cve/CVE-2025-40115"
},
{
"category": "external",
"summary": "SUSE Bug 1253318 for CVE-2025-40115",
"url": "https://bugzilla.suse.com/1253318"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 16.0:cluster-md-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dtb-allwinner-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-altera-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amazon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amlogic-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apple-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-arm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-broadcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-cavium-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-exynos-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-freescale-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-hisilicon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-lg-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-marvell-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-mediatek-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-nvidia-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-qcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-renesas-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-rockchip-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-socionext-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-sprd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-xilinx-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Leap 16.0:cluster-md-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dtb-allwinner-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-altera-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amazon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amlogic-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apple-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-arm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-broadcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-cavium-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-exynos-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-freescale-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-hisilicon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-lg-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-marvell-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-mediatek-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-nvidia-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-qcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-renesas-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-rockchip-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-socionext-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-sprd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-xilinx-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-19T17:38:16Z",
"details": "moderate"
}
],
"title": "CVE-2025-40115"
},
{
"cve": "CVE-2025-40116",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40116"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nusb: host: max3421-hcd: Fix error pointer dereference in probe cleanup\n\nThe kthread_run() function returns error pointers so the\nmax3421_hcd-\u003espi_thread pointer can be either error pointers or NULL.\nCheck for both before dereferencing it.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 16.0:cluster-md-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dtb-allwinner-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-altera-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amazon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amlogic-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apple-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-arm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-broadcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-cavium-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-exynos-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-freescale-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-hisilicon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-lg-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-marvell-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-mediatek-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-nvidia-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-qcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-renesas-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-rockchip-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-socionext-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-sprd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-xilinx-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40116",
"url": "https://www.suse.com/security/cve/CVE-2025-40116"
},
{
"category": "external",
"summary": "SUSE Bug 1253324 for CVE-2025-40116",
"url": "https://bugzilla.suse.com/1253324"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 16.0:cluster-md-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dtb-allwinner-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-altera-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amazon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amlogic-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apple-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-arm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-broadcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-cavium-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-exynos-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-freescale-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-hisilicon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-lg-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-marvell-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-mediatek-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-nvidia-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-qcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-renesas-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-rockchip-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-socionext-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-sprd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-xilinx-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Leap 16.0:cluster-md-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dtb-allwinner-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-altera-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amazon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amlogic-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apple-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-arm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-broadcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-cavium-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-exynos-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-freescale-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-hisilicon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-lg-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-marvell-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-mediatek-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-nvidia-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-qcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-renesas-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-rockchip-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-socionext-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-sprd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-xilinx-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-19T17:38:16Z",
"details": "moderate"
}
],
"title": "CVE-2025-40116"
},
{
"cve": "CVE-2025-40118",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40118"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nscsi: pm80xx: Fix array-index-out-of-of-bounds on rmmod\n\nSince commit f7b705c238d1 (\"scsi: pm80xx: Set phy_attached to zero when\ndevice is gone\") UBSAN reports:\n\n UBSAN: array-index-out-of-bounds in drivers/scsi/pm8001/pm8001_sas.c:786:17\n index 28 is out of range for type \u0027pm8001_phy [16]\u0027\n\non rmmod when using an expander.\n\nFor a direct attached device, attached_phy contains the local phy id.\nFor a device behind an expander, attached_phy contains the remote phy\nid, not the local phy id.\n\nI.e. while pm8001_ha will have pm8001_ha-\u003echip-\u003en_phy local phys, for a\ndevice behind an expander, attached_phy can be much larger than\npm8001_ha-\u003echip-\u003en_phy (depending on the amount of phys of the\nexpander).\n\nE.g. on my system pm8001_ha has 8 phys with phy ids 0-7. One of the\nports has an expander connected. The expander has 31 phys with phy ids\n0-30.\n\nThe pm8001_ha-\u003ephy array only contains the phys of the HBA. It does not\ncontain the phys of the expander. Thus, it is wrong to use attached_phy\nto index the pm8001_ha-\u003ephy array for a device behind an expander.\n\nThus, we can only clear phy_attached for devices that are directly\nattached.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 16.0:cluster-md-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dtb-allwinner-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-altera-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amazon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amlogic-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apple-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-arm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-broadcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-cavium-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-exynos-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-freescale-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-hisilicon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-lg-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-marvell-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-mediatek-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-nvidia-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-qcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-renesas-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-rockchip-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-socionext-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-sprd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-xilinx-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40118",
"url": "https://www.suse.com/security/cve/CVE-2025-40118"
},
{
"category": "external",
"summary": "SUSE Bug 1253363 for CVE-2025-40118",
"url": "https://bugzilla.suse.com/1253363"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 16.0:cluster-md-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dtb-allwinner-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-altera-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amazon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amlogic-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apple-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-arm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-broadcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-cavium-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-exynos-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-freescale-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-hisilicon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-lg-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-marvell-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-mediatek-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-nvidia-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-qcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-renesas-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-rockchip-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-socionext-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-sprd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-xilinx-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.1,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H",
"version": "3.1"
},
"products": [
"openSUSE Leap 16.0:cluster-md-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dtb-allwinner-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-altera-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amazon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amlogic-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apple-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-arm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-broadcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-cavium-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-exynos-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-freescale-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-hisilicon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-lg-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-marvell-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-mediatek-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-nvidia-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-qcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-renesas-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-rockchip-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-socionext-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-sprd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-xilinx-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-19T17:38:16Z",
"details": "moderate"
}
],
"title": "CVE-2025-40118"
},
{
"cve": "CVE-2025-40120",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40120"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnet: usb: asix: hold PM usage ref to avoid PM/MDIO + RTNL deadlock\n\nPrevent USB runtime PM (autosuspend) for AX88772* in bind.\n\nusbnet enables runtime PM (autosuspend) by default, so disabling it via\nthe usb_driver flag is ineffective. On AX88772B, autosuspend shows no\nmeasurable power saving with current driver (no link partner, admin\nup/down). The ~0.453 W -\u003e ~0.248 W drop on v6.1 comes from phylib powering\nthe PHY off on admin-down, not from USB autosuspend.\n\nThe real hazard is that with runtime PM enabled, ndo_open() (under RTNL)\nmay synchronously trigger autoresume (usb_autopm_get_interface()) into\nasix_resume() while the USB PM lock is held. Resume paths then invoke\nphylink/phylib and MDIO, which also expect RTNL, leading to possible\ndeadlocks or PM lock vs MDIO wake issues.\n\nTo avoid this, keep the device runtime-PM active by taking a usage\nreference in ax88772_bind() and dropping it in unbind(). A non-zero PM\nusage count blocks runtime suspend regardless of userspace policy\n(.../power/control - pm_runtime_allow/forbid), making this approach\nrobust against sysfs overrides.\n\nHolding a runtime-PM usage ref does not affect system-wide suspend;\nsystem sleep/resume callbacks continue to run as before.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 16.0:cluster-md-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dtb-allwinner-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-altera-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amazon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amlogic-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apple-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-arm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-broadcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-cavium-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-exynos-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-freescale-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-hisilicon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-lg-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-marvell-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-mediatek-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-nvidia-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-qcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-renesas-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-rockchip-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-socionext-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-sprd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-xilinx-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40120",
"url": "https://www.suse.com/security/cve/CVE-2025-40120"
},
{
"category": "external",
"summary": "SUSE Bug 1253360 for CVE-2025-40120",
"url": "https://bugzilla.suse.com/1253360"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 16.0:cluster-md-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dtb-allwinner-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-altera-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amazon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amlogic-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apple-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-arm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-broadcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-cavium-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-exynos-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-freescale-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-hisilicon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-lg-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-marvell-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-mediatek-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-nvidia-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-qcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-renesas-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-rockchip-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-socionext-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-sprd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-xilinx-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Leap 16.0:cluster-md-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dtb-allwinner-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-altera-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amazon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amlogic-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apple-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-arm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-broadcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-cavium-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-exynos-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-freescale-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-hisilicon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-lg-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-marvell-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-mediatek-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-nvidia-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-qcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-renesas-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-rockchip-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-socionext-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-sprd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-xilinx-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-19T17:38:16Z",
"details": "moderate"
}
],
"title": "CVE-2025-40120"
},
{
"cve": "CVE-2025-40121",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40121"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nASoC: Intel: bytcr_rt5651: Fix invalid quirk input mapping\n\nWhen an invalid value is passed via quirk option, currently\nbytcr_rt5640 driver just ignores and leaves as is, which may lead to\nunepxected results like OOB access.\n\nThis patch adds the sanity check and corrects the input mapping to the\ncertain default value if an invalid value is passed.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 16.0:cluster-md-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dtb-allwinner-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-altera-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amazon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amlogic-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apple-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-arm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-broadcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-cavium-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-exynos-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-freescale-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-hisilicon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-lg-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-marvell-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-mediatek-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-nvidia-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-qcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-renesas-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-rockchip-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-socionext-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-sprd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-xilinx-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40121",
"url": "https://www.suse.com/security/cve/CVE-2025-40121"
},
{
"category": "external",
"summary": "SUSE Bug 1253367 for CVE-2025-40121",
"url": "https://bugzilla.suse.com/1253367"
},
{
"category": "external",
"summary": "SUSE Bug 1253430 for CVE-2025-40121",
"url": "https://bugzilla.suse.com/1253430"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 16.0:cluster-md-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dtb-allwinner-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-altera-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amazon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amlogic-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apple-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-arm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-broadcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-cavium-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-exynos-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-freescale-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-hisilicon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-lg-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-marvell-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-mediatek-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-nvidia-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-qcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-renesas-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-rockchip-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-socionext-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-sprd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-xilinx-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"openSUSE Leap 16.0:cluster-md-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dtb-allwinner-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-altera-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amazon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amlogic-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apple-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-arm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-broadcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-cavium-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-exynos-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-freescale-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-hisilicon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-lg-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-marvell-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-mediatek-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-nvidia-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-qcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-renesas-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-rockchip-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-socionext-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-sprd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-xilinx-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-19T17:38:16Z",
"details": "moderate"
}
],
"title": "CVE-2025-40121"
},
{
"cve": "CVE-2025-40127",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40127"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nhwrng: ks-sa - fix division by zero in ks_sa_rng_init\n\nFix division by zero in ks_sa_rng_init caused by missing clock\npointer initialization. The clk_get_rate() call is performed on\nan uninitialized clk pointer, resulting in division by zero when\ncalculating delay values.\n\nAdd clock initialization code before using the clock.\n\n\n drivers/char/hw_random/ks-sa-rng.c | 7 +++++++\n 1 file changed, 7 insertions(+)",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 16.0:cluster-md-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dtb-allwinner-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-altera-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amazon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amlogic-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apple-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-arm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-broadcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-cavium-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-exynos-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-freescale-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-hisilicon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-lg-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-marvell-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-mediatek-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-nvidia-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-qcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-renesas-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-rockchip-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-socionext-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-sprd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-xilinx-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40127",
"url": "https://www.suse.com/security/cve/CVE-2025-40127"
},
{
"category": "external",
"summary": "SUSE Bug 1253369 for CVE-2025-40127",
"url": "https://bugzilla.suse.com/1253369"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 16.0:cluster-md-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dtb-allwinner-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-altera-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amazon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amlogic-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apple-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-arm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-broadcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-cavium-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-exynos-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-freescale-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-hisilicon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-lg-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-marvell-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-mediatek-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-nvidia-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-qcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-renesas-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-rockchip-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-socionext-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-sprd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-xilinx-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Leap 16.0:cluster-md-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dtb-allwinner-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-altera-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amazon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amlogic-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apple-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-arm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-broadcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-cavium-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-exynos-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-freescale-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-hisilicon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-lg-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-marvell-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-mediatek-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-nvidia-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-qcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-renesas-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-rockchip-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-socionext-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-sprd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-xilinx-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-19T17:38:16Z",
"details": "moderate"
}
],
"title": "CVE-2025-40127"
},
{
"cve": "CVE-2025-40129",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40129"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nsunrpc: fix null pointer dereference on zero-length checksum\n\nIn xdr_stream_decode_opaque_auth(), zero-length checksum.len causes\nchecksum.data to be set to NULL. This triggers a NPD when accessing\nchecksum.data in gss_krb5_verify_mic_v2(). This patch ensures that\nthe value of checksum.len is not less than XDR_UNIT.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 16.0:cluster-md-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dtb-allwinner-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-altera-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amazon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amlogic-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apple-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-arm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-broadcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-cavium-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-exynos-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-freescale-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-hisilicon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-lg-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-marvell-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-mediatek-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-nvidia-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-qcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-renesas-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-rockchip-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-socionext-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-sprd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-xilinx-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40129",
"url": "https://www.suse.com/security/cve/CVE-2025-40129"
},
{
"category": "external",
"summary": "SUSE Bug 1253472 for CVE-2025-40129",
"url": "https://bugzilla.suse.com/1253472"
},
{
"category": "external",
"summary": "SUSE Bug 1253473 for CVE-2025-40129",
"url": "https://bugzilla.suse.com/1253473"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 16.0:cluster-md-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dtb-allwinner-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-altera-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amazon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amlogic-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apple-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-arm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-broadcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-cavium-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-exynos-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-freescale-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-hisilicon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-lg-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-marvell-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-mediatek-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-nvidia-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-qcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-renesas-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-rockchip-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-socionext-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-sprd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-xilinx-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Leap 16.0:cluster-md-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dtb-allwinner-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-altera-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amazon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amlogic-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apple-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-arm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-broadcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-cavium-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-exynos-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-freescale-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-hisilicon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-lg-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-marvell-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-mediatek-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-nvidia-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-qcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-renesas-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-rockchip-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-socionext-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-sprd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-xilinx-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-19T17:38:16Z",
"details": "important"
}
],
"title": "CVE-2025-40129"
},
{
"cve": "CVE-2025-40132",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40132"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nASoC: Intel: sof_sdw: Prevent jump to NULL add_sidecar callback\n\nIn create_sdw_dailink() check that sof_end-\u003ecodec_info-\u003eadd_sidecar\nis not NULL before calling it.\n\nThe original code assumed that if include_sidecar is true, the codec\non that link has an add_sidecar callback. But there could be other\ncodecs on the same link that do not have an add_sidecar callback.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 16.0:cluster-md-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dtb-allwinner-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-altera-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amazon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amlogic-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apple-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-arm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-broadcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-cavium-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-exynos-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-freescale-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-hisilicon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-lg-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-marvell-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-mediatek-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-nvidia-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-qcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-renesas-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-rockchip-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-socionext-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-sprd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-xilinx-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40132",
"url": "https://www.suse.com/security/cve/CVE-2025-40132"
},
{
"category": "external",
"summary": "SUSE Bug 1253330 for CVE-2025-40132",
"url": "https://bugzilla.suse.com/1253330"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 16.0:cluster-md-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dtb-allwinner-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-altera-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amazon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amlogic-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apple-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-arm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-broadcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-cavium-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-exynos-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-freescale-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-hisilicon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-lg-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-marvell-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-mediatek-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-nvidia-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-qcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-renesas-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-rockchip-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-socionext-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-sprd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-xilinx-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Leap 16.0:cluster-md-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dtb-allwinner-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-altera-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amazon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amlogic-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apple-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-arm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-broadcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-cavium-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-exynos-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-freescale-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-hisilicon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-lg-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-marvell-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-mediatek-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-nvidia-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-qcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-renesas-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-rockchip-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-socionext-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-sprd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-xilinx-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-19T17:38:16Z",
"details": "moderate"
}
],
"title": "CVE-2025-40132"
},
{
"cve": "CVE-2025-40133",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40133"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nmptcp: Use __sk_dst_get() and dst_dev_rcu() in mptcp_active_enable().\n\nmptcp_active_enable() is called from subflow_finish_connect(),\nwhich is icsk-\u003eicsk_af_ops-\u003esk_rx_dst_set() and it\u0027s not always\nunder RCU.\n\nUsing sk_dst_get(sk)-\u003edev could trigger UAF.\n\nLet\u0027s use __sk_dst_get() and dst_dev_rcu().",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 16.0:cluster-md-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dtb-allwinner-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-altera-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amazon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amlogic-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apple-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-arm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-broadcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-cavium-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-exynos-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-freescale-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-hisilicon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-lg-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-marvell-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-mediatek-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-nvidia-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-qcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-renesas-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-rockchip-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-socionext-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-sprd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-xilinx-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40133",
"url": "https://www.suse.com/security/cve/CVE-2025-40133"
},
{
"category": "external",
"summary": "SUSE Bug 1253328 for CVE-2025-40133",
"url": "https://bugzilla.suse.com/1253328"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 16.0:cluster-md-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dtb-allwinner-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-altera-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amazon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amlogic-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apple-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-arm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-broadcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-cavium-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-exynos-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-freescale-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-hisilicon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-lg-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-marvell-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-mediatek-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-nvidia-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-qcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-renesas-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-rockchip-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-socionext-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-sprd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-xilinx-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:H/A:H",
"version": "3.1"
},
"products": [
"openSUSE Leap 16.0:cluster-md-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dtb-allwinner-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-altera-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amazon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amlogic-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apple-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-arm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-broadcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-cavium-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-exynos-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-freescale-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-hisilicon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-lg-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-marvell-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-mediatek-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-nvidia-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-qcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-renesas-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-rockchip-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-socionext-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-sprd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-xilinx-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-19T17:38:16Z",
"details": "moderate"
}
],
"title": "CVE-2025-40133"
},
{
"cve": "CVE-2025-40134",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40134"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\ndm: fix NULL pointer dereference in __dm_suspend()\n\nThere is a race condition between dm device suspend and table load that\ncan lead to null pointer dereference. The issue occurs when suspend is\ninvoked before table load completes:\n\nBUG: kernel NULL pointer dereference, address: 0000000000000054\nOops: 0000 [#1] PREEMPT SMP PTI\nCPU: 6 PID: 6798 Comm: dmsetup Not tainted 6.6.0-g7e52f5f0ca9b #62\nHardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.16.1-2.fc37 04/01/2014\nRIP: 0010:blk_mq_wait_quiesce_done+0x0/0x50\nCall Trace:\n \u003cTASK\u003e\n blk_mq_quiesce_queue+0x2c/0x50\n dm_stop_queue+0xd/0x20\n __dm_suspend+0x130/0x330\n dm_suspend+0x11a/0x180\n dev_suspend+0x27e/0x560\n ctl_ioctl+0x4cf/0x850\n dm_ctl_ioctl+0xd/0x20\n vfs_ioctl+0x1d/0x50\n __se_sys_ioctl+0x9b/0xc0\n __x64_sys_ioctl+0x19/0x30\n x64_sys_call+0x2c4a/0x4620\n do_syscall_64+0x9e/0x1b0\n\nThe issue can be triggered as below:\n\nT1 \t\t\t\t\t\tT2\ndm_suspend\t\t\t\t\ttable_load\n__dm_suspend\t\t\t\t\tdm_setup_md_queue\n\t\t\t\t\t\tdm_mq_init_request_queue\n\t\t\t\t\t\tblk_mq_init_allocated_queue\n\t\t\t\t\t\t=\u003e q-\u003emq_ops = set-\u003eops; (1)\ndm_stop_queue / dm_wait_for_completion\n=\u003e q-\u003etag_set NULL pointer!\t(2)\n\t\t\t\t\t\t=\u003e q-\u003etag_set = set; (3)\n\nFix this by checking if a valid table (map) exists before performing\nrequest-based suspend and waiting for target I/O. When map is NULL,\nskip these table-dependent suspend steps.\n\nEven when map is NULL, no I/O can reach any target because there is\nno table loaded; I/O submitted in this state will fail early in the\nDM layer. Skipping the table-dependent suspend logic in this case\nis safe and avoids NULL pointer dereferences.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 16.0:cluster-md-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dtb-allwinner-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-altera-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amazon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amlogic-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apple-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-arm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-broadcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-cavium-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-exynos-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-freescale-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-hisilicon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-lg-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-marvell-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-mediatek-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-nvidia-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-qcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-renesas-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-rockchip-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-socionext-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-sprd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-xilinx-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40134",
"url": "https://www.suse.com/security/cve/CVE-2025-40134"
},
{
"category": "external",
"summary": "SUSE Bug 1253386 for CVE-2025-40134",
"url": "https://bugzilla.suse.com/1253386"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 16.0:cluster-md-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dtb-allwinner-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-altera-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amazon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amlogic-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apple-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-arm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-broadcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-cavium-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-exynos-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-freescale-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-hisilicon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-lg-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-marvell-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-mediatek-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-nvidia-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-qcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-renesas-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-rockchip-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-socionext-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-sprd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-xilinx-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.7,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Leap 16.0:cluster-md-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dtb-allwinner-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-altera-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amazon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amlogic-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apple-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-arm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-broadcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-cavium-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-exynos-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-freescale-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-hisilicon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-lg-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-marvell-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-mediatek-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-nvidia-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-qcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-renesas-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-rockchip-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-socionext-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-sprd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-xilinx-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-19T17:38:16Z",
"details": "moderate"
}
],
"title": "CVE-2025-40134"
},
{
"cve": "CVE-2025-40135",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40135"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nipv6: use RCU in ip6_xmit()\n\nUse RCU in ip6_xmit() in order to use dst_dev_rcu() to prevent\npossible UAF.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 16.0:cluster-md-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dtb-allwinner-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-altera-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amazon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amlogic-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apple-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-arm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-broadcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-cavium-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-exynos-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-freescale-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-hisilicon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-lg-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-marvell-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-mediatek-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-nvidia-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-qcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-renesas-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-rockchip-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-socionext-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-sprd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-xilinx-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40135",
"url": "https://www.suse.com/security/cve/CVE-2025-40135"
},
{
"category": "external",
"summary": "SUSE Bug 1253342 for CVE-2025-40135",
"url": "https://bugzilla.suse.com/1253342"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 16.0:cluster-md-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dtb-allwinner-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-altera-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amazon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amlogic-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apple-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-arm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-broadcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-cavium-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-exynos-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-freescale-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-hisilicon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-lg-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-marvell-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-mediatek-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-nvidia-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-qcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-renesas-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-rockchip-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-socionext-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-sprd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-xilinx-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.1,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H",
"version": "3.1"
},
"products": [
"openSUSE Leap 16.0:cluster-md-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dtb-allwinner-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-altera-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amazon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amlogic-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apple-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-arm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-broadcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-cavium-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-exynos-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-freescale-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-hisilicon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-lg-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-marvell-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-mediatek-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-nvidia-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-qcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-renesas-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-rockchip-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-socionext-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-sprd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-xilinx-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-19T17:38:16Z",
"details": "moderate"
}
],
"title": "CVE-2025-40135"
},
{
"cve": "CVE-2025-40139",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40139"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nsmc: Use __sk_dst_get() and dst_dev_rcu() in in smc_clc_prfx_set().\n\nsmc_clc_prfx_set() is called during connect() and not under RCU\nnor RTNL.\n\nUsing sk_dst_get(sk)-\u003edev could trigger UAF.\n\nLet\u0027s use __sk_dst_get() and dev_dst_rcu() under rcu_read_lock()\nafter kernel_getsockname().\n\nNote that the returned value of smc_clc_prfx_set() is not used\nin the caller.\n\nWhile at it, we change the 1st arg of smc_clc_prfx_set[46]_rcu()\nnot to touch dst there.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 16.0:cluster-md-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dtb-allwinner-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-altera-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amazon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amlogic-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apple-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-arm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-broadcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-cavium-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-exynos-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-freescale-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-hisilicon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-lg-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-marvell-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-mediatek-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-nvidia-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-qcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-renesas-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-rockchip-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-socionext-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-sprd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-xilinx-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40139",
"url": "https://www.suse.com/security/cve/CVE-2025-40139"
},
{
"category": "external",
"summary": "SUSE Bug 1253409 for CVE-2025-40139",
"url": "https://bugzilla.suse.com/1253409"
},
{
"category": "external",
"summary": "SUSE Bug 1253411 for CVE-2025-40139",
"url": "https://bugzilla.suse.com/1253411"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 16.0:cluster-md-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dtb-allwinner-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-altera-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amazon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amlogic-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apple-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-arm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-broadcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-cavium-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-exynos-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-freescale-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-hisilicon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-lg-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-marvell-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-mediatek-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-nvidia-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-qcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-renesas-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-rockchip-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-socionext-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-sprd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-xilinx-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"openSUSE Leap 16.0:cluster-md-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dtb-allwinner-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-altera-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amazon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amlogic-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apple-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-arm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-broadcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-cavium-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-exynos-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-freescale-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-hisilicon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-lg-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-marvell-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-mediatek-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-nvidia-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-qcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-renesas-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-rockchip-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-socionext-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-sprd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-xilinx-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-19T17:38:16Z",
"details": "important"
}
],
"title": "CVE-2025-40139"
},
{
"cve": "CVE-2025-40140",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40140"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnet: usb: Remove disruptive netif_wake_queue in rtl8150_set_multicast\n\nsyzbot reported WARNING in rtl8150_start_xmit/usb_submit_urb.\nThis is the sequence of events that leads to the warning:\n\nrtl8150_start_xmit() {\n\tnetif_stop_queue();\n\tusb_submit_urb(dev-\u003etx_urb);\n}\n\nrtl8150_set_multicast() {\n\tnetif_stop_queue();\n\tnetif_wake_queue();\t\t\u003c-- wakes up TX queue before URB is done\n}\n\nrtl8150_start_xmit() {\n\tnetif_stop_queue();\n\tusb_submit_urb(dev-\u003etx_urb);\t\u003c-- double submission\n}\n\nrtl8150_set_multicast being the ndo_set_rx_mode callback should not be\ncalling netif_stop_queue and notif_start_queue as these handle\nTX queue synchronization.\n\nThe net core function dev_set_rx_mode handles the synchronization\nfor rtl8150_set_multicast making it safe to remove these locks.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 16.0:cluster-md-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dtb-allwinner-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-altera-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amazon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amlogic-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apple-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-arm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-broadcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-cavium-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-exynos-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-freescale-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-hisilicon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-lg-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-marvell-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-mediatek-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-nvidia-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-qcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-renesas-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-rockchip-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-socionext-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-sprd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-xilinx-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40140",
"url": "https://www.suse.com/security/cve/CVE-2025-40140"
},
{
"category": "external",
"summary": "SUSE Bug 1253349 for CVE-2025-40140",
"url": "https://bugzilla.suse.com/1253349"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 16.0:cluster-md-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dtb-allwinner-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-altera-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amazon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amlogic-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apple-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-arm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-broadcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-cavium-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-exynos-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-freescale-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-hisilicon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-lg-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-marvell-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-mediatek-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-nvidia-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-qcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-renesas-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-rockchip-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-socionext-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-sprd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-xilinx-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.3,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"openSUSE Leap 16.0:cluster-md-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dtb-allwinner-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-altera-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amazon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amlogic-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apple-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-arm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-broadcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-cavium-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-exynos-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-freescale-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-hisilicon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-lg-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-marvell-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-mediatek-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-nvidia-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-qcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-renesas-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-rockchip-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-socionext-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-sprd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-xilinx-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-19T17:38:16Z",
"details": "low"
}
],
"title": "CVE-2025-40140"
},
{
"cve": "CVE-2025-40141",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40141"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nBluetooth: ISO: Fix possible UAF on iso_conn_free\n\nThis attempt to fix similar issue to sco_conn_free where if the\nconn-\u003esk is not set to NULL may lead to UAF on iso_conn_free.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 16.0:cluster-md-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dtb-allwinner-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-altera-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amazon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amlogic-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apple-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-arm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-broadcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-cavium-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-exynos-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-freescale-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-hisilicon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-lg-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-marvell-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-mediatek-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-nvidia-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-qcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-renesas-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-rockchip-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-socionext-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-sprd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-xilinx-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40141",
"url": "https://www.suse.com/security/cve/CVE-2025-40141"
},
{
"category": "external",
"summary": "SUSE Bug 1253352 for CVE-2025-40141",
"url": "https://bugzilla.suse.com/1253352"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 16.0:cluster-md-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dtb-allwinner-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-altera-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amazon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amlogic-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apple-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-arm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-broadcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-cavium-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-exynos-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-freescale-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-hisilicon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-lg-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-marvell-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-mediatek-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-nvidia-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-qcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-renesas-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-rockchip-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-socionext-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-sprd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-xilinx-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:H",
"version": "3.1"
},
"products": [
"openSUSE Leap 16.0:cluster-md-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dtb-allwinner-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-altera-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amazon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amlogic-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apple-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-arm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-broadcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-cavium-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-exynos-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-freescale-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-hisilicon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-lg-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-marvell-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-mediatek-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-nvidia-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-qcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-renesas-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-rockchip-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-socionext-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-sprd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-xilinx-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-19T17:38:16Z",
"details": "moderate"
}
],
"title": "CVE-2025-40141"
},
{
"cve": "CVE-2025-40142",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40142"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nALSA: pcm: Disable bottom softirqs as part of spin_lock_irq() on PREEMPT_RT\n\nsnd_pcm_group_lock_irq() acquires a spinlock_t and disables interrupts\nvia spin_lock_irq(). This also implicitly disables the handling of\nsoftirqs such as TIMER_SOFTIRQ.\nOn PREEMPT_RT softirqs are preemptible and spin_lock_irq() does not\ndisable them. That means a timer can be invoked during spin_lock_irq()\non the same CPU. Due to synchronisations reasons local_bh_disable() has\na per-CPU lock named softirq_ctrl.lock which synchronizes individual\nsoftirq against each other.\nsyz-bot managed to trigger a lockdep report where softirq_ctrl.lock is\nacquired in hrtimer_cancel() in addition to hrtimer_run_softirq(). This\nis a possible deadlock.\n\nThe softirq_ctrl.lock can not be made part of spin_lock_irq() as this\nwould lead to too much synchronisation against individual threads on the\nsystem. To avoid the possible deadlock, softirqs must be manually\ndisabled before the lock is acquired.\n\nDisable softirqs before the lock is acquired on PREEMPT_RT.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 16.0:cluster-md-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dtb-allwinner-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-altera-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amazon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amlogic-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apple-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-arm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-broadcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-cavium-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-exynos-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-freescale-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-hisilicon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-lg-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-marvell-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-mediatek-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-nvidia-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-qcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-renesas-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-rockchip-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-socionext-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-sprd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-xilinx-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40142",
"url": "https://www.suse.com/security/cve/CVE-2025-40142"
},
{
"category": "external",
"summary": "SUSE Bug 1253348 for CVE-2025-40142",
"url": "https://bugzilla.suse.com/1253348"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 16.0:cluster-md-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dtb-allwinner-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-altera-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amazon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amlogic-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apple-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-arm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-broadcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-cavium-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-exynos-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-freescale-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-hisilicon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-lg-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-marvell-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-mediatek-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-nvidia-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-qcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-renesas-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-rockchip-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-socionext-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-sprd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-xilinx-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.7,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Leap 16.0:cluster-md-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dtb-allwinner-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-altera-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amazon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amlogic-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apple-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-arm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-broadcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-cavium-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-exynos-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-freescale-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-hisilicon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-lg-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-marvell-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-mediatek-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-nvidia-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-qcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-renesas-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-rockchip-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-socionext-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-sprd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-xilinx-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-19T17:38:16Z",
"details": "moderate"
}
],
"title": "CVE-2025-40142"
},
{
"cve": "CVE-2025-40149",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40149"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\ntls: Use __sk_dst_get() and dst_dev_rcu() in get_netdev_for_sock().\n\nget_netdev_for_sock() is called during setsockopt(),\nso not under RCU.\n\nUsing sk_dst_get(sk)-\u003edev could trigger UAF.\n\nLet\u0027s use __sk_dst_get() and dst_dev_rcu().\n\nNote that the only -\u003endo_sk_get_lower_dev() user is\nbond_sk_get_lower_dev(), which uses RCU.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 16.0:cluster-md-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dtb-allwinner-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-altera-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amazon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amlogic-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apple-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-arm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-broadcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-cavium-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-exynos-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-freescale-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-hisilicon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-lg-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-marvell-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-mediatek-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-nvidia-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-qcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-renesas-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-rockchip-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-socionext-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-sprd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-xilinx-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40149",
"url": "https://www.suse.com/security/cve/CVE-2025-40149"
},
{
"category": "external",
"summary": "SUSE Bug 1253355 for CVE-2025-40149",
"url": "https://bugzilla.suse.com/1253355"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 16.0:cluster-md-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dtb-allwinner-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-altera-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amazon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amlogic-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apple-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-arm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-broadcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-cavium-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-exynos-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-freescale-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-hisilicon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-lg-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-marvell-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-mediatek-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-nvidia-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-qcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-renesas-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-rockchip-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-socionext-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-sprd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-xilinx-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:H",
"version": "3.1"
},
"products": [
"openSUSE Leap 16.0:cluster-md-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dtb-allwinner-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-altera-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amazon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amlogic-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apple-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-arm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-broadcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-cavium-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-exynos-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-freescale-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-hisilicon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-lg-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-marvell-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-mediatek-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-nvidia-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-qcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-renesas-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-rockchip-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-socionext-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-sprd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-xilinx-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-19T17:38:16Z",
"details": "moderate"
}
],
"title": "CVE-2025-40149"
},
{
"cve": "CVE-2025-40153",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40153"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nmm: hugetlb: avoid soft lockup when mprotect to large memory area\n\nWhen calling mprotect() to a large hugetlb memory area in our customer\u0027s\nworkload (~300GB hugetlb memory), soft lockup was observed:\n\nwatchdog: BUG: soft lockup - CPU#98 stuck for 23s! [t2_new_sysv:126916]\n\nCPU: 98 PID: 126916 Comm: t2_new_sysv Kdump: loaded Not tainted 6.17-rc7\nHardware name: GIGACOMPUTING R2A3-T40-AAV1/Jefferson CIO, BIOS 5.4.4.1 07/15/2025\npstate: 20400009 (nzCv daif +PAN -UAO -TCO -DIT -SSBS BTYPE=--)\npc : mte_clear_page_tags+0x14/0x24\nlr : mte_sync_tags+0x1c0/0x240\nsp : ffff80003150bb80\nx29: ffff80003150bb80 x28: ffff00739e9705a8 x27: 0000ffd2d6a00000\nx26: 0000ff8e4bc00000 x25: 00e80046cde00f45 x24: 0000000000022458\nx23: 0000000000000000 x22: 0000000000000004 x21: 000000011b380000\nx20: ffff000000000000 x19: 000000011b379f40 x18: 0000000000000000\nx17: 0000000000000000 x16: 0000000000000000 x15: 0000000000000000\nx14: 0000000000000000 x13: 0000000000000000 x12: 0000000000000000\nx11: 0000000000000000 x10: 0000000000000000 x9 : ffffc875e0aa5e2c\nx8 : 0000000000000000 x7 : 0000000000000000 x6 : 0000000000000000\nx5 : fffffc01ce7a5c00 x4 : 00000000046cde00 x3 : fffffc0000000000\nx2 : 0000000000000004 x1 : 0000000000000040 x0 : ffff0046cde7c000\n\nCall trace:\n mte_clear_page_tags+0x14/0x24\n set_huge_pte_at+0x25c/0x280\n hugetlb_change_protection+0x220/0x430\n change_protection+0x5c/0x8c\n mprotect_fixup+0x10c/0x294\n do_mprotect_pkey.constprop.0+0x2e0/0x3d4\n __arm64_sys_mprotect+0x24/0x44\n invoke_syscall+0x50/0x160\n el0_svc_common+0x48/0x144\n do_el0_svc+0x30/0xe0\n el0_svc+0x30/0xf0\n el0t_64_sync_handler+0xc4/0x148\n el0t_64_sync+0x1a4/0x1a8\n\nSoft lockup is not triggered with THP or base page because there is\ncond_resched() called for each PMD size.\n\nAlthough the soft lockup was triggered by MTE, it should be not MTE\nspecific. The other processing which takes long time in the loop may\ntrigger soft lockup too.\n\nSo add cond_resched() for hugetlb to avoid soft lockup.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 16.0:cluster-md-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dtb-allwinner-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-altera-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amazon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amlogic-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apple-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-arm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-broadcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-cavium-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-exynos-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-freescale-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-hisilicon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-lg-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-marvell-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-mediatek-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-nvidia-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-qcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-renesas-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-rockchip-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-socionext-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-sprd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-xilinx-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40153",
"url": "https://www.suse.com/security/cve/CVE-2025-40153"
},
{
"category": "external",
"summary": "SUSE Bug 1253408 for CVE-2025-40153",
"url": "https://bugzilla.suse.com/1253408"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 16.0:cluster-md-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dtb-allwinner-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-altera-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amazon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amlogic-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apple-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-arm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-broadcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-cavium-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-exynos-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-freescale-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-hisilicon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-lg-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-marvell-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-mediatek-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-nvidia-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-qcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-renesas-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-rockchip-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-socionext-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-sprd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-xilinx-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.3,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"openSUSE Leap 16.0:cluster-md-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dtb-allwinner-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-altera-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amazon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amlogic-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apple-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-arm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-broadcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-cavium-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-exynos-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-freescale-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-hisilicon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-lg-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-marvell-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-mediatek-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-nvidia-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-qcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-renesas-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-rockchip-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-socionext-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-sprd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-xilinx-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-19T17:38:16Z",
"details": "low"
}
],
"title": "CVE-2025-40153"
},
{
"cve": "CVE-2025-40154",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40154"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nASoC: Intel: bytcr_rt5640: Fix invalid quirk input mapping\n\nWhen an invalid value is passed via quirk option, currently\nbytcr_rt5640 driver only shows an error message but leaves as is.\nThis may lead to unepxected results like OOB access.\n\nThis patch corrects the input mapping to the certain default value if\nan invalid value is passed.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 16.0:cluster-md-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dtb-allwinner-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-altera-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amazon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amlogic-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apple-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-arm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-broadcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-cavium-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-exynos-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-freescale-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-hisilicon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-lg-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-marvell-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-mediatek-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-nvidia-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-qcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-renesas-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-rockchip-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-socionext-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-sprd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-xilinx-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40154",
"url": "https://www.suse.com/security/cve/CVE-2025-40154"
},
{
"category": "external",
"summary": "SUSE Bug 1253431 for CVE-2025-40154",
"url": "https://bugzilla.suse.com/1253431"
},
{
"category": "external",
"summary": "SUSE Bug 1253432 for CVE-2025-40154",
"url": "https://bugzilla.suse.com/1253432"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 16.0:cluster-md-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dtb-allwinner-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-altera-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amazon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amlogic-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apple-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-arm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-broadcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-cavium-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-exynos-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-freescale-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-hisilicon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-lg-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-marvell-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-mediatek-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-nvidia-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-qcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-renesas-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-rockchip-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-socionext-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-sprd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-xilinx-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"openSUSE Leap 16.0:cluster-md-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dtb-allwinner-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-altera-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amazon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amlogic-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apple-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-arm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-broadcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-cavium-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-exynos-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-freescale-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-hisilicon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-lg-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-marvell-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-mediatek-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-nvidia-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-qcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-renesas-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-rockchip-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-socionext-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-sprd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-xilinx-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-19T17:38:16Z",
"details": "moderate"
}
],
"title": "CVE-2025-40154"
},
{
"cve": "CVE-2025-40156",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40156"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nPM / devfreq: mtk-cci: Fix potential error pointer dereference in probe()\n\nThe drv-\u003esram_reg pointer could be set to ERR_PTR(-EPROBE_DEFER) which\nwould lead to a error pointer dereference. Use IS_ERR_OR_NULL() to check\nthat the pointer is valid.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 16.0:cluster-md-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dtb-allwinner-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-altera-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amazon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amlogic-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apple-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-arm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-broadcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-cavium-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-exynos-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-freescale-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-hisilicon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-lg-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-marvell-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-mediatek-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-nvidia-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-qcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-renesas-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-rockchip-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-socionext-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-sprd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-xilinx-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40156",
"url": "https://www.suse.com/security/cve/CVE-2025-40156"
},
{
"category": "external",
"summary": "SUSE Bug 1253428 for CVE-2025-40156",
"url": "https://bugzilla.suse.com/1253428"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 16.0:cluster-md-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dtb-allwinner-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-altera-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amazon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amlogic-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apple-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-arm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-broadcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-cavium-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-exynos-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-freescale-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-hisilicon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-lg-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-marvell-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-mediatek-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-nvidia-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-qcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-renesas-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-rockchip-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-socionext-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-sprd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-xilinx-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Leap 16.0:cluster-md-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dtb-allwinner-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-altera-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amazon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amlogic-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apple-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-arm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-broadcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-cavium-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-exynos-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-freescale-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-hisilicon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-lg-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-marvell-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-mediatek-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-nvidia-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-qcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-renesas-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-rockchip-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-socionext-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-sprd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-xilinx-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-19T17:38:16Z",
"details": "moderate"
}
],
"title": "CVE-2025-40156"
},
{
"cve": "CVE-2025-40157",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40157"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nEDAC/i10nm: Skip DIMM enumeration on a disabled memory controller\n\nWhen loading the i10nm_edac driver on some Intel Granite Rapids servers,\na call trace may appear as follows:\n\n UBSAN: shift-out-of-bounds in drivers/edac/skx_common.c:453:16\n shift exponent -66 is negative\n ...\n __ubsan_handle_shift_out_of_bounds+0x1e3/0x390\n skx_get_dimm_info.cold+0x47/0xd40 [skx_edac_common]\n i10nm_get_dimm_config+0x23e/0x390 [i10nm_edac]\n skx_register_mci+0x159/0x220 [skx_edac_common]\n i10nm_init+0xcb0/0x1ff0 [i10nm_edac]\n ...\n\nThis occurs because some BIOS may disable a memory controller if there\naren\u0027t any memory DIMMs populated on this memory controller. The DIMMMTR\nregister of this disabled memory controller contains the invalid value\n~0, resulting in the call trace above.\n\nFix this call trace by skipping DIMM enumeration on a disabled memory\ncontroller.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 16.0:cluster-md-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dtb-allwinner-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-altera-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amazon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amlogic-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apple-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-arm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-broadcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-cavium-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-exynos-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-freescale-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-hisilicon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-lg-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-marvell-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-mediatek-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-nvidia-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-qcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-renesas-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-rockchip-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-socionext-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-sprd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-xilinx-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40157",
"url": "https://www.suse.com/security/cve/CVE-2025-40157"
},
{
"category": "external",
"summary": "SUSE Bug 1253423 for CVE-2025-40157",
"url": "https://bugzilla.suse.com/1253423"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 16.0:cluster-md-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dtb-allwinner-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-altera-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amazon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amlogic-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apple-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-arm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-broadcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-cavium-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-exynos-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-freescale-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-hisilicon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-lg-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-marvell-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-mediatek-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-nvidia-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-qcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-renesas-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-rockchip-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-socionext-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-sprd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-xilinx-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.2,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:L/I:L/A:H",
"version": "3.1"
},
"products": [
"openSUSE Leap 16.0:cluster-md-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dtb-allwinner-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-altera-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amazon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amlogic-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apple-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-arm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-broadcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-cavium-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-exynos-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-freescale-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-hisilicon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-lg-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-marvell-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-mediatek-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-nvidia-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-qcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-renesas-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-rockchip-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-socionext-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-sprd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-xilinx-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-19T17:38:16Z",
"details": "moderate"
}
],
"title": "CVE-2025-40157"
},
{
"cve": "CVE-2025-40158",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40158"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nipv6: use RCU in ip6_output()\n\nUse RCU in ip6_output() in order to use dst_dev_rcu() to prevent\npossible UAF.\n\nWe can remove rcu_read_lock()/rcu_read_unlock() pairs\nfrom ip6_finish_output2().",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 16.0:cluster-md-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dtb-allwinner-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-altera-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amazon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amlogic-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apple-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-arm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-broadcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-cavium-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-exynos-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-freescale-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-hisilicon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-lg-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-marvell-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-mediatek-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-nvidia-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-qcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-renesas-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-rockchip-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-socionext-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-sprd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-xilinx-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40158",
"url": "https://www.suse.com/security/cve/CVE-2025-40158"
},
{
"category": "external",
"summary": "SUSE Bug 1253402 for CVE-2025-40158",
"url": "https://bugzilla.suse.com/1253402"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 16.0:cluster-md-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dtb-allwinner-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-altera-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amazon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amlogic-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apple-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-arm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-broadcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-cavium-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-exynos-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-freescale-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-hisilicon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-lg-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-marvell-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-mediatek-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-nvidia-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-qcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-renesas-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-rockchip-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-socionext-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-sprd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-xilinx-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:H",
"version": "3.1"
},
"products": [
"openSUSE Leap 16.0:cluster-md-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dtb-allwinner-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-altera-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amazon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amlogic-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apple-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-arm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-broadcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-cavium-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-exynos-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-freescale-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-hisilicon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-lg-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-marvell-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-mediatek-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-nvidia-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-qcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-renesas-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-rockchip-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-socionext-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-sprd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-xilinx-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-19T17:38:16Z",
"details": "moderate"
}
],
"title": "CVE-2025-40158"
},
{
"cve": "CVE-2025-40159",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40159"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nxsk: Harden userspace-supplied xdp_desc validation\n\nTurned out certain clearly invalid values passed in xdp_desc from\nuserspace can pass xp_{,un}aligned_validate_desc() and then lead\nto UBs or just invalid frames to be queued for xmit.\n\ndesc-\u003elen close to ``U32_MAX`` with a non-zero pool-\u003etx_metadata_len\ncan cause positive integer overflow and wraparound, the same way low\nenough desc-\u003eaddr with a non-zero pool-\u003etx_metadata_len can cause\nnegative integer overflow. Both scenarios can then pass the\nvalidation successfully.\nThis doesn\u0027t happen with valid XSk applications, but can be used\nto perform attacks.\n\nAlways promote desc-\u003elen to ``u64`` first to exclude positive\noverflows of it. Use explicit check_{add,sub}_overflow() when\nvalidating desc-\u003eaddr (which is ``u64`` already).\n\nbloat-o-meter reports a little growth of the code size:\n\nadd/remove: 0/0 grow/shrink: 2/1 up/down: 60/-16 (44)\nFunction old new delta\nxskq_cons_peek_desc 299 330 +31\nxsk_tx_peek_release_desc_batch 973 1002 +29\nxsk_generic_xmit 3148 3132 -16\n\nbut hopefully this doesn\u0027t hurt the performance much.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 16.0:cluster-md-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dtb-allwinner-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-altera-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amazon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amlogic-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apple-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-arm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-broadcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-cavium-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-exynos-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-freescale-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-hisilicon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-lg-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-marvell-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-mediatek-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-nvidia-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-qcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-renesas-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-rockchip-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-socionext-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-sprd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-xilinx-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40159",
"url": "https://www.suse.com/security/cve/CVE-2025-40159"
},
{
"category": "external",
"summary": "SUSE Bug 1253403 for CVE-2025-40159",
"url": "https://bugzilla.suse.com/1253403"
},
{
"category": "external",
"summary": "SUSE Bug 1253404 for CVE-2025-40159",
"url": "https://bugzilla.suse.com/1253404"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 16.0:cluster-md-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dtb-allwinner-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-altera-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amazon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amlogic-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apple-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-arm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-broadcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-cavium-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-exynos-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-freescale-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-hisilicon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-lg-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-marvell-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-mediatek-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-nvidia-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-qcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-renesas-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-rockchip-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-socionext-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-sprd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-xilinx-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"openSUSE Leap 16.0:cluster-md-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dtb-allwinner-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-altera-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amazon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amlogic-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apple-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-arm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-broadcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-cavium-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-exynos-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-freescale-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-hisilicon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-lg-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-marvell-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-mediatek-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-nvidia-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-qcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-renesas-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-rockchip-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-socionext-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-sprd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-xilinx-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-19T17:38:16Z",
"details": "important"
}
],
"title": "CVE-2025-40159"
},
{
"cve": "CVE-2025-40161",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40161"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nmailbox: zynqmp-ipi: Fix SGI cleanup on unbind\n\nThe driver incorrectly determines SGI vs SPI interrupts by checking IRQ\nnumber \u003c 16, which fails with dynamic IRQ allocation. During unbind,\nthis causes improper SGI cleanup leading to kernel crash.\n\nAdd explicit irq_type field to pdata for reliable identification of SGI\ninterrupts (type-2) and only clean up SGI resources when appropriate.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 16.0:cluster-md-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dtb-allwinner-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-altera-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amazon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amlogic-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apple-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-arm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-broadcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-cavium-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-exynos-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-freescale-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-hisilicon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-lg-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-marvell-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-mediatek-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-nvidia-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-qcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-renesas-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-rockchip-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-socionext-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-sprd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-xilinx-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40161",
"url": "https://www.suse.com/security/cve/CVE-2025-40161"
},
{
"category": "external",
"summary": "SUSE Bug 1253410 for CVE-2025-40161",
"url": "https://bugzilla.suse.com/1253410"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 16.0:cluster-md-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dtb-allwinner-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-altera-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amazon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amlogic-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apple-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-arm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-broadcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-cavium-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-exynos-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-freescale-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-hisilicon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-lg-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-marvell-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-mediatek-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-nvidia-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-qcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-renesas-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-rockchip-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-socionext-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-sprd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-xilinx-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.1,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H",
"version": "3.1"
},
"products": [
"openSUSE Leap 16.0:cluster-md-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dtb-allwinner-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-altera-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amazon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amlogic-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apple-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-arm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-broadcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-cavium-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-exynos-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-freescale-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-hisilicon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-lg-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-marvell-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-mediatek-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-nvidia-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-qcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-renesas-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-rockchip-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-socionext-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-sprd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-xilinx-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-19T17:38:16Z",
"details": "moderate"
}
],
"title": "CVE-2025-40161"
},
{
"cve": "CVE-2025-40162",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40162"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nASoC: amd/sdw_utils: avoid NULL deref when devm_kasprintf() fails\n\ndevm_kasprintf() may return NULL on memory allocation failure,\nbut the debug message prints cpus-\u003edai_name before checking it.\nMove the dev_dbg() call after the NULL check to prevent potential\nNULL pointer dereference.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 16.0:cluster-md-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dtb-allwinner-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-altera-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amazon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amlogic-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apple-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-arm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-broadcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-cavium-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-exynos-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-freescale-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-hisilicon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-lg-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-marvell-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-mediatek-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-nvidia-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-qcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-renesas-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-rockchip-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-socionext-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-sprd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-xilinx-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40162",
"url": "https://www.suse.com/security/cve/CVE-2025-40162"
},
{
"category": "external",
"summary": "SUSE Bug 1253422 for CVE-2025-40162",
"url": "https://bugzilla.suse.com/1253422"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 16.0:cluster-md-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dtb-allwinner-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-altera-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amazon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amlogic-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apple-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-arm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-broadcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-cavium-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-exynos-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-freescale-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-hisilicon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-lg-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-marvell-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-mediatek-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-nvidia-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-qcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-renesas-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-rockchip-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-socionext-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-sprd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-xilinx-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Leap 16.0:cluster-md-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dtb-allwinner-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-altera-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amazon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amlogic-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apple-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-arm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-broadcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-cavium-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-exynos-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-freescale-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-hisilicon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-lg-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-marvell-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-mediatek-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-nvidia-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-qcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-renesas-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-rockchip-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-socionext-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-sprd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-xilinx-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-19T17:38:16Z",
"details": "moderate"
}
],
"title": "CVE-2025-40162"
},
{
"cve": "CVE-2025-40164",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40164"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nusbnet: Fix using smp_processor_id() in preemptible code warnings\n\nSyzbot reported the following warning:\n\nBUG: using smp_processor_id() in preemptible [00000000] code: dhcpcd/2879\ncaller is usbnet_skb_return+0x74/0x490 drivers/net/usb/usbnet.c:331\nCPU: 1 UID: 0 PID: 2879 Comm: dhcpcd Not tainted 6.15.0-rc4-syzkaller-00098-g615dca38c2ea #0 PREEMPT(voluntary)\nCall Trace:\n \u003cTASK\u003e\n __dump_stack lib/dump_stack.c:94 [inline]\n dump_stack_lvl+0x16c/0x1f0 lib/dump_stack.c:120\n check_preemption_disabled+0xd0/0xe0 lib/smp_processor_id.c:49\n usbnet_skb_return+0x74/0x490 drivers/net/usb/usbnet.c:331\n usbnet_resume_rx+0x4b/0x170 drivers/net/usb/usbnet.c:708\n usbnet_change_mtu+0x1be/0x220 drivers/net/usb/usbnet.c:417\n __dev_set_mtu net/core/dev.c:9443 [inline]\n netif_set_mtu_ext+0x369/0x5c0 net/core/dev.c:9496\n netif_set_mtu+0xb0/0x160 net/core/dev.c:9520\n dev_set_mtu+0xae/0x170 net/core/dev_api.c:247\n dev_ifsioc+0xa31/0x18d0 net/core/dev_ioctl.c:572\n dev_ioctl+0x223/0x10e0 net/core/dev_ioctl.c:821\n sock_do_ioctl+0x19d/0x280 net/socket.c:1204\n sock_ioctl+0x42f/0x6a0 net/socket.c:1311\n vfs_ioctl fs/ioctl.c:51 [inline]\n __do_sys_ioctl fs/ioctl.c:906 [inline]\n __se_sys_ioctl fs/ioctl.c:892 [inline]\n __x64_sys_ioctl+0x190/0x200 fs/ioctl.c:892\n do_syscall_x64 arch/x86/entry/syscall_64.c:63 [inline]\n do_syscall_64+0xcd/0x260 arch/x86/entry/syscall_64.c:94\n entry_SYSCALL_64_after_hwframe+0x77/0x7f\n\nFor historical and portability reasons, the netif_rx() is usually\nrun in the softirq or interrupt context, this commit therefore add\nlocal_bh_disable/enable() protection in the usbnet_resume_rx().",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 16.0:cluster-md-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dtb-allwinner-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-altera-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amazon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amlogic-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apple-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-arm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-broadcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-cavium-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-exynos-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-freescale-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-hisilicon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-lg-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-marvell-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-mediatek-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-nvidia-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-qcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-renesas-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-rockchip-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-socionext-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-sprd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-xilinx-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40164",
"url": "https://www.suse.com/security/cve/CVE-2025-40164"
},
{
"category": "external",
"summary": "SUSE Bug 1253407 for CVE-2025-40164",
"url": "https://bugzilla.suse.com/1253407"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 16.0:cluster-md-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dtb-allwinner-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-altera-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amazon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amlogic-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apple-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-arm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-broadcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-cavium-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-exynos-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-freescale-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-hisilicon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-lg-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-marvell-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-mediatek-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-nvidia-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-qcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-renesas-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-rockchip-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-socionext-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-sprd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-xilinx-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.7,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Leap 16.0:cluster-md-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dtb-allwinner-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-altera-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amazon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amlogic-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apple-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-arm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-broadcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-cavium-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-exynos-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-freescale-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-hisilicon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-lg-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-marvell-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-mediatek-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-nvidia-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-qcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-renesas-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-rockchip-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-socionext-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-sprd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-xilinx-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-19T17:38:16Z",
"details": "moderate"
}
],
"title": "CVE-2025-40164"
},
{
"cve": "CVE-2025-40165",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40165"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nmedia: nxp: imx8-isi: m2m: Fix streaming cleanup on release\n\nIf streamon/streamoff calls are imbalanced, such as when exiting an\napplication with Ctrl+C when streaming, the m2m usage_count will never\nreach zero and the ISI channel won\u0027t be freed. Besides from that, if the\ninput line width is more than 2K, it will trigger a WARN_ON():\n\n[ 59.222120] ------------[ cut here ]------------\n[ 59.226758] WARNING: drivers/media/platform/nxp/imx8-isi/imx8-isi-hw.c:631 at mxc_isi_channel_chain+0xa4/0x120, CPU#4: v4l2-ctl/654\n[ 59.238569] Modules linked in: ap1302\n[ 59.242231] CPU: 4 UID: 0 PID: 654 Comm: v4l2-ctl Not tainted 6.16.0-rc4-next-20250704-06511-gff0e002d480a-dirty #258 PREEMPT\n[ 59.253597] Hardware name: NXP i.MX95 15X15 board (DT)\n[ 59.258720] pstate: 80400009 (Nzcv daif +PAN -UAO -TCO -DIT -SSBS BTYPE=--)\n[ 59.265669] pc : mxc_isi_channel_chain+0xa4/0x120\n[ 59.270358] lr : mxc_isi_channel_chain+0x44/0x120\n[ 59.275047] sp : ffff8000848c3b40\n[ 59.278348] x29: ffff8000848c3b40 x28: ffff0000859b4c98 x27: ffff800081939f00\n[ 59.285472] x26: 000000000000000a x25: ffff0000859b4cb8 x24: 0000000000000001\n[ 59.292597] x23: ffff0000816f4760 x22: ffff0000816f4258 x21: ffff000084ceb780\n[ 59.299720] x20: ffff000084342ff8 x19: ffff000084340000 x18: 0000000000000000\n[ 59.306845] x17: 0000000000000000 x16: 0000000000000000 x15: 0000ffffdb369e1c\n[ 59.313969] x14: 0000000000000000 x13: 0000000000000000 x12: 0000000000000000\n[ 59.321093] x11: 0000000000000000 x10: 0000000000000000 x9 : 0000000000000000\n[ 59.328217] x8 : ffff8000848c3d48 x7 : ffff800081930b30 x6 : ffff800081930b30\n[ 59.335340] x5 : ffff0000859b6000 x4 : ffff80008193ae80 x3 : ffff800081022420\n[ 59.342464] x2 : ffff0000852f6900 x1 : 0000000000000001 x0 : ffff000084341000\n[ 59.349590] Call trace:\n[ 59.352025] mxc_isi_channel_chain+0xa4/0x120 (P)\n[ 59.356722] mxc_isi_m2m_streamon+0x160/0x20c\n[ 59.361072] v4l_streamon+0x24/0x30\n[ 59.364556] __video_do_ioctl+0x40c/0x4a0\n[ 59.368560] video_usercopy+0x2bc/0x690\n[ 59.372382] video_ioctl2+0x18/0x24\n[ 59.375857] v4l2_ioctl+0x40/0x60\n[ 59.379168] __arm64_sys_ioctl+0xac/0x104\n[ 59.383172] invoke_syscall+0x48/0x104\n[ 59.386916] el0_svc_common.constprop.0+0xc0/0xe0\n[ 59.391613] do_el0_svc+0x1c/0x28\n[ 59.394915] el0_svc+0x34/0xf4\n[ 59.397966] el0t_64_sync_handler+0xa0/0xe4\n[ 59.402143] el0t_64_sync+0x198/0x19c\n[ 59.405801] ---[ end trace 0000000000000000 ]---\n\nAddress this issue by moving the streaming preparation and cleanup to\nthe vb2 .prepare_streaming() and .unprepare_streaming() operations. This\nalso simplifies the driver by allowing direct usage of the\nv4l2_m2m_ioctl_streamon() and v4l2_m2m_ioctl_streamoff() helpers.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 16.0:cluster-md-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dtb-allwinner-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-altera-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amazon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amlogic-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apple-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-arm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-broadcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-cavium-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-exynos-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-freescale-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-hisilicon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-lg-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-marvell-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-mediatek-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-nvidia-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-qcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-renesas-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-rockchip-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-socionext-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-sprd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-xilinx-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40165",
"url": "https://www.suse.com/security/cve/CVE-2025-40165"
},
{
"category": "external",
"summary": "SUSE Bug 1253405 for CVE-2025-40165",
"url": "https://bugzilla.suse.com/1253405"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 16.0:cluster-md-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dtb-allwinner-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-altera-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amazon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amlogic-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apple-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-arm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-broadcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-cavium-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-exynos-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-freescale-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-hisilicon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-lg-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-marvell-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-mediatek-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-nvidia-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-qcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-renesas-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-rockchip-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-socionext-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-sprd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-xilinx-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.7,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Leap 16.0:cluster-md-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dtb-allwinner-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-altera-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amazon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amlogic-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apple-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-arm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-broadcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-cavium-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-exynos-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-freescale-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-hisilicon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-lg-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-marvell-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-mediatek-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-nvidia-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-qcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-renesas-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-rockchip-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-socionext-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-sprd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-xilinx-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-19T17:38:16Z",
"details": "moderate"
}
],
"title": "CVE-2025-40165"
},
{
"cve": "CVE-2025-40166",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40166"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\ndrm/xe/guc: Check GuC running state before deregistering exec queue\n\nIn normal operation, a registered exec queue is disabled and\nderegistered through the GuC, and freed only after the GuC confirms\ncompletion. However, if the driver is forced to unbind while the exec\nqueue is still running, the user may call exec_destroy() after the GuC\nhas already been stopped and CT communication disabled.\n\nIn this case, the driver cannot receive a response from the GuC,\npreventing proper cleanup of exec queue resources. Fix this by directly\nreleasing the resources when GuC is not running.\n\nHere is the failure dmesg log:\n\"\n[ 468.089581] ---[ end trace 0000000000000000 ]---\n[ 468.089608] pci 0000:03:00.0: [drm] *ERROR* GT0: GUC ID manager unclean (1/65535)\n[ 468.090558] pci 0000:03:00.0: [drm] GT0: total 65535\n[ 468.090562] pci 0000:03:00.0: [drm] GT0: used 1\n[ 468.090564] pci 0000:03:00.0: [drm] GT0: range 1..1 (1)\n[ 468.092716] ------------[ cut here ]------------\n[ 468.092719] WARNING: CPU: 14 PID: 4775 at drivers/gpu/drm/xe/xe_ttm_vram_mgr.c:298 ttm_vram_mgr_fini+0xf8/0x130 [xe]\n\"\n\nv2: use xe_uc_fw_is_running() instead of xe_guc_ct_enabled().\n As CT may go down and come back during VF migration.\n\n(cherry picked from commit 9b42321a02c50a12b2beb6ae9469606257fbecea)",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 16.0:cluster-md-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dtb-allwinner-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-altera-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amazon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amlogic-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apple-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-arm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-broadcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-cavium-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-exynos-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-freescale-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-hisilicon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-lg-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-marvell-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-mediatek-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-nvidia-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-qcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-renesas-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-rockchip-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-socionext-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-sprd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-xilinx-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40166",
"url": "https://www.suse.com/security/cve/CVE-2025-40166"
},
{
"category": "external",
"summary": "SUSE Bug 1253433 for CVE-2025-40166",
"url": "https://bugzilla.suse.com/1253433"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 16.0:cluster-md-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dtb-allwinner-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-altera-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amazon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amlogic-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apple-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-arm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-broadcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-cavium-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-exynos-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-freescale-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-hisilicon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-lg-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-marvell-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-mediatek-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-nvidia-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-qcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-renesas-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-rockchip-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-socionext-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-sprd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-xilinx-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Leap 16.0:cluster-md-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dtb-allwinner-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-altera-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amazon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amlogic-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apple-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-arm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-broadcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-cavium-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-exynos-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-freescale-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-hisilicon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-lg-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-marvell-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-mediatek-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-nvidia-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-qcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-renesas-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-rockchip-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-socionext-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-sprd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-xilinx-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-19T17:38:16Z",
"details": "moderate"
}
],
"title": "CVE-2025-40166"
},
{
"cve": "CVE-2025-40168",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40168"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nsmc: Use __sk_dst_get() and dst_dev_rcu() in smc_clc_prfx_match().\n\nsmc_clc_prfx_match() is called from smc_listen_work() and\nnot under RCU nor RTNL.\n\nUsing sk_dst_get(sk)-\u003edev could trigger UAF.\n\nLet\u0027s use __sk_dst_get() and dst_dev_rcu().\n\nNote that the returned value of smc_clc_prfx_match() is not\nused in the caller.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 16.0:cluster-md-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dtb-allwinner-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-altera-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amazon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amlogic-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apple-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-arm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-broadcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-cavium-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-exynos-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-freescale-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-hisilicon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-lg-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-marvell-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-mediatek-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-nvidia-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-qcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-renesas-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-rockchip-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-socionext-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-sprd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-xilinx-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40168",
"url": "https://www.suse.com/security/cve/CVE-2025-40168"
},
{
"category": "external",
"summary": "SUSE Bug 1253427 for CVE-2025-40168",
"url": "https://bugzilla.suse.com/1253427"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 16.0:cluster-md-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dtb-allwinner-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-altera-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amazon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amlogic-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apple-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-arm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-broadcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-cavium-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-exynos-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-freescale-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-hisilicon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-lg-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-marvell-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-mediatek-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-nvidia-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-qcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-renesas-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-rockchip-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-socionext-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-sprd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-xilinx-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:H",
"version": "3.1"
},
"products": [
"openSUSE Leap 16.0:cluster-md-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dtb-allwinner-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-altera-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amazon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amlogic-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apple-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-arm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-broadcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-cavium-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-exynos-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-freescale-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-hisilicon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-lg-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-marvell-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-mediatek-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-nvidia-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-qcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-renesas-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-rockchip-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-socionext-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-sprd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-xilinx-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-19T17:38:16Z",
"details": "moderate"
}
],
"title": "CVE-2025-40168"
},
{
"cve": "CVE-2025-40169",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40169"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nbpf: Reject negative offsets for ALU ops\n\nWhen verifying BPF programs, the check_alu_op() function validates\ninstructions with ALU operations. The \u0027offset\u0027 field in these\ninstructions is a signed 16-bit integer.\n\nThe existing check \u0027insn-\u003eoff \u003e 1\u0027 was intended to ensure the offset is\neither 0, or 1 for BPF_MOD/BPF_DIV. However, because \u0027insn-\u003eoff\u0027 is\nsigned, this check incorrectly accepts all negative values (e.g., -1).\n\nThis commit tightens the validation by changing the condition to\n\u0027(insn-\u003eoff != 0 \u0026\u0026 insn-\u003eoff != 1)\u0027. This ensures that any value\nother than the explicitly permitted 0 and 1 is rejected, hardening the\nverifier against malformed BPF programs.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 16.0:cluster-md-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dtb-allwinner-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-altera-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amazon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amlogic-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apple-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-arm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-broadcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-cavium-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-exynos-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-freescale-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-hisilicon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-lg-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-marvell-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-mediatek-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-nvidia-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-qcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-renesas-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-rockchip-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-socionext-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-sprd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-xilinx-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40169",
"url": "https://www.suse.com/security/cve/CVE-2025-40169"
},
{
"category": "external",
"summary": "SUSE Bug 1253416 for CVE-2025-40169",
"url": "https://bugzilla.suse.com/1253416"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 16.0:cluster-md-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dtb-allwinner-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-altera-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amazon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amlogic-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apple-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-arm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-broadcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-cavium-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-exynos-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-freescale-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-hisilicon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-lg-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-marvell-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-mediatek-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-nvidia-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-qcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-renesas-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-rockchip-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-socionext-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-sprd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-xilinx-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.8,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H",
"version": "3.1"
},
"products": [
"openSUSE Leap 16.0:cluster-md-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dtb-allwinner-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-altera-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amazon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amlogic-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apple-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-arm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-broadcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-cavium-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-exynos-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-freescale-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-hisilicon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-lg-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-marvell-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-mediatek-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-nvidia-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-qcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-renesas-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-rockchip-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-socionext-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-sprd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-xilinx-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-19T17:38:16Z",
"details": "moderate"
}
],
"title": "CVE-2025-40169"
},
{
"cve": "CVE-2025-40171",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40171"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnvmet-fc: move lsop put work to nvmet_fc_ls_req_op\n\nIt\u0027s possible for more than one async command to be in flight from\n__nvmet_fc_send_ls_req. For each command, a tgtport reference is taken.\n\nIn the current code, only one put work item is queued at a time, which\nresults in a leaked reference.\n\nTo fix this, move the work item to the nvmet_fc_ls_req_op struct, which\nalready tracks all resources related to the command.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 16.0:cluster-md-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dtb-allwinner-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-altera-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amazon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amlogic-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apple-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-arm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-broadcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-cavium-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-exynos-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-freescale-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-hisilicon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-lg-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-marvell-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-mediatek-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-nvidia-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-qcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-renesas-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-rockchip-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-socionext-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-sprd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-xilinx-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40171",
"url": "https://www.suse.com/security/cve/CVE-2025-40171"
},
{
"category": "external",
"summary": "SUSE Bug 1253412 for CVE-2025-40171",
"url": "https://bugzilla.suse.com/1253412"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 16.0:cluster-md-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dtb-allwinner-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-altera-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amazon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amlogic-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apple-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-arm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-broadcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-cavium-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-exynos-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-freescale-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-hisilicon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-lg-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-marvell-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-mediatek-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-nvidia-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-qcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-renesas-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-rockchip-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-socionext-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-sprd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-xilinx-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:H",
"version": "3.1"
},
"products": [
"openSUSE Leap 16.0:cluster-md-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dtb-allwinner-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-altera-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amazon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amlogic-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apple-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-arm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-broadcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-cavium-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-exynos-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-freescale-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-hisilicon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-lg-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-marvell-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-mediatek-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-nvidia-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-qcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-renesas-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-rockchip-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-socionext-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-sprd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-xilinx-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-19T17:38:16Z",
"details": "moderate"
}
],
"title": "CVE-2025-40171"
},
{
"cve": "CVE-2025-40172",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40172"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\naccel/qaic: Treat remaining == 0 as error in find_and_map_user_pages()\n\nCurrently, if find_and_map_user_pages() takes a DMA xfer request from the\nuser with a length field set to 0, or in a rare case, the host receives\nQAIC_TRANS_DMA_XFER_CONT from the device where resources-\u003exferred_dma_size\nis equal to the requested transaction size, the function will return 0\nbefore allocating an sgt or setting the fields of the dma_xfer struct.\nIn that case, encode_addr_size_pairs() will try to access the sgt which\nwill lead to a general protection fault.\n\nReturn an EINVAL in case the user provides a zero-sized ALP, or the device\nrequests continuation after all of the bytes have been transferred.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 16.0:cluster-md-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dtb-allwinner-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-altera-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amazon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amlogic-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apple-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-arm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-broadcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-cavium-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-exynos-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-freescale-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-hisilicon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-lg-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-marvell-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-mediatek-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-nvidia-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-qcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-renesas-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-rockchip-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-socionext-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-sprd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-xilinx-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40172",
"url": "https://www.suse.com/security/cve/CVE-2025-40172"
},
{
"category": "external",
"summary": "SUSE Bug 1253424 for CVE-2025-40172",
"url": "https://bugzilla.suse.com/1253424"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 16.0:cluster-md-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dtb-allwinner-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-altera-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amazon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amlogic-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apple-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-arm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-broadcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-cavium-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-exynos-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-freescale-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-hisilicon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-lg-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-marvell-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-mediatek-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-nvidia-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-qcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-renesas-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-rockchip-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-socionext-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-sprd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-xilinx-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Leap 16.0:cluster-md-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dtb-allwinner-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-altera-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amazon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amlogic-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apple-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-arm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-broadcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-cavium-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-exynos-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-freescale-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-hisilicon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-lg-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-marvell-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-mediatek-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-nvidia-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-qcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-renesas-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-rockchip-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-socionext-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-sprd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-xilinx-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-19T17:38:16Z",
"details": "moderate"
}
],
"title": "CVE-2025-40172"
},
{
"cve": "CVE-2025-40173",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40173"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnet/ip6_tunnel: Prevent perpetual tunnel growth\n\nSimilarly to ipv4 tunnel, ipv6 version updates dev-\u003eneeded_headroom, too.\nWhile ipv4 tunnel headroom adjustment growth was limited in\ncommit 5ae1e9922bbd (\"net: ip_tunnel: prevent perpetual headroom growth\"),\nipv6 tunnel yet increases the headroom without any ceiling.\n\nReflect ipv4 tunnel headroom adjustment limit on ipv6 version.\n\nCredits to Francesco Ruggeri, who was originally debugging this issue\nand wrote local Arista-specific patch and a reproducer.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 16.0:cluster-md-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dtb-allwinner-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-altera-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amazon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amlogic-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apple-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-arm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-broadcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-cavium-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-exynos-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-freescale-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-hisilicon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-lg-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-marvell-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-mediatek-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-nvidia-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-qcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-renesas-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-rockchip-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-socionext-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-sprd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-xilinx-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40173",
"url": "https://www.suse.com/security/cve/CVE-2025-40173"
},
{
"category": "external",
"summary": "SUSE Bug 1253421 for CVE-2025-40173",
"url": "https://bugzilla.suse.com/1253421"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 16.0:cluster-md-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dtb-allwinner-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-altera-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amazon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amlogic-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apple-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-arm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-broadcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-cavium-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-exynos-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-freescale-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-hisilicon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-lg-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-marvell-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-mediatek-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-nvidia-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-qcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-renesas-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-rockchip-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-socionext-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-sprd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-xilinx-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.7,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Leap 16.0:cluster-md-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dtb-allwinner-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-altera-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amazon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amlogic-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apple-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-arm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-broadcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-cavium-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-exynos-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-freescale-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-hisilicon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-lg-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-marvell-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-mediatek-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-nvidia-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-qcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-renesas-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-rockchip-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-socionext-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-sprd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-xilinx-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-19T17:38:16Z",
"details": "moderate"
}
],
"title": "CVE-2025-40173"
},
{
"cve": "CVE-2025-40175",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40175"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nidpf: cleanup remaining SKBs in PTP flows\n\nWhen the driver requests Tx timestamp value, one of the first steps is\nto clone SKB using skb_get. It increases the reference counter for that\nSKB to prevent unexpected freeing by another component.\nHowever, there may be a case where the index is requested, SKB is\nassigned and never consumed by PTP flows - for example due to reset during\nrunning PTP apps.\n\nAdd a check in release timestamping function to verify if the SKB\nassigned to Tx timestamp latch was freed, and release remaining SKBs.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 16.0:cluster-md-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dtb-allwinner-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-altera-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amazon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amlogic-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apple-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-arm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-broadcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-cavium-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-exynos-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-freescale-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-hisilicon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-lg-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-marvell-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-mediatek-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-nvidia-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-qcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-renesas-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-rockchip-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-socionext-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-sprd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-xilinx-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40175",
"url": "https://www.suse.com/security/cve/CVE-2025-40175"
},
{
"category": "external",
"summary": "SUSE Bug 1253426 for CVE-2025-40175",
"url": "https://bugzilla.suse.com/1253426"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 16.0:cluster-md-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dtb-allwinner-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-altera-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amazon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amlogic-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apple-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-arm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-broadcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-cavium-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-exynos-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-freescale-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-hisilicon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-lg-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-marvell-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-mediatek-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-nvidia-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-qcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-renesas-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-rockchip-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-socionext-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-sprd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-xilinx-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.7,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Leap 16.0:cluster-md-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dtb-allwinner-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-altera-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amazon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amlogic-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apple-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-arm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-broadcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-cavium-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-exynos-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-freescale-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-hisilicon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-lg-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-marvell-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-mediatek-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-nvidia-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-qcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-renesas-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-rockchip-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-socionext-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-sprd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-xilinx-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-19T17:38:16Z",
"details": "moderate"
}
],
"title": "CVE-2025-40175"
},
{
"cve": "CVE-2025-40176",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40176"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\ntls: wait for pending async decryptions if tls_strp_msg_hold fails\n\nAsync decryption calls tls_strp_msg_hold to create a clone of the\ninput skb to hold references to the memory it uses. If we fail to\nallocate that clone, proceeding with async decryption can lead to\nvarious issues (UAF on the skb, writing into userspace memory after\nthe recv() call has returned).\n\nIn this case, wait for all pending decryption requests.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 16.0:cluster-md-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dtb-allwinner-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-altera-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amazon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amlogic-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apple-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-arm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-broadcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-cavium-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-exynos-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-freescale-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-hisilicon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-lg-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-marvell-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-mediatek-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-nvidia-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-qcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-renesas-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-rockchip-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-socionext-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-sprd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-xilinx-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40176",
"url": "https://www.suse.com/security/cve/CVE-2025-40176"
},
{
"category": "external",
"summary": "SUSE Bug 1253425 for CVE-2025-40176",
"url": "https://bugzilla.suse.com/1253425"
},
{
"category": "external",
"summary": "SUSE Bug 1254100 for CVE-2025-40176",
"url": "https://bugzilla.suse.com/1254100"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 16.0:cluster-md-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dtb-allwinner-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-altera-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amazon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amlogic-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apple-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-arm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-broadcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-cavium-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-exynos-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-freescale-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-hisilicon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-lg-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-marvell-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-mediatek-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-nvidia-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-qcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-renesas-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-rockchip-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-socionext-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-sprd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-xilinx-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"openSUSE Leap 16.0:cluster-md-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dtb-allwinner-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-altera-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amazon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amlogic-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apple-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-arm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-broadcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-cavium-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-exynos-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-freescale-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-hisilicon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-lg-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-marvell-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-mediatek-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-nvidia-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-qcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-renesas-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-rockchip-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-socionext-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-sprd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-xilinx-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-19T17:38:16Z",
"details": "important"
}
],
"title": "CVE-2025-40176"
},
{
"cve": "CVE-2025-40177",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40177"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\naccel/qaic: Fix bootlog initialization ordering\n\nAs soon as we queue MHI buffers to receive the bootlog from the device,\nwe could be receiving data. Therefore all the resources needed to\nprocess that data need to be setup prior to queuing the buffers.\n\nWe currently initialize some of the resources after queuing the buffers\nwhich creates a race between the probe() and any data that comes back\nfrom the device. If the uninitialized resources are accessed, we could\nsee page faults.\n\nFix the init ordering to close the race.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 16.0:cluster-md-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dtb-allwinner-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-altera-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amazon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amlogic-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apple-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-arm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-broadcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-cavium-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-exynos-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-freescale-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-hisilicon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-lg-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-marvell-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-mediatek-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-nvidia-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-qcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-renesas-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-rockchip-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-socionext-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-sprd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-xilinx-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40177",
"url": "https://www.suse.com/security/cve/CVE-2025-40177"
},
{
"category": "external",
"summary": "SUSE Bug 1253443 for CVE-2025-40177",
"url": "https://bugzilla.suse.com/1253443"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 16.0:cluster-md-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dtb-allwinner-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-altera-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amazon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amlogic-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apple-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-arm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-broadcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-cavium-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-exynos-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-freescale-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-hisilicon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-lg-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-marvell-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-mediatek-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-nvidia-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-qcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-renesas-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-rockchip-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-socionext-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-sprd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-xilinx-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Leap 16.0:cluster-md-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dtb-allwinner-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-altera-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amazon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amlogic-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apple-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-arm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-broadcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-cavium-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-exynos-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-freescale-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-hisilicon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-lg-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-marvell-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-mediatek-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-nvidia-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-qcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-renesas-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-rockchip-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-socionext-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-sprd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-xilinx-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-19T17:38:16Z",
"details": "moderate"
}
],
"title": "CVE-2025-40177"
},
{
"cve": "CVE-2025-40178",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40178"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\npid: Add a judgment for ns null in pid_nr_ns\n\n__task_pid_nr_ns\n ns = task_active_pid_ns(current);\n pid_nr_ns(rcu_dereference(*task_pid_ptr(task, type)), ns);\n if (pid \u0026\u0026 ns-\u003elevel \u003c= pid-\u003elevel) {\n\nSometimes null is returned for task_active_pid_ns. Then it will trigger kernel panic in pid_nr_ns.\n\nFor example:\n\tUnable to handle kernel NULL pointer dereference at virtual address 0000000000000058\n\tMem abort info:\n\tESR = 0x0000000096000007\n\tEC = 0x25: DABT (current EL), IL = 32 bits\n\tSET = 0, FnV = 0\n\tEA = 0, S1PTW = 0\n\tFSC = 0x07: level 3 translation fault\n\tData abort info:\n\tISV = 0, ISS = 0x00000007, ISS2 = 0x00000000\n\tCM = 0, WnR = 0, TnD = 0, TagAccess = 0\n\tGCS = 0, Overlay = 0, DirtyBit = 0, Xs = 0\n\tuser pgtable: 4k pages, 39-bit VAs, pgdp=00000002175aa000\n\t[0000000000000058] pgd=08000002175ab003, p4d=08000002175ab003, pud=08000002175ab003, pmd=08000002175be003, pte=0000000000000000\n\tpstate: 834000c5 (Nzcv daIF +PAN -UAO +TCO +DIT -SSBS BTYPE=--)\n\tpc : __task_pid_nr_ns+0x74/0xd0\n\tlr : __task_pid_nr_ns+0x24/0xd0\n\tsp : ffffffc08001bd10\n\tx29: ffffffc08001bd10 x28: ffffffd4422b2000 x27: 0000000000000001\n\tx26: ffffffd442821168 x25: ffffffd442821000 x24: 00000f89492eab31\n\tx23: 00000000000000c0 x22: ffffff806f5693c0 x21: ffffff806f5693c0\n\tx20: 0000000000000001 x19: 0000000000000000 x18: 0000000000000000\n\tx17: 00000000529c6ef0 x16: 00000000529c6ef0 x15: 00000000023a1adc\n\tx14: 0000000000000003 x13: 00000000007ef6d8 x12: 001167c391c78800\n\tx11: 00ffffffffffffff x10: 0000000000000000 x9 : 0000000000000001\n\tx8 : ffffff80816fa3c0 x7 : 0000000000000000 x6 : 49534d702d535449\n\tx5 : ffffffc080c4c2c0 x4 : ffffffd43ee128c8 x3 : ffffffd43ee124dc\n\tx2 : 0000000000000000 x1 : 0000000000000001 x0 : ffffff806f5693c0\n\tCall trace:\n\t__task_pid_nr_ns+0x74/0xd0\n\t...\n\t__handle_irq_event_percpu+0xd4/0x284\n\thandle_irq_event+0x48/0xb0\n\thandle_fasteoi_irq+0x160/0x2d8\n\tgeneric_handle_domain_irq+0x44/0x60\n\tgic_handle_irq+0x4c/0x114\n\tcall_on_irq_stack+0x3c/0x74\n\tdo_interrupt_handler+0x4c/0x84\n\tel1_interrupt+0x34/0x58\n\tel1h_64_irq_handler+0x18/0x24\n\tel1h_64_irq+0x68/0x6c\n\taccount_kernel_stack+0x60/0x144\n\texit_task_stack_account+0x1c/0x80\n\tdo_exit+0x7e4/0xaf8\n\t...\n\tget_signal+0x7bc/0x8d8\n\tdo_notify_resume+0x128/0x828\n\tel0_svc+0x6c/0x70\n\tel0t_64_sync_handler+0x68/0xbc\n\tel0t_64_sync+0x1a8/0x1ac\n\tCode: 35fffe54 911a02a8 f9400108 b4000128 (b9405a69)\n\t---[ end trace 0000000000000000 ]---\n\tKernel panic - not syncing: Oops: Fatal exception in interrupt",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 16.0:cluster-md-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dtb-allwinner-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-altera-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amazon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amlogic-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apple-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-arm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-broadcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-cavium-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-exynos-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-freescale-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-hisilicon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-lg-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-marvell-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-mediatek-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-nvidia-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-qcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-renesas-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-rockchip-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-socionext-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-sprd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-xilinx-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40178",
"url": "https://www.suse.com/security/cve/CVE-2025-40178"
},
{
"category": "external",
"summary": "SUSE Bug 1253463 for CVE-2025-40178",
"url": "https://bugzilla.suse.com/1253463"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 16.0:cluster-md-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dtb-allwinner-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-altera-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amazon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amlogic-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apple-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-arm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-broadcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-cavium-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-exynos-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-freescale-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-hisilicon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-lg-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-marvell-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-mediatek-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-nvidia-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-qcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-renesas-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-rockchip-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-socionext-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-sprd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-xilinx-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Leap 16.0:cluster-md-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dtb-allwinner-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-altera-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amazon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amlogic-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apple-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-arm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-broadcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-cavium-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-exynos-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-freescale-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-hisilicon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-lg-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-marvell-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-mediatek-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-nvidia-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-qcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-renesas-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-rockchip-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-socionext-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-sprd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-xilinx-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-19T17:38:16Z",
"details": "moderate"
}
],
"title": "CVE-2025-40178"
},
{
"cve": "CVE-2025-40180",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40180"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nmailbox: zynqmp-ipi: Fix out-of-bounds access in mailbox cleanup loop\n\nThe cleanup loop was starting at the wrong array index, causing\nout-of-bounds access.\nStart the loop at the correct index for zero-indexed arrays to prevent\naccessing memory beyond the allocated array bounds.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 16.0:cluster-md-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dtb-allwinner-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-altera-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amazon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amlogic-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apple-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-arm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-broadcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-cavium-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-exynos-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-freescale-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-hisilicon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-lg-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-marvell-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-mediatek-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-nvidia-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-qcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-renesas-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-rockchip-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-socionext-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-sprd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-xilinx-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40180",
"url": "https://www.suse.com/security/cve/CVE-2025-40180"
},
{
"category": "external",
"summary": "SUSE Bug 1253440 for CVE-2025-40180",
"url": "https://bugzilla.suse.com/1253440"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 16.0:cluster-md-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dtb-allwinner-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-altera-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amazon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amlogic-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apple-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-arm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-broadcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-cavium-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-exynos-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-freescale-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-hisilicon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-lg-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-marvell-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-mediatek-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-nvidia-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-qcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-renesas-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-rockchip-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-socionext-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-sprd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-xilinx-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:H",
"version": "3.1"
},
"products": [
"openSUSE Leap 16.0:cluster-md-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dtb-allwinner-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-altera-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amazon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amlogic-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apple-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-arm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-broadcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-cavium-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-exynos-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-freescale-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-hisilicon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-lg-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-marvell-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-mediatek-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-nvidia-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-qcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-renesas-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-rockchip-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-socionext-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-sprd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-xilinx-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-19T17:38:16Z",
"details": "moderate"
}
],
"title": "CVE-2025-40180"
},
{
"cve": "CVE-2025-40183",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40183"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nbpf: Fix metadata_dst leak __bpf_redirect_neigh_v{4,6}\n\nCilium has a BPF egress gateway feature which forces outgoing K8s Pod\ntraffic to pass through dedicated egress gateways which then SNAT the\ntraffic in order to interact with stable IPs outside the cluster.\n\nThe traffic is directed to the gateway via vxlan tunnel in collect md\nmode. A recent BPF change utilized the bpf_redirect_neigh() helper to\nforward packets after the arrival and decap on vxlan, which turned out\nover time that the kmalloc-256 slab usage in kernel was ever-increasing.\n\nThe issue was that vxlan allocates the metadata_dst object and attaches\nit through a fake dst entry to the skb. The latter was never released\nthough given bpf_redirect_neigh() was merely setting the new dst entry\nvia skb_dst_set() without dropping an existing one first.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 16.0:cluster-md-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dtb-allwinner-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-altera-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amazon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amlogic-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apple-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-arm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-broadcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-cavium-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-exynos-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-freescale-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-hisilicon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-lg-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-marvell-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-mediatek-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-nvidia-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-qcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-renesas-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-rockchip-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-socionext-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-sprd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-xilinx-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40183",
"url": "https://www.suse.com/security/cve/CVE-2025-40183"
},
{
"category": "external",
"summary": "SUSE Bug 1253441 for CVE-2025-40183",
"url": "https://bugzilla.suse.com/1253441"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 16.0:cluster-md-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dtb-allwinner-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-altera-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amazon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amlogic-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apple-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-arm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-broadcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-cavium-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-exynos-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-freescale-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-hisilicon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-lg-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-marvell-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-mediatek-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-nvidia-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-qcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-renesas-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-rockchip-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-socionext-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-sprd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-xilinx-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"openSUSE Leap 16.0:cluster-md-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dtb-allwinner-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-altera-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amazon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amlogic-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apple-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-arm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-broadcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-cavium-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-exynos-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-freescale-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-hisilicon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-lg-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-marvell-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-mediatek-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-nvidia-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-qcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-renesas-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-rockchip-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-socionext-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-sprd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-xilinx-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-19T17:38:16Z",
"details": "moderate"
}
],
"title": "CVE-2025-40183"
},
{
"cve": "CVE-2025-40185",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40185"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nice: ice_adapter: release xa entry on adapter allocation failure\n\nWhen ice_adapter_new() fails, the reserved XArray entry created by\nxa_insert() is not released. This causes subsequent insertions at\nthe same index to return -EBUSY, potentially leading to\nNULL pointer dereferences.\n\nReorder the operations as suggested by Przemek Kitszel:\n1. Check if adapter already exists (xa_load)\n2. Reserve the XArray slot (xa_reserve)\n3. Allocate the adapter (ice_adapter_new)\n4. Store the adapter (xa_store)",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 16.0:cluster-md-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dtb-allwinner-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-altera-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amazon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amlogic-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apple-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-arm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-broadcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-cavium-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-exynos-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-freescale-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-hisilicon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-lg-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-marvell-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-mediatek-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-nvidia-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-qcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-renesas-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-rockchip-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-socionext-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-sprd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-xilinx-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40185",
"url": "https://www.suse.com/security/cve/CVE-2025-40185"
},
{
"category": "external",
"summary": "SUSE Bug 1253394 for CVE-2025-40185",
"url": "https://bugzilla.suse.com/1253394"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 16.0:cluster-md-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dtb-allwinner-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-altera-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amazon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amlogic-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apple-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-arm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-broadcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-cavium-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-exynos-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-freescale-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-hisilicon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-lg-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-marvell-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-mediatek-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-nvidia-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-qcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-renesas-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-rockchip-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-socionext-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-sprd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-xilinx-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Leap 16.0:cluster-md-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dtb-allwinner-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-altera-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amazon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amlogic-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apple-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-arm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-broadcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-cavium-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-exynos-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-freescale-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-hisilicon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-lg-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-marvell-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-mediatek-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-nvidia-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-qcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-renesas-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-rockchip-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-socionext-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-sprd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-xilinx-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-19T17:38:16Z",
"details": "moderate"
}
],
"title": "CVE-2025-40185"
},
{
"cve": "CVE-2025-40186",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40186"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\ntcp: Don\u0027t call reqsk_fastopen_remove() in tcp_conn_request().\n\nsyzbot reported the splat below in tcp_conn_request(). [0]\n\nIf a listener is close()d while a TFO socket is being processed in\ntcp_conn_request(), inet_csk_reqsk_queue_add() does not set reqsk-\u003esk\nand calls inet_child_forget(), which calls tcp_disconnect() for the\nTFO socket.\n\nAfter the cited commit, tcp_disconnect() calls reqsk_fastopen_remove(),\nwhere reqsk_put() is called due to !reqsk-\u003esk.\n\nThen, reqsk_fastopen_remove() in tcp_conn_request() decrements the\nlast req-\u003ersk_refcnt and frees reqsk, and __reqsk_free() at the\ndrop_and_free label causes the refcount underflow for the listener\nand double-free of the reqsk.\n\nLet\u0027s remove reqsk_fastopen_remove() in tcp_conn_request().\n\nNote that other callers make sure tp-\u003efastopen_rsk is not NULL.\n\n[0]:\nrefcount_t: underflow; use-after-free.\nWARNING: CPU: 12 PID: 5563 at lib/refcount.c:28 refcount_warn_saturate (lib/refcount.c:28)\nModules linked in:\nCPU: 12 UID: 0 PID: 5563 Comm: syz-executor Not tainted syzkaller #0 PREEMPT(full)\nHardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025\nRIP: 0010:refcount_warn_saturate (lib/refcount.c:28)\nCode: ab e8 8e b4 98 ff 0f 0b c3 cc cc cc cc cc 80 3d a4 e4 d6 01 00 75 9c c6 05 9b e4 d6 01 01 48 c7 c7 e8 df fb ab e8 6a b4 98 ff \u003c0f\u003e 0b e9 03 5b 76 00 cc 80 3d 7d e4 d6 01 00 0f 85 74 ff ff ff c6\nRSP: 0018:ffffa79fc0304a98 EFLAGS: 00010246\nRAX: d83af4db1c6b3900 RBX: ffff9f65c7a69020 RCX: d83af4db1c6b3900\nRDX: 0000000000000000 RSI: 00000000ffff7fff RDI: ffffffffac78a280\nRBP: 000000009d781b60 R08: 0000000000007fff R09: ffffffffac6ca280\nR10: 0000000000017ffd R11: 0000000000000004 R12: ffff9f65c7b4f100\nR13: ffff9f65c7d23c00 R14: ffff9f65c7d26000 R15: ffff9f65c7a64ef8\nFS: 00007f9f962176c0(0000) GS:ffff9f65fcf00000(0000) knlGS:0000000000000000\nCS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033\nCR2: 0000200000000180 CR3: 000000000dbbe006 CR4: 0000000000372ef0\nCall Trace:\n \u003cIRQ\u003e\n tcp_conn_request (./include/linux/refcount.h:400 ./include/linux/refcount.h:432 ./include/linux/refcount.h:450 ./include/net/sock.h:1965 ./include/net/request_sock.h:131 net/ipv4/tcp_input.c:7301)\n tcp_rcv_state_process (net/ipv4/tcp_input.c:6708)\n tcp_v6_do_rcv (net/ipv6/tcp_ipv6.c:1670)\n tcp_v6_rcv (net/ipv6/tcp_ipv6.c:1906)\n ip6_protocol_deliver_rcu (net/ipv6/ip6_input.c:438)\n ip6_input (net/ipv6/ip6_input.c:500)\n ipv6_rcv (net/ipv6/ip6_input.c:311)\n __netif_receive_skb (net/core/dev.c:6104)\n process_backlog (net/core/dev.c:6456)\n __napi_poll (net/core/dev.c:7506)\n net_rx_action (net/core/dev.c:7569 net/core/dev.c:7696)\n handle_softirqs (kernel/softirq.c:579)\n do_softirq (kernel/softirq.c:480)\n \u003c/IRQ\u003e",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 16.0:cluster-md-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dtb-allwinner-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-altera-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amazon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amlogic-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apple-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-arm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-broadcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-cavium-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-exynos-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-freescale-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-hisilicon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-lg-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-marvell-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-mediatek-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-nvidia-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-qcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-renesas-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-rockchip-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-socionext-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-sprd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-xilinx-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40186",
"url": "https://www.suse.com/security/cve/CVE-2025-40186"
},
{
"category": "external",
"summary": "SUSE Bug 1253438 for CVE-2025-40186",
"url": "https://bugzilla.suse.com/1253438"
},
{
"category": "external",
"summary": "SUSE Bug 1253439 for CVE-2025-40186",
"url": "https://bugzilla.suse.com/1253439"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 16.0:cluster-md-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dtb-allwinner-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-altera-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amazon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amlogic-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apple-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-arm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-broadcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-cavium-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-exynos-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-freescale-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-hisilicon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-lg-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-marvell-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-mediatek-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-nvidia-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-qcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-renesas-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-rockchip-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-socionext-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-sprd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-xilinx-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"openSUSE Leap 16.0:cluster-md-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dtb-allwinner-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-altera-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amazon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amlogic-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apple-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-arm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-broadcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-cavium-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-exynos-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-freescale-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-hisilicon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-lg-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-marvell-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-mediatek-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-nvidia-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-qcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-renesas-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-rockchip-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-socionext-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-sprd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-xilinx-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-19T17:38:16Z",
"details": "important"
}
],
"title": "CVE-2025-40186"
},
{
"cve": "CVE-2025-40187",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40187"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnet/sctp: fix a null dereference in sctp_disposition sctp_sf_do_5_1D_ce()\n\nIf new_asoc-\u003epeer.adaptation_ind=0 and sctp_ulpevent_make_authkey=0\nand sctp_ulpevent_make_authkey() returns 0, then the variable\nai_ev remains zero and the zero will be dereferenced\nin the sctp_ulpevent_free() function.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 16.0:cluster-md-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dtb-allwinner-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-altera-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amazon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amlogic-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apple-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-arm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-broadcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-cavium-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-exynos-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-freescale-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-hisilicon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-lg-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-marvell-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-mediatek-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-nvidia-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-qcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-renesas-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-rockchip-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-socionext-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-sprd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-xilinx-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40187",
"url": "https://www.suse.com/security/cve/CVE-2025-40187"
},
{
"category": "external",
"summary": "SUSE Bug 1253647 for CVE-2025-40187",
"url": "https://bugzilla.suse.com/1253647"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 16.0:cluster-md-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dtb-allwinner-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-altera-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amazon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amlogic-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apple-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-arm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-broadcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-cavium-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-exynos-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-freescale-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-hisilicon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-lg-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-marvell-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-mediatek-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-nvidia-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-qcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-renesas-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-rockchip-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-socionext-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-sprd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-xilinx-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.1,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Leap 16.0:cluster-md-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dtb-allwinner-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-altera-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amazon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amlogic-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apple-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-arm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-broadcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-cavium-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-exynos-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-freescale-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-hisilicon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-lg-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-marvell-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-mediatek-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-nvidia-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-qcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-renesas-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-rockchip-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-socionext-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-sprd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-xilinx-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-19T17:38:16Z",
"details": "moderate"
}
],
"title": "CVE-2025-40187"
},
{
"cve": "CVE-2025-40188",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40188"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\npwm: berlin: Fix wrong register in suspend/resume\n\nThe \u0027enable\u0027 register should be BERLIN_PWM_EN rather than\nBERLIN_PWM_ENABLE, otherwise, the driver accesses wrong address, there\nwill be cpu exception then kernel panic during suspend/resume.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 16.0:cluster-md-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dtb-allwinner-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-altera-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amazon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amlogic-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apple-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-arm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-broadcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-cavium-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-exynos-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-freescale-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-hisilicon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-lg-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-marvell-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-mediatek-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-nvidia-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-qcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-renesas-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-rockchip-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-socionext-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-sprd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-xilinx-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40188",
"url": "https://www.suse.com/security/cve/CVE-2025-40188"
},
{
"category": "external",
"summary": "SUSE Bug 1253449 for CVE-2025-40188",
"url": "https://bugzilla.suse.com/1253449"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 16.0:cluster-md-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dtb-allwinner-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-altera-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amazon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amlogic-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apple-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-arm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-broadcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-cavium-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-exynos-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-freescale-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-hisilicon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-lg-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-marvell-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-mediatek-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-nvidia-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-qcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-renesas-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-rockchip-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-socionext-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-sprd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-xilinx-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Leap 16.0:cluster-md-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dtb-allwinner-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-altera-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amazon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amlogic-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apple-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-arm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-broadcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-cavium-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-exynos-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-freescale-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-hisilicon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-lg-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-marvell-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-mediatek-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-nvidia-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-qcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-renesas-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-rockchip-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-socionext-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-sprd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-xilinx-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-19T17:38:16Z",
"details": "moderate"
}
],
"title": "CVE-2025-40188"
},
{
"cve": "CVE-2025-40192",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40192"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nRevert \"ipmi: fix msg stack when IPMI is disconnected\"\n\nThis reverts commit c608966f3f9c2dca596967501d00753282b395fc.\n\nThis patch has a subtle bug that can cause the IPMI driver to go into an\ninfinite loop if the BMC misbehaves in a certain way. Apparently\ncertain BMCs do misbehave this way because several reports have come in\nrecently about this.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 16.0:cluster-md-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dtb-allwinner-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-altera-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amazon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amlogic-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apple-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-arm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-broadcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-cavium-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-exynos-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-freescale-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-hisilicon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-lg-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-marvell-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-mediatek-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-nvidia-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-qcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-renesas-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-rockchip-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-socionext-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-sprd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-xilinx-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40192",
"url": "https://www.suse.com/security/cve/CVE-2025-40192"
},
{
"category": "external",
"summary": "SUSE Bug 1253622 for CVE-2025-40192",
"url": "https://bugzilla.suse.com/1253622"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 16.0:cluster-md-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dtb-allwinner-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-altera-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amazon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amlogic-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apple-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-arm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-broadcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-cavium-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-exynos-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-freescale-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-hisilicon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-lg-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-marvell-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-mediatek-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-nvidia-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-qcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-renesas-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-rockchip-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-socionext-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-sprd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-xilinx-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Leap 16.0:cluster-md-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dtb-allwinner-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-altera-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amazon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amlogic-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apple-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-arm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-broadcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-cavium-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-exynos-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-freescale-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-hisilicon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-lg-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-marvell-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-mediatek-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-nvidia-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-qcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-renesas-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-rockchip-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-socionext-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-sprd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-xilinx-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-19T17:38:16Z",
"details": "moderate"
}
],
"title": "CVE-2025-40192"
},
{
"cve": "CVE-2025-40194",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40194"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\ncpufreq: intel_pstate: Fix object lifecycle issue in update_qos_request()\n\nThe cpufreq_cpu_put() call in update_qos_request() takes place too early\nbecause the latter subsequently calls freq_qos_update_request() that\nindirectly accesses the policy object in question through the QoS request\nobject passed to it.\n\nFortunately, update_qos_request() is called under intel_pstate_driver_lock,\nso this issue does not matter for changing the intel_pstate operation\nmode, but it theoretically can cause a crash to occur on CPU device hot\nremoval (which currently can only happen in virt, but it is formally\nsupported nevertheless).\n\nAddress this issue by modifying update_qos_request() to drop the\nreference to the policy later.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 16.0:cluster-md-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dtb-allwinner-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-altera-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amazon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amlogic-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apple-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-arm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-broadcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-cavium-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-exynos-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-freescale-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-hisilicon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-lg-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-marvell-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-mediatek-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-nvidia-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-qcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-renesas-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-rockchip-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-socionext-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-sprd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-xilinx-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40194",
"url": "https://www.suse.com/security/cve/CVE-2025-40194"
},
{
"category": "external",
"summary": "SUSE Bug 1253445 for CVE-2025-40194",
"url": "https://bugzilla.suse.com/1253445"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 16.0:cluster-md-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dtb-allwinner-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-altera-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amazon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amlogic-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apple-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-arm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-broadcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-cavium-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-exynos-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-freescale-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-hisilicon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-lg-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-marvell-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-mediatek-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-nvidia-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-qcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-renesas-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-rockchip-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-socionext-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-sprd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-xilinx-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.7,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Leap 16.0:cluster-md-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dtb-allwinner-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-altera-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amazon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amlogic-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apple-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-arm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-broadcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-cavium-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-exynos-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-freescale-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-hisilicon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-lg-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-marvell-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-mediatek-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-nvidia-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-qcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-renesas-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-rockchip-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-socionext-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-sprd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-xilinx-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-19T17:38:16Z",
"details": "moderate"
}
],
"title": "CVE-2025-40194"
},
{
"cve": "CVE-2025-40196",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40196"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nfs: quota: create dedicated workqueue for quota_release_work\n\nThere is a kernel panic due to WARN_ONCE when panic_on_warn is set.\n\nThis issue occurs when writeback is triggered due to sync call for an\nopened file(ie, writeback reason is WB_REASON_SYNC). When f2fs balance\nis needed at sync path, flush for quota_release_work is triggered.\nBy default quota_release_work is queued to \"events_unbound\" queue which\ndoes not have WQ_MEM_RECLAIM flag. During f2fs balance \"writeback\"\nworkqueue tries to flush quota_release_work causing kernel panic due to\nMEM_RECLAIM flag mismatch errors.\n\nThis patch creates dedicated workqueue with WQ_MEM_RECLAIM flag\nfor work quota_release_work.\n\n------------[ cut here ]------------\nWARNING: CPU: 4 PID: 14867 at kernel/workqueue.c:3721 check_flush_dependency+0x13c/0x148\nCall trace:\n check_flush_dependency+0x13c/0x148\n __flush_work+0xd0/0x398\n flush_delayed_work+0x44/0x5c\n dquot_writeback_dquots+0x54/0x318\n f2fs_do_quota_sync+0xb8/0x1a8\n f2fs_write_checkpoint+0x3cc/0x99c\n f2fs_gc+0x190/0x750\n f2fs_balance_fs+0x110/0x168\n f2fs_write_single_data_page+0x474/0x7dc\n f2fs_write_data_pages+0x7d0/0xd0c\n do_writepages+0xe0/0x2f4\n __writeback_single_inode+0x44/0x4ac\n writeback_sb_inodes+0x30c/0x538\n wb_writeback+0xf4/0x440\n wb_workfn+0x128/0x5d4\n process_scheduled_works+0x1c4/0x45c\n worker_thread+0x32c/0x3e8\n kthread+0x11c/0x1b0\n ret_from_fork+0x10/0x20\nKernel panic - not syncing: kernel: panic_on_warn set ...",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 16.0:cluster-md-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dtb-allwinner-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-altera-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amazon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amlogic-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apple-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-arm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-broadcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-cavium-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-exynos-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-freescale-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-hisilicon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-lg-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-marvell-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-mediatek-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-nvidia-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-qcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-renesas-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-rockchip-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-socionext-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-sprd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-xilinx-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40196",
"url": "https://www.suse.com/security/cve/CVE-2025-40196"
},
{
"category": "external",
"summary": "SUSE Bug 1253624 for CVE-2025-40196",
"url": "https://bugzilla.suse.com/1253624"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 16.0:cluster-md-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dtb-allwinner-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-altera-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amazon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amlogic-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apple-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-arm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-broadcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-cavium-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-exynos-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-freescale-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-hisilicon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-lg-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-marvell-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-mediatek-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-nvidia-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-qcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-renesas-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-rockchip-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-socionext-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-sprd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-xilinx-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.3,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"openSUSE Leap 16.0:cluster-md-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dtb-allwinner-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-altera-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amazon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amlogic-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apple-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-arm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-broadcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-cavium-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-exynos-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-freescale-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-hisilicon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-lg-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-marvell-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-mediatek-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-nvidia-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-qcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-renesas-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-rockchip-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-socionext-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-sprd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-xilinx-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-19T17:38:16Z",
"details": "low"
}
],
"title": "CVE-2025-40196"
},
{
"cve": "CVE-2025-40197",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40197"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nmedia: mc: Clear minor number before put device\n\nThe device minor should not be cleared after the device is released.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 16.0:cluster-md-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dtb-allwinner-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-altera-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amazon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amlogic-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apple-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-arm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-broadcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-cavium-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-exynos-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-freescale-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-hisilicon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-lg-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-marvell-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-mediatek-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-nvidia-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-qcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-renesas-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-rockchip-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-socionext-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-sprd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-xilinx-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40197",
"url": "https://www.suse.com/security/cve/CVE-2025-40197"
},
{
"category": "external",
"summary": "SUSE Bug 1253450 for CVE-2025-40197",
"url": "https://bugzilla.suse.com/1253450"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 16.0:cluster-md-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dtb-allwinner-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-altera-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amazon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amlogic-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apple-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-arm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-broadcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-cavium-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-exynos-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-freescale-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-hisilicon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-lg-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-marvell-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-mediatek-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-nvidia-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-qcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-renesas-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-rockchip-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-socionext-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-sprd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-xilinx-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Leap 16.0:cluster-md-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dtb-allwinner-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-altera-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amazon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amlogic-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apple-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-arm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-broadcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-cavium-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-exynos-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-freescale-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-hisilicon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-lg-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-marvell-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-mediatek-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-nvidia-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-qcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-renesas-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-rockchip-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-socionext-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-sprd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-xilinx-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-19T17:38:16Z",
"details": "moderate"
}
],
"title": "CVE-2025-40197"
},
{
"cve": "CVE-2025-40198",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40198"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\next4: avoid potential buffer over-read in parse_apply_sb_mount_options()\n\nUnlike other strings in the ext4 superblock, we rely on tune2fs to\nmake sure s_mount_opts is NUL terminated. Harden\nparse_apply_sb_mount_options() by treating s_mount_opts as a potential\n__nonstring.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 16.0:cluster-md-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dtb-allwinner-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-altera-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amazon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amlogic-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apple-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-arm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-broadcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-cavium-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-exynos-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-freescale-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-hisilicon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-lg-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-marvell-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-mediatek-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-nvidia-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-qcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-renesas-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-rockchip-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-socionext-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-sprd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-xilinx-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40198",
"url": "https://www.suse.com/security/cve/CVE-2025-40198"
},
{
"category": "external",
"summary": "SUSE Bug 1253453 for CVE-2025-40198",
"url": "https://bugzilla.suse.com/1253453"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 16.0:cluster-md-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dtb-allwinner-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-altera-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amazon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amlogic-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apple-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-arm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-broadcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-cavium-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-exynos-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-freescale-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-hisilicon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-lg-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-marvell-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-mediatek-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-nvidia-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-qcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-renesas-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-rockchip-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-socionext-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-sprd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-xilinx-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Leap 16.0:cluster-md-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dtb-allwinner-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-altera-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amazon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amlogic-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apple-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-arm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-broadcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-cavium-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-exynos-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-freescale-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-hisilicon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-lg-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-marvell-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-mediatek-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-nvidia-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-qcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-renesas-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-rockchip-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-socionext-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-sprd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-xilinx-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-19T17:38:16Z",
"details": "moderate"
}
],
"title": "CVE-2025-40198"
},
{
"cve": "CVE-2025-40200",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40200"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nSquashfs: reject negative file sizes in squashfs_read_inode()\n\nSyskaller reports a \"WARNING in ovl_copy_up_file\" in overlayfs.\n\nThis warning is ultimately caused because the underlying Squashfs file\nsystem returns a file with a negative file size.\n\nThis commit checks for a negative file size and returns EINVAL.\n\n[phillip@squashfs.org.uk: only need to check 64 bit quantity]",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 16.0:cluster-md-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dtb-allwinner-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-altera-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amazon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amlogic-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apple-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-arm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-broadcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-cavium-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-exynos-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-freescale-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-hisilicon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-lg-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-marvell-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-mediatek-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-nvidia-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-qcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-renesas-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-rockchip-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-socionext-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-sprd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-xilinx-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40200",
"url": "https://www.suse.com/security/cve/CVE-2025-40200"
},
{
"category": "external",
"summary": "SUSE Bug 1253448 for CVE-2025-40200",
"url": "https://bugzilla.suse.com/1253448"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 16.0:cluster-md-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dtb-allwinner-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-altera-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amazon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amlogic-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apple-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-arm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-broadcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-cavium-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-exynos-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-freescale-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-hisilicon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-lg-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-marvell-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-mediatek-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-nvidia-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-qcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-renesas-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-rockchip-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-socionext-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-sprd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-xilinx-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Leap 16.0:cluster-md-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dtb-allwinner-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-altera-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amazon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amlogic-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apple-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-arm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-broadcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-cavium-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-exynos-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-freescale-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-hisilicon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-lg-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-marvell-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-mediatek-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-nvidia-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-qcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-renesas-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-rockchip-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-socionext-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-sprd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-xilinx-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-19T17:38:16Z",
"details": "moderate"
}
],
"title": "CVE-2025-40200"
},
{
"cve": "CVE-2025-40201",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40201"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nkernel/sys.c: fix the racy usage of task_lock(tsk-\u003egroup_leader) in sys_prlimit64() paths\n\nThe usage of task_lock(tsk-\u003egroup_leader) in sys_prlimit64()-\u003edo_prlimit()\npath is very broken.\n\nsys_prlimit64() does get_task_struct(tsk) but this only protects task_struct\nitself. If tsk != current and tsk is not a leader, this process can exit/exec\nand task_lock(tsk-\u003egroup_leader) may use the already freed task_struct.\n\nAnother problem is that sys_prlimit64() can race with mt-exec which changes\n-\u003egroup_leader. In this case do_prlimit() may take the wrong lock, or (worse)\n-\u003egroup_leader may change between task_lock() and task_unlock().\n\nChange sys_prlimit64() to take tasklist_lock when necessary. This is not\nnice, but I don\u0027t see a better fix for -stable.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 16.0:cluster-md-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dtb-allwinner-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-altera-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amazon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amlogic-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apple-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-arm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-broadcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-cavium-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-exynos-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-freescale-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-hisilicon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-lg-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-marvell-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-mediatek-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-nvidia-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-qcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-renesas-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-rockchip-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-socionext-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-sprd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-xilinx-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40201",
"url": "https://www.suse.com/security/cve/CVE-2025-40201"
},
{
"category": "external",
"summary": "SUSE Bug 1253455 for CVE-2025-40201",
"url": "https://bugzilla.suse.com/1253455"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 16.0:cluster-md-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dtb-allwinner-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-altera-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amazon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amlogic-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apple-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-arm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-broadcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-cavium-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-exynos-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-freescale-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-hisilicon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-lg-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-marvell-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-mediatek-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-nvidia-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-qcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-renesas-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-rockchip-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-socionext-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-sprd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-xilinx-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Leap 16.0:cluster-md-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dtb-allwinner-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-altera-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amazon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amlogic-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apple-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-arm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-broadcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-cavium-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-exynos-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-freescale-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-hisilicon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-lg-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-marvell-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-mediatek-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-nvidia-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-qcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-renesas-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-rockchip-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-socionext-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-sprd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-xilinx-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-19T17:38:16Z",
"details": "moderate"
}
],
"title": "CVE-2025-40201"
},
{
"cve": "CVE-2025-40202",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40202"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nipmi: Rework user message limit handling\n\nThe limit on the number of user messages had a number of issues,\nimproper counting in some cases and a use after free.\n\nRestructure how this is all done to handle more in the receive message\nallocation routine, so all refcouting and user message limit counts\nare done in that routine. It\u0027s a lot cleaner and safer.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 16.0:cluster-md-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dtb-allwinner-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-altera-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amazon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amlogic-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apple-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-arm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-broadcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-cavium-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-exynos-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-freescale-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-hisilicon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-lg-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-marvell-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-mediatek-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-nvidia-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-qcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-renesas-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-rockchip-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-socionext-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-sprd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-xilinx-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40202",
"url": "https://www.suse.com/security/cve/CVE-2025-40202"
},
{
"category": "external",
"summary": "SUSE Bug 1253451 for CVE-2025-40202",
"url": "https://bugzilla.suse.com/1253451"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 16.0:cluster-md-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dtb-allwinner-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-altera-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amazon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amlogic-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apple-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-arm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-broadcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-cavium-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-exynos-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-freescale-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-hisilicon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-lg-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-marvell-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-mediatek-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-nvidia-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-qcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-renesas-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-rockchip-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-socionext-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-sprd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-xilinx-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Leap 16.0:cluster-md-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dtb-allwinner-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-altera-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amazon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amlogic-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apple-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-arm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-broadcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-cavium-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-exynos-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-freescale-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-hisilicon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-lg-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-marvell-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-mediatek-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-nvidia-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-qcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-renesas-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-rockchip-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-socionext-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-sprd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-xilinx-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-19T17:38:16Z",
"details": "moderate"
}
],
"title": "CVE-2025-40202"
},
{
"cve": "CVE-2025-40203",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40203"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nlistmount: don\u0027t call path_put() under namespace semaphore\n\nMassage listmount() and make sure we don\u0027t call path_put() under the\nnamespace semaphore. If we put the last reference we\u0027re fscked.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 16.0:cluster-md-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dtb-allwinner-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-altera-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amazon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amlogic-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apple-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-arm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-broadcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-cavium-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-exynos-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-freescale-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-hisilicon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-lg-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-marvell-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-mediatek-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-nvidia-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-qcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-renesas-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-rockchip-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-socionext-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-sprd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-xilinx-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40203",
"url": "https://www.suse.com/security/cve/CVE-2025-40203"
},
{
"category": "external",
"summary": "SUSE Bug 1253457 for CVE-2025-40203",
"url": "https://bugzilla.suse.com/1253457"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 16.0:cluster-md-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dtb-allwinner-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-altera-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amazon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amlogic-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apple-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-arm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-broadcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-cavium-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-exynos-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-freescale-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-hisilicon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-lg-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-marvell-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-mediatek-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-nvidia-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-qcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-renesas-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-rockchip-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-socionext-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-sprd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-xilinx-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Leap 16.0:cluster-md-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dtb-allwinner-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-altera-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amazon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amlogic-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apple-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-arm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-broadcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-cavium-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-exynos-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-freescale-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-hisilicon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-lg-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-marvell-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-mediatek-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-nvidia-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-qcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-renesas-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-rockchip-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-socionext-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-sprd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-xilinx-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-19T17:38:16Z",
"details": "moderate"
}
],
"title": "CVE-2025-40203"
},
{
"cve": "CVE-2025-40204",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40204"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nsctp: Fix MAC comparison to be constant-time\n\nTo prevent timing attacks, MACs need to be compared in constant time.\nUse the appropriate helper function for this.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 16.0:cluster-md-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dtb-allwinner-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-altera-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amazon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amlogic-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apple-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-arm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-broadcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-cavium-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-exynos-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-freescale-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-hisilicon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-lg-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-marvell-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-mediatek-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-nvidia-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-qcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-renesas-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-rockchip-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-socionext-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-sprd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-xilinx-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40204",
"url": "https://www.suse.com/security/cve/CVE-2025-40204"
},
{
"category": "external",
"summary": "SUSE Bug 1253436 for CVE-2025-40204",
"url": "https://bugzilla.suse.com/1253436"
},
{
"category": "external",
"summary": "SUSE Bug 1253437 for CVE-2025-40204",
"url": "https://bugzilla.suse.com/1253437"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 16.0:cluster-md-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dtb-allwinner-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-altera-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amazon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amlogic-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apple-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-arm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-broadcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-cavium-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-exynos-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-freescale-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-hisilicon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-lg-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-marvell-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-mediatek-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-nvidia-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-qcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-renesas-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-rockchip-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-socionext-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-sprd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-xilinx-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"openSUSE Leap 16.0:cluster-md-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dtb-allwinner-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-altera-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amazon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amlogic-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apple-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-arm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-broadcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-cavium-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-exynos-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-freescale-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-hisilicon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-lg-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-marvell-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-mediatek-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-nvidia-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-qcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-renesas-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-rockchip-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-socionext-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-sprd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-xilinx-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-19T17:38:16Z",
"details": "important"
}
],
"title": "CVE-2025-40204"
},
{
"cve": "CVE-2025-40205",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40205"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nbtrfs: avoid potential out-of-bounds in btrfs_encode_fh()\n\nThe function btrfs_encode_fh() does not properly account for the three\ncases it handles.\n\nBefore writing to the file handle (fh), the function only returns to the\nuser BTRFS_FID_SIZE_NON_CONNECTABLE (5 dwords, 20 bytes) or\nBTRFS_FID_SIZE_CONNECTABLE (8 dwords, 32 bytes).\n\nHowever, when a parent exists and the root ID of the parent and the\ninode are different, the function writes BTRFS_FID_SIZE_CONNECTABLE_ROOT\n(10 dwords, 40 bytes).\n\nIf *max_len is not large enough, this write goes out of bounds because\nBTRFS_FID_SIZE_CONNECTABLE_ROOT is greater than\nBTRFS_FID_SIZE_CONNECTABLE originally returned.\n\nThis results in an 8-byte out-of-bounds write at\nfid-\u003eparent_root_objectid = parent_root_id.\n\nA previous attempt to fix this issue was made but was lost.\n\nhttps://lore.kernel.org/all/4CADAEEC020000780001B32C@vpn.id2.novell.com/\n\nAlthough this issue does not seem to be easily triggerable, it is a\npotential memory corruption bug that should be fixed. This patch\nresolves the issue by ensuring the function returns the appropriate size\nfor all three cases and validates that *max_len is large enough before\nwriting any data.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 16.0:cluster-md-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dtb-allwinner-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-altera-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amazon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amlogic-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apple-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-arm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-broadcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-cavium-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-exynos-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-freescale-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-hisilicon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-lg-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-marvell-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-mediatek-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-nvidia-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-qcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-renesas-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-rockchip-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-socionext-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-sprd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-xilinx-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40205",
"url": "https://www.suse.com/security/cve/CVE-2025-40205"
},
{
"category": "external",
"summary": "SUSE Bug 1253456 for CVE-2025-40205",
"url": "https://bugzilla.suse.com/1253456"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 16.0:cluster-md-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dtb-allwinner-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-altera-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amazon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amlogic-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apple-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-arm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-broadcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-cavium-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-exynos-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-freescale-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-hisilicon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-lg-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-marvell-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-mediatek-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-nvidia-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-qcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-renesas-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-rockchip-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-socionext-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-sprd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-xilinx-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Leap 16.0:cluster-md-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dtb-allwinner-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-altera-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amazon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amlogic-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apple-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-arm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-broadcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-cavium-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-exynos-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-freescale-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-hisilicon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-lg-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-marvell-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-mediatek-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-nvidia-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-qcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-renesas-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-rockchip-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-socionext-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-sprd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-xilinx-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-19T17:38:16Z",
"details": "moderate"
}
],
"title": "CVE-2025-40205"
},
{
"cve": "CVE-2025-40206",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40206"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnetfilter: nft_objref: validate objref and objrefmap expressions\n\nReferencing a synproxy stateful object from OUTPUT hook causes kernel\ncrash due to infinite recursive calls:\n\nBUG: TASK stack guard page was hit at 000000008bda5b8c (stack is 000000003ab1c4a5..00000000494d8b12)\n[...]\nCall Trace:\n __find_rr_leaf+0x99/0x230\n fib6_table_lookup+0x13b/0x2d0\n ip6_pol_route+0xa4/0x400\n fib6_rule_lookup+0x156/0x240\n ip6_route_output_flags+0xc6/0x150\n __nf_ip6_route+0x23/0x50\n synproxy_send_tcp_ipv6+0x106/0x200\n synproxy_send_client_synack_ipv6+0x1aa/0x1f0\n nft_synproxy_do_eval+0x263/0x310\n nft_do_chain+0x5a8/0x5f0 [nf_tables\n nft_do_chain_inet+0x98/0x110\n nf_hook_slow+0x43/0xc0\n __ip6_local_out+0xf0/0x170\n ip6_local_out+0x17/0x70\n synproxy_send_tcp_ipv6+0x1a2/0x200\n synproxy_send_client_synack_ipv6+0x1aa/0x1f0\n[...]\n\nImplement objref and objrefmap expression validate functions.\n\nCurrently, only NFT_OBJECT_SYNPROXY object type requires validation.\nThis will also handle a jump to a chain using a synproxy object from the\nOUTPUT hook.\n\nNow when trying to reference a synproxy object in the OUTPUT hook, nft\nwill produce the following error:\n\nsynproxy_crash.nft: Error: Could not process rule: Operation not supported\n synproxy name mysynproxy\n ^^^^^^^^^^^^^^^^^^^^^^^^",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 16.0:cluster-md-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dtb-allwinner-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-altera-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amazon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amlogic-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apple-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-arm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-broadcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-cavium-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-exynos-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-freescale-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-hisilicon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-lg-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-marvell-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-mediatek-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-nvidia-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-qcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-renesas-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-rockchip-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-socionext-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-sprd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-xilinx-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40206",
"url": "https://www.suse.com/security/cve/CVE-2025-40206"
},
{
"category": "external",
"summary": "SUSE Bug 1253393 for CVE-2025-40206",
"url": "https://bugzilla.suse.com/1253393"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 16.0:cluster-md-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dtb-allwinner-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-altera-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amazon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amlogic-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apple-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-arm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-broadcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-cavium-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-exynos-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-freescale-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-hisilicon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-lg-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-marvell-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-mediatek-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-nvidia-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-qcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-renesas-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-rockchip-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-socionext-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-sprd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-xilinx-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.1,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Leap 16.0:cluster-md-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dtb-allwinner-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-altera-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amazon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amlogic-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apple-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-arm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-broadcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-cavium-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-exynos-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-freescale-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-hisilicon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-lg-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-marvell-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-mediatek-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-nvidia-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-qcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-renesas-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-rockchip-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-socionext-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-sprd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-xilinx-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-19T17:38:16Z",
"details": "moderate"
}
],
"title": "CVE-2025-40206"
},
{
"cve": "CVE-2025-40207",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40207"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nmedia: v4l2-subdev: Fix alloc failure check in v4l2_subdev_call_state_try()\n\nv4l2_subdev_call_state_try() macro allocates a subdev state with\n__v4l2_subdev_state_alloc(), but does not check the returned value. If\n__v4l2_subdev_state_alloc fails, it returns an ERR_PTR, and that would\ncause v4l2_subdev_call_state_try() to crash.\n\nAdd proper error handling to v4l2_subdev_call_state_try().",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 16.0:cluster-md-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dtb-allwinner-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-altera-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amazon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amlogic-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apple-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-arm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-broadcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-cavium-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-exynos-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-freescale-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-hisilicon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-lg-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-marvell-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-mediatek-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-nvidia-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-qcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-renesas-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-rockchip-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-socionext-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-sprd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-xilinx-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40207",
"url": "https://www.suse.com/security/cve/CVE-2025-40207"
},
{
"category": "external",
"summary": "SUSE Bug 1253395 for CVE-2025-40207",
"url": "https://bugzilla.suse.com/1253395"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 16.0:cluster-md-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dtb-allwinner-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-altera-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amazon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amlogic-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apple-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-arm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-broadcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-cavium-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-exynos-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-freescale-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-hisilicon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-lg-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-marvell-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-mediatek-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-nvidia-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-qcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-renesas-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-rockchip-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-socionext-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-sprd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-xilinx-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Leap 16.0:cluster-md-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dtb-allwinner-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-altera-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amazon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amlogic-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apple-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-arm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-broadcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-cavium-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-exynos-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-freescale-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-hisilicon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-lg-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-marvell-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-mediatek-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-nvidia-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-qcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-renesas-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-rockchip-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-socionext-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-sprd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-xilinx-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-19T17:38:16Z",
"details": "moderate"
}
],
"title": "CVE-2025-40207"
}
]
}
FKIE_CVE-2025-40164
Vulnerability from fkie_nvd - Published: 2025-11-12 11:15 - Updated: 2026-01-30 10:15| URL | Tags | ||
|---|---|---|---|
| 416baaa9-dc9f-4396-8d5f-8c081fb06d67 | https://git.kernel.org/stable/c/0134c7bff14bd50314a4f92b182850ddfc38e255 | ||
| 416baaa9-dc9f-4396-8d5f-8c081fb06d67 | https://git.kernel.org/stable/c/17fbad93879e87a334062882b45fa727ba1b3dd7 | ||
| 416baaa9-dc9f-4396-8d5f-8c081fb06d67 | https://git.kernel.org/stable/c/327cd4b68b4398b6c24f10eb2b2533ffbfc10185 | ||
| 416baaa9-dc9f-4396-8d5f-8c081fb06d67 | https://git.kernel.org/stable/c/d1944bab8e0c1511f0cbf364aa06547735bb0ddb |
| Vendor | Product | Version |
|---|
{
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "In the Linux kernel, the following vulnerability has been resolved:\n\nusbnet: Fix using smp_processor_id() in preemptible code warnings\n\nSyzbot reported the following warning:\n\nBUG: using smp_processor_id() in preemptible [00000000] code: dhcpcd/2879\ncaller is usbnet_skb_return+0x74/0x490 drivers/net/usb/usbnet.c:331\nCPU: 1 UID: 0 PID: 2879 Comm: dhcpcd Not tainted 6.15.0-rc4-syzkaller-00098-g615dca38c2ea #0 PREEMPT(voluntary)\nCall Trace:\n \u003cTASK\u003e\n __dump_stack lib/dump_stack.c:94 [inline]\n dump_stack_lvl+0x16c/0x1f0 lib/dump_stack.c:120\n check_preemption_disabled+0xd0/0xe0 lib/smp_processor_id.c:49\n usbnet_skb_return+0x74/0x490 drivers/net/usb/usbnet.c:331\n usbnet_resume_rx+0x4b/0x170 drivers/net/usb/usbnet.c:708\n usbnet_change_mtu+0x1be/0x220 drivers/net/usb/usbnet.c:417\n __dev_set_mtu net/core/dev.c:9443 [inline]\n netif_set_mtu_ext+0x369/0x5c0 net/core/dev.c:9496\n netif_set_mtu+0xb0/0x160 net/core/dev.c:9520\n dev_set_mtu+0xae/0x170 net/core/dev_api.c:247\n dev_ifsioc+0xa31/0x18d0 net/core/dev_ioctl.c:572\n dev_ioctl+0x223/0x10e0 net/core/dev_ioctl.c:821\n sock_do_ioctl+0x19d/0x280 net/socket.c:1204\n sock_ioctl+0x42f/0x6a0 net/socket.c:1311\n vfs_ioctl fs/ioctl.c:51 [inline]\n __do_sys_ioctl fs/ioctl.c:906 [inline]\n __se_sys_ioctl fs/ioctl.c:892 [inline]\n __x64_sys_ioctl+0x190/0x200 fs/ioctl.c:892\n do_syscall_x64 arch/x86/entry/syscall_64.c:63 [inline]\n do_syscall_64+0xcd/0x260 arch/x86/entry/syscall_64.c:94\n entry_SYSCALL_64_after_hwframe+0x77/0x7f\n\nFor historical and portability reasons, the netif_rx() is usually\nrun in the softirq or interrupt context, this commit therefore add\nlocal_bh_disable/enable() protection in the usbnet_resume_rx()."
}
],
"id": "CVE-2025-40164",
"lastModified": "2026-01-30T10:15:55.310",
"metrics": {},
"published": "2025-11-12T11:15:46.660",
"references": [
{
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"url": "https://git.kernel.org/stable/c/0134c7bff14bd50314a4f92b182850ddfc38e255"
},
{
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"url": "https://git.kernel.org/stable/c/17fbad93879e87a334062882b45fa727ba1b3dd7"
},
{
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"url": "https://git.kernel.org/stable/c/327cd4b68b4398b6c24f10eb2b2533ffbfc10185"
},
{
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"url": "https://git.kernel.org/stable/c/d1944bab8e0c1511f0cbf364aa06547735bb0ddb"
}
],
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"vulnStatus": "Awaiting Analysis"
}
MSRC_CVE-2025-40164
Vulnerability from csaf_microsoft - Published: 2025-11-02 00:00 - Updated: 2025-12-07 01:49Notes
{
"document": {
"category": "csaf_vex",
"csaf_version": "2.0",
"distribution": {
"text": "Public",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en-US",
"notes": [
{
"category": "general",
"text": "To determine the support lifecycle for your software, see the Microsoft Support Lifecycle: https://support.microsoft.com/lifecycle",
"title": "Additional Resources"
},
{
"category": "legal_disclaimer",
"text": "The information provided in the Microsoft Knowledge Base is provided \\\"as is\\\" without warranty of any kind. Microsoft disclaims all warranties, either express or implied, including the warranties of merchantability and fitness for a particular purpose. In no event shall Microsoft Corporation or its suppliers be liable for any damages whatsoever including direct, indirect, incidental, consequential, loss of business profits or special damages, even if Microsoft Corporation or its suppliers have been advised of the possibility of such damages. Some states do not allow the exclusion or limitation of liability for consequential or incidental damages so the foregoing limitation may not apply.",
"title": "Disclaimer"
}
],
"publisher": {
"category": "vendor",
"contact_details": "secure@microsoft.com",
"name": "Microsoft Security Response Center",
"namespace": "https://msrc.microsoft.com"
},
"references": [
{
"category": "self",
"summary": "CVE-2025-40164 usbnet: Fix using smp_processor_id() in preemptible code warnings - VEX",
"url": "https://msrc.microsoft.com/csaf/vex/2025/msrc_cve-2025-40164.json"
},
{
"category": "external",
"summary": "Microsoft Support Lifecycle",
"url": "https://support.microsoft.com/lifecycle"
},
{
"category": "external",
"summary": "Common Vulnerability Scoring System",
"url": "https://www.first.org/cvss"
}
],
"title": "usbnet: Fix using smp_processor_id() in preemptible code warnings",
"tracking": {
"current_release_date": "2025-12-07T01:49:59.000Z",
"generator": {
"date": "2025-12-07T15:03:05.336Z",
"engine": {
"name": "MSRC Generator",
"version": "1.0"
}
},
"id": "msrc_CVE-2025-40164",
"initial_release_date": "2025-11-02T00:00:00.000Z",
"revision_history": [
{
"date": "2025-11-13T01:02:36.000Z",
"legacy_version": "1",
"number": "1",
"summary": "Information published."
},
{
"date": "2025-12-07T01:49:59.000Z",
"legacy_version": "2",
"number": "2",
"summary": "Information published."
}
],
"status": "final",
"version": "2"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "3.0",
"product": {
"name": "Azure Linux 3.0",
"product_id": "17084"
}
}
],
"category": "product_name",
"name": "Azure Linux"
},
{
"branches": [
{
"category": "product_version_range",
"name": "azl3 kernel 6.6.112.1-2",
"product": {
"name": "azl3 kernel 6.6.112.1-2",
"product_id": "2"
}
},
{
"category": "product_version_range",
"name": "azl3 kernel 6.6.117.1-1",
"product": {
"name": "azl3 kernel 6.6.117.1-1",
"product_id": "1"
}
}
],
"category": "product_name",
"name": "kernel"
}
],
"category": "vendor",
"name": "Microsoft"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "azl3 kernel 6.6.112.1-2 as a component of Azure Linux 3.0",
"product_id": "17084-2"
},
"product_reference": "2",
"relates_to_product_reference": "17084"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "azl3 kernel 6.6.117.1-1 as a component of Azure Linux 3.0",
"product_id": "17084-1"
},
"product_reference": "1",
"relates_to_product_reference": "17084"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2025-40164",
"notes": [
{
"category": "general",
"text": "Linux",
"title": "Assigning CNA"
}
],
"product_status": {
"known_affected": [
"17084-2",
"17084-1"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-40164 usbnet: Fix using smp_processor_id() in preemptible code warnings - VEX",
"url": "https://msrc.microsoft.com/csaf/vex/2025/msrc_cve-2025-40164.json"
}
],
"remediations": [
{
"category": "none_available",
"date": "2025-11-13T01:02:36.000Z",
"details": "There is no fix available for this vulnerability as of now",
"product_ids": [
"17084-2"
]
},
{
"category": "none_available",
"date": "2025-11-13T01:02:36.000Z",
"details": "There is no fix available for this vulnerability as of now",
"product_ids": [
"17084-1"
]
}
],
"title": "usbnet: Fix using smp_processor_id() in preemptible code warnings"
}
]
}
WID-SEC-W-2025-2579
Vulnerability from csaf_certbund - Published: 2025-11-11 23:00 - Updated: 2026-01-28 23:00Notes
{
"document": {
"aggregate_severity": {
"text": "hoch"
},
"category": "csaf_base",
"csaf_version": "2.0",
"distribution": {
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "de-DE",
"notes": [
{
"category": "legal_disclaimer",
"text": "Das BSI ist als Anbieter f\u00fcr die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch daf\u00fcr verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgf\u00e4ltig im Einzelfall zu pr\u00fcfen."
},
{
"category": "description",
"text": "Der Kernel stellt den Kern des Linux Betriebssystems dar.",
"title": "Produktbeschreibung"
},
{
"category": "summary",
"text": "Ein Angreifer kann mehrere Schwachstellen im Linux-Kernel ausnutzen, um nicht n\u00e4her spezifizierte Angriffe durchzuf\u00fchren, die m\u00f6glicherweise zu einer Denial-of-Service- Bedingung f\u00fchren oder eine Speicherbesch\u00e4digung verursachen k\u00f6nnen.",
"title": "Angriff"
},
{
"category": "general",
"text": "- Linux",
"title": "Betroffene Betriebssysteme"
}
],
"publisher": {
"category": "other",
"contact_details": "csaf-provider@cert-bund.de",
"name": "Bundesamt f\u00fcr Sicherheit in der Informationstechnik",
"namespace": "https://www.bsi.bund.de"
},
"references": [
{
"category": "self",
"summary": "WID-SEC-W-2025-2579 - CSAF Version",
"url": "https://wid.cert-bund.de/.well-known/csaf/white/2025/wid-sec-w-2025-2579.json"
},
{
"category": "self",
"summary": "WID-SEC-2025-2579 - Portal Version",
"url": "https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2025-2579"
},
{
"category": "external",
"summary": "Kernel CVE Announce Mailingliste",
"url": "https://lore.kernel.org/linux-cve-announce/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-40112",
"url": "https://lore.kernel.org/linux-cve-announce/2025111249-CVE-2025-40112-5c8f@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-40113",
"url": "https://lore.kernel.org/linux-cve-announce/2025111251-CVE-2025-40113-ad3d@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-40115",
"url": "https://lore.kernel.org/linux-cve-announce/2025111251-CVE-2025-40115-6218@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-40116",
"url": "https://lore.kernel.org/linux-cve-announce/2025111251-CVE-2025-40116-3942@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-40118",
"url": "https://lore.kernel.org/linux-cve-announce/2025111252-CVE-2025-40118-19e2@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-40119",
"url": "https://lore.kernel.org/linux-cve-announce/2025111252-CVE-2025-40119-41e0@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-40120",
"url": "https://lore.kernel.org/linux-cve-announce/2025111252-CVE-2025-40120-8b68@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-40121",
"url": "https://lore.kernel.org/linux-cve-announce/2025111252-CVE-2025-40121-c2ef@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-40122",
"url": "https://lore.kernel.org/linux-cve-announce/2025111252-CVE-2025-40122-6893@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-40123",
"url": "https://lore.kernel.org/linux-cve-announce/2025111253-CVE-2025-40123-fcb1@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-40124",
"url": "https://lore.kernel.org/linux-cve-announce/2025111253-CVE-2025-40124-5006@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-40125",
"url": "https://lore.kernel.org/linux-cve-announce/2025111253-CVE-2025-40125-cb33@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-40126",
"url": "https://lore.kernel.org/linux-cve-announce/2025111253-CVE-2025-40126-a667@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-40127",
"url": "https://lore.kernel.org/linux-cve-announce/2025111253-CVE-2025-40127-361e@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-40128",
"url": "https://lore.kernel.org/linux-cve-announce/2025111253-CVE-2025-40128-2dd9@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-40129",
"url": "https://lore.kernel.org/linux-cve-announce/2025111254-CVE-2025-40129-fbb4@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-40130",
"url": "https://lore.kernel.org/linux-cve-announce/2025111254-CVE-2025-40130-c057@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-40131",
"url": "https://lore.kernel.org/linux-cve-announce/2025111254-CVE-2025-40131-1db8@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-40132",
"url": "https://lore.kernel.org/linux-cve-announce/2025111254-CVE-2025-40132-9d00@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-40133",
"url": "https://lore.kernel.org/linux-cve-announce/2025111254-CVE-2025-40133-4d9d@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-40134",
"url": "https://lore.kernel.org/linux-cve-announce/2025111254-CVE-2025-40134-4d24@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-40135",
"url": "https://lore.kernel.org/linux-cve-announce/2025111255-CVE-2025-40135-67ca@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-40136",
"url": "https://lore.kernel.org/linux-cve-announce/2025111255-CVE-2025-40136-9c55@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-40137",
"url": "https://lore.kernel.org/linux-cve-announce/2025111255-CVE-2025-40137-3047@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-40138",
"url": "https://lore.kernel.org/linux-cve-announce/2025111255-CVE-2025-40138-e96d@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-40139",
"url": "https://lore.kernel.org/linux-cve-announce/2025111255-CVE-2025-40139-a030@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-40140",
"url": "https://lore.kernel.org/linux-cve-announce/2025111255-CVE-2025-40140-ae1a@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-40141",
"url": "https://lore.kernel.org/linux-cve-announce/2025111256-CVE-2025-40141-072e@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-40142",
"url": "https://lore.kernel.org/linux-cve-announce/2025111256-CVE-2025-40142-2655@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-40143",
"url": "https://lore.kernel.org/linux-cve-announce/2025111256-CVE-2025-40143-a4ce@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-40144",
"url": "https://lore.kernel.org/linux-cve-announce/2025111256-CVE-2025-40144-f4bd@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-40145",
"url": "https://lore.kernel.org/linux-cve-announce/2025111256-CVE-2025-40145-9b0c@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-40146",
"url": "https://lore.kernel.org/linux-cve-announce/2025111256-CVE-2025-40146-b919@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-40147",
"url": "https://lore.kernel.org/linux-cve-announce/2025111257-CVE-2025-40147-0afa@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-40148",
"url": "https://lore.kernel.org/linux-cve-announce/2025111257-CVE-2025-40148-eef5@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-40149",
"url": "https://lore.kernel.org/linux-cve-announce/2025111257-CVE-2025-40149-2c48@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-40150",
"url": "https://lore.kernel.org/linux-cve-announce/2025111257-CVE-2025-40150-0f36@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-40151",
"url": "https://lore.kernel.org/linux-cve-announce/2025111257-CVE-2025-40151-6cb9@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-40152",
"url": "https://lore.kernel.org/linux-cve-announce/2025111257-CVE-2025-40152-601f@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-40153",
"url": "https://lore.kernel.org/linux-cve-announce/2025111258-CVE-2025-40153-c820@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-40154",
"url": "https://lore.kernel.org/linux-cve-announce/2025111258-CVE-2025-40154-fd98@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-40155",
"url": "https://lore.kernel.org/linux-cve-announce/2025111258-CVE-2025-40155-5247@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-40156",
"url": "https://lore.kernel.org/linux-cve-announce/2025111258-CVE-2025-40156-3045@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-40157",
"url": "https://lore.kernel.org/linux-cve-announce/2025111258-CVE-2025-40157-d08c@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-40158",
"url": "https://lore.kernel.org/linux-cve-announce/2025111258-CVE-2025-40158-4c9d@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-40159",
"url": "https://lore.kernel.org/linux-cve-announce/2025111239-CVE-2025-40159-fe53@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-40160",
"url": "https://lore.kernel.org/linux-cve-announce/2025111239-CVE-2025-40160-b13a@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-40161",
"url": "https://lore.kernel.org/linux-cve-announce/2025111239-CVE-2025-40161-8d13@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-40162",
"url": "https://lore.kernel.org/linux-cve-announce/2025111227-CVE-2025-40162-210b@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-40163",
"url": "https://lore.kernel.org/linux-cve-announce/2025111227-CVE-2025-40163-55e0@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-40164",
"url": "https://lore.kernel.org/linux-cve-announce/2025111227-CVE-2025-40164-cbee@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-40165",
"url": "https://lore.kernel.org/linux-cve-announce/2025111227-CVE-2025-40165-872c@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-40166",
"url": "https://lore.kernel.org/linux-cve-announce/2025111228-CVE-2025-40166-07ed@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-40167",
"url": "https://lore.kernel.org/linux-cve-announce/2025111228-CVE-2025-40167-184f@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-40168",
"url": "https://lore.kernel.org/linux-cve-announce/2025111256-CVE-2025-40168-bdd5@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-40169",
"url": "https://lore.kernel.org/linux-cve-announce/2025111259-CVE-2025-40169-c29b@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-40170",
"url": "https://lore.kernel.org/linux-cve-announce/2025111259-CVE-2025-40170-d39d@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-40171",
"url": "https://lore.kernel.org/linux-cve-announce/2025111259-CVE-2025-40171-0cb5@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-40172",
"url": "https://lore.kernel.org/linux-cve-announce/2025111254-CVE-2025-40172-f3b8@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-40173",
"url": "https://lore.kernel.org/linux-cve-announce/2025111254-CVE-2025-40173-4a68@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-40174",
"url": "https://lore.kernel.org/linux-cve-announce/2025111255-CVE-2025-40174-b076@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-40175",
"url": "https://lore.kernel.org/linux-cve-announce/2025111255-CVE-2025-40175-9dd0@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-40176",
"url": "https://lore.kernel.org/linux-cve-announce/2025111255-CVE-2025-40176-f2e3@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-40177",
"url": "https://lore.kernel.org/linux-cve-announce/2025111255-CVE-2025-40177-8961@gregkh/"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7879-2 vom 2025-11-21",
"url": "https://ubuntu.com/security/notices/USN-7879-2"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7879-1 vom 2025-11-21",
"url": "https://ubuntu.com/security/notices/USN-7879-1"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7887-1 vom 2025-11-24",
"url": "https://ubuntu.com/security/notices/USN-7887-1"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7879-3 vom 2025-11-26",
"url": "https://ubuntu.com/security/notices/USN-7879-3"
},
{
"category": "external",
"summary": "Debian Security Advisory DLA-4379 vom 2025-11-25",
"url": "https://lists.debian.org/debian-lts-announce/2025/11/msg00022.html"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7887-2 vom 2025-11-25",
"url": "https://ubuntu.com/security/notices/USN-7887-2"
},
{
"category": "external",
"summary": "Container-Optimized OS release notes vom 2025-12-03",
"url": "https://docs.cloud.google.com/container-optimized-os/docs/release-notes#December_02_2025"
},
{
"category": "external",
"summary": "Amazon Linux Security Advisory ALAS2KERNEL-5.15-2025-095 vom 2025-12-08",
"url": "https://alas.aws.amazon.com/AL2/ALAS2KERNEL-5.15-2025-095.html"
},
{
"category": "external",
"summary": "Amazon Linux Security Advisory ALAS2KERNEL-5.15-2025-094 vom 2025-12-08",
"url": "https://alas.aws.amazon.com/AL2/ALAS2KERNEL-5.15-2025-094.html"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2025-28049 vom 2025-12-15",
"url": "https://linux.oracle.com/errata/ELSA-2025-28049.html"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2025-28048 vom 2025-12-12",
"url": "https://linux.oracle.com/errata/ELSA-2025-28048.html"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2025-28049 vom 2025-12-15",
"url": "https://oss.oracle.com/pipermail/el-errata/2025-December/019260.html"
},
{
"category": "external",
"summary": "Debian Security Advisory DLA-4404 vom 2025-12-12",
"url": "https://lists.debian.org/debian-lts-announce/2025/12/msg00015.html"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7936-1 vom 2025-12-16",
"url": "https://ubuntu.com/security/notices/USN-7936-1"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:4393-1 vom 2025-12-15",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-December/023538.html"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7934-1 vom 2025-12-15",
"url": "https://ubuntu.com/security/notices/USN-7934-1"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2025:23241 vom 2025-12-17",
"url": "https://access.redhat.com/errata/RHSA-2025:23241"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:4422-1 vom 2025-12-17",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-December/023573.html"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7940-1 vom 2025-12-17",
"url": "https://ubuntu.com/security/notices/USN-7940-1"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2025-23241 vom 2025-12-19",
"url": "https://linux.oracle.com/errata/ELSA-2025-23241.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:4506-1 vom 2025-12-23",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/WTUJ36GACHYQN5EBFUNRPSW63S3SZXJ5/"
},
{
"category": "external",
"summary": "Rocky Linux Security Advisory RLSA-2025:23241 vom 2025-12-23",
"url": "https://errata.build.resf.org/RLSA-2025:23241"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:4505-1 vom 2025-12-23",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3D5W2444LYTUJVXYGB63LTMU25GRLRJR/"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:4516-1 vom 2025-12-24",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-December/023646.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:4515-1 vom 2025-12-24",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-December/023647.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:4517-1 vom 2025-12-24",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-December/023649.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:4521-1 vom 2025-12-24",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-December/023651.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:4530-1 vom 2025-12-29",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3ZJXHV4TJM3LRAHWS7AE4LY344HKKW3D/"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:4530-1 vom 2025-12-29",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-December/023658.html"
},
{
"category": "external",
"summary": "Amazon Linux Security Advisory ALAS2LIVEPATCH-2025-283 vom 2026-01-05",
"url": "https://alas.aws.amazon.com/AL2/ALAS2LIVEPATCH-2025-283.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:0029-1 vom 2026-01-05",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-January/023679.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:0033-1 vom 2026-01-06",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-January/023686.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:0032-1 vom 2026-01-06",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-January/023687.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:0034-1 vom 2026-01-06",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/SD42TBT2POVOPEQIWTZDVKRXUBRUUL3W/"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7940-2 vom 2026-01-09",
"url": "https://ubuntu.com/security/notices/USN-7940-2"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:20012-1 vom 2026-01-09",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-January/023715.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:20021-1 vom 2026-01-09",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-January/023723.html"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2026:0453 vom 2026-01-12",
"url": "https://access.redhat.com/errata/RHSA-2026:0453"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:20015-1 vom 2026-01-09",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-January/023727.html"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2026:0457 vom 2026-01-12",
"url": "https://access.redhat.com/errata/RHSA-2026:0457"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2026:0489 vom 2026-01-13",
"url": "https://access.redhat.com/errata/RHSA-2026:0489"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2026:0534 vom 2026-01-14",
"url": "https://access.redhat.com/errata/RHSA-2026:0534"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2026:0535 vom 2026-01-14",
"url": "https://access.redhat.com/errata/RHSA-2026:0535"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:20039-1 vom 2026-01-15",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-January/023767.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:20059-1 vom 2026-01-15",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-January/023751.html"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2026:0747 vom 2026-01-19",
"url": "https://access.redhat.com/errata/RHSA-2026:0747"
},
{
"category": "external",
"summary": "Rocky Linux Security Advisory RLSA-2026:0453 vom 2026-01-17",
"url": "https://errata.build.resf.org/RLSA-2026:0453"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2026:0804 vom 2026-01-19",
"url": "https://access.redhat.com/errata/RHSA-2026:0804"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2026:0917 vom 2026-01-21",
"url": "https://access.redhat.com/errata/RHSA-2026:0917"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2026:0950 vom 2026-01-22",
"url": "https://access.redhat.com/errata/RHSA-2026:0950"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:0263-1 vom 2026-01-23",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-January/023899.html"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2026:1142 vom 2026-01-26",
"url": "https://access.redhat.com/errata/RHSA-2026:1142"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2026:1148 vom 2026-01-26",
"url": "https://access.redhat.com/errata/RHSA-2026:1148"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:0278-1 vom 2026-01-23",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-January/023906.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:0281-1 vom 2026-01-26",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-January/023914.html"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2026:1194 vom 2026-01-26",
"url": "https://access.redhat.com/errata/RHSA-2026:1194"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2026:1236 vom 2026-01-26",
"url": "https://access.redhat.com/errata/RHSA-2026:1236"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2026-50071 vom 2026-01-26",
"url": "https://linux.oracle.com/errata/ELSA-2026-50071.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:0293-1 vom 2026-01-26",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-January/023915.html"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2026-1142 vom 2026-01-27",
"url": "https://linux.oracle.com/errata/ELSA-2026-1142.html"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2026:1441 vom 2026-01-28",
"url": "https://access.redhat.com/errata/RHSA-2026:1441"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2026:1443 vom 2026-01-28",
"url": "https://access.redhat.com/errata/RHSA-2026:1443"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2026:1495 vom 2026-01-28",
"url": "https://access.redhat.com/errata/RHSA-2026:1495"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:0316-1 vom 2026-01-28",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-January/023970.html"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2026:1494 vom 2026-01-28",
"url": "https://access.redhat.com/errata/RHSA-2026:1494"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:0315-1 vom 2026-01-29",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-January/023971.html"
}
],
"source_lang": "en-US",
"title": "Linux Kernel: Mehrere Schwachstellen",
"tracking": {
"current_release_date": "2026-01-28T23:00:00.000+00:00",
"generator": {
"date": "2026-01-29T08:27:31.617+00:00",
"engine": {
"name": "BSI-WID",
"version": "1.5.0"
}
},
"id": "WID-SEC-W-2025-2579",
"initial_release_date": "2025-11-11T23:00:00.000+00:00",
"revision_history": [
{
"date": "2025-11-11T23:00:00.000+00:00",
"number": "1",
"summary": "Initiale Fassung"
},
{
"date": "2025-11-12T23:00:00.000+00:00",
"number": "2",
"summary": "Referenz(en) aufgenommen: EUVD-2025-124924, EUVD-2025-124915, EUVD-2025-124941, EUVD-2025-124940, EUVD-2025-124907, EUVD-2025-124921, EUVD-2025-124939, EUVD-2025-124937, EUVD-2025-124936, EUVD-2025-124913, EUVD-2025-124968, EUVD-2025-124967, EUVD-2025-124966, EUVD-2025-124908, EUVD-2025-124922, EUVD-2025-124965, EUVD-2025-124926, EUVD-2025-124964, EUVD-2025-124963, EUVD-2025-124961, EUVD-2025-124960, EUVD-2025-124959, EUVD-2025-124909, EUVD-2025-124912, EUVD-2025-124928, EUVD-2025-124958, EUVD-2025-124917, EUVD-2025-124938, EUVD-2025-124962, EUVD-2025-124925, EUVD-2025-124911, EUVD-2025-124910, EUVD-2025-124929, EUVD-2025-124930, EUVD-2025-124931, EUVD-2025-124933, EUVD-2025-124942, EUVD-2025-124944, EUVD-2025-124949, EUVD-2025-124953, EUVD-2025-106789, EUVD-2025-124914, EUVD-2025-124923, EUVD-2025-124927, EUVD-2025-124932, EUVD-2025-124934, EUVD-2025-124935, EUVD-2025-124943, EUVD-2025-124945, EUVD-2025-124946, EUVD-2025-124947, EUVD-2025-124948, EUVD-2025-124950, EUVD-2025-124951, EUVD-2025-124952, EUVD-2025-124954, EUVD-2025-124955, EUVD-2025-124956, EUVD-2025-124957, EUVD-2025-124969, EUVD-2025-124970, EUVD-2025-124920, EUVD-2025-124919, EUVD-2025-106790, EUVD-2025-124918, EUVD-2025-124906, EUVD-2025-124916"
},
{
"date": "2025-11-23T23:00:00.000+00:00",
"number": "3",
"summary": "Neue Updates von Ubuntu aufgenommen"
},
{
"date": "2025-11-24T23:00:00.000+00:00",
"number": "4",
"summary": "Neue Updates von Ubuntu aufgenommen"
},
{
"date": "2025-11-25T23:00:00.000+00:00",
"number": "5",
"summary": "Neue Updates von Ubuntu und Debian aufgenommen"
},
{
"date": "2025-12-03T23:00:00.000+00:00",
"number": "6",
"summary": "Neue Updates aufgenommen"
},
{
"date": "2025-12-08T23:00:00.000+00:00",
"number": "7",
"summary": "Neue Updates von Amazon aufgenommen"
},
{
"date": "2025-12-14T23:00:00.000+00:00",
"number": "8",
"summary": "Neue Updates von Oracle Linux und Debian aufgenommen"
},
{
"date": "2025-12-15T23:00:00.000+00:00",
"number": "9",
"summary": "Neue Updates von Ubuntu und SUSE aufgenommen"
},
{
"date": "2025-12-16T23:00:00.000+00:00",
"number": "10",
"summary": "Neue Updates von Red Hat aufgenommen"
},
{
"date": "2025-12-17T23:00:00.000+00:00",
"number": "11",
"summary": "Neue Updates von SUSE und Ubuntu aufgenommen"
},
{
"date": "2025-12-18T23:00:00.000+00:00",
"number": "12",
"summary": "Neue Updates von Oracle Linux aufgenommen"
},
{
"date": "2025-12-22T23:00:00.000+00:00",
"number": "13",
"summary": "Neue Updates von SUSE und Rocky Enterprise Software Foundation aufgenommen"
},
{
"date": "2025-12-23T23:00:00.000+00:00",
"number": "14",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2025-12-28T23:00:00.000+00:00",
"number": "15",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2025-12-29T23:00:00.000+00:00",
"number": "16",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2026-01-05T23:00:00.000+00:00",
"number": "17",
"summary": "Neue Updates von Amazon und SUSE aufgenommen"
},
{
"date": "2026-01-11T23:00:00.000+00:00",
"number": "18",
"summary": "Neue Updates von Ubuntu, SUSE und Red Hat aufgenommen"
},
{
"date": "2026-01-12T23:00:00.000+00:00",
"number": "19",
"summary": "Neue Updates von Red Hat aufgenommen"
},
{
"date": "2026-01-13T23:00:00.000+00:00",
"number": "20",
"summary": "Neue Updates von Red Hat aufgenommen"
},
{
"date": "2026-01-14T23:00:00.000+00:00",
"number": "21",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2026-01-18T23:00:00.000+00:00",
"number": "22",
"summary": "Neue Updates von Red Hat und Rocky Enterprise Software Foundation aufgenommen"
},
{
"date": "2026-01-19T23:00:00.000+00:00",
"number": "23",
"summary": "Neue Updates von Red Hat aufgenommen"
},
{
"date": "2026-01-20T23:00:00.000+00:00",
"number": "24",
"summary": "Neue Updates von Red Hat aufgenommen"
},
{
"date": "2026-01-21T23:00:00.000+00:00",
"number": "25",
"summary": "Neue Updates von Red Hat aufgenommen"
},
{
"date": "2026-01-25T23:00:00.000+00:00",
"number": "26",
"summary": "Neue Updates von SUSE und Red Hat aufgenommen"
},
{
"date": "2026-01-26T23:00:00.000+00:00",
"number": "27",
"summary": "Neue Updates von Red Hat, Oracle Linux und SUSE aufgenommen"
},
{
"date": "2026-01-27T23:00:00.000+00:00",
"number": "28",
"summary": "Neue Updates von Oracle Linux und Red Hat aufgenommen"
},
{
"date": "2026-01-28T23:00:00.000+00:00",
"number": "29",
"summary": "Neue Updates von Red Hat und SUSE aufgenommen"
}
],
"status": "final",
"version": "29"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Amazon Linux 2",
"product": {
"name": "Amazon Linux 2",
"product_id": "398363",
"product_identification_helper": {
"cpe": "cpe:/o:amazon:linux_2:-"
}
}
}
],
"category": "vendor",
"name": "Amazon"
},
{
"branches": [
{
"category": "product_name",
"name": "Debian Linux",
"product": {
"name": "Debian Linux",
"product_id": "2951",
"product_identification_helper": {
"cpe": "cpe:/o:debian:debian_linux:-"
}
}
}
],
"category": "vendor",
"name": "Debian"
},
{
"branches": [
{
"category": "product_name",
"name": "Google Container-Optimized OS",
"product": {
"name": "Google Container-Optimized OS",
"product_id": "1607324",
"product_identification_helper": {
"cpe": "cpe:/o:google:container-optimized_os:-"
}
}
}
],
"category": "vendor",
"name": "Google"
},
{
"branches": [
{
"category": "product_name",
"name": "Open Source Linux Kernel",
"product": {
"name": "Open Source Linux Kernel",
"product_id": "T028462",
"product_identification_helper": {
"cpe": "cpe:/o:linux:linux_kernel:unspecified"
}
}
}
],
"category": "vendor",
"name": "Open Source"
},
{
"branches": [
{
"category": "product_name",
"name": "Oracle Linux",
"product": {
"name": "Oracle Linux",
"product_id": "T004914",
"product_identification_helper": {
"cpe": "cpe:/o:oracle:linux:-"
}
}
}
],
"category": "vendor",
"name": "Oracle"
},
{
"branches": [
{
"category": "product_name",
"name": "RESF Rocky Linux",
"product": {
"name": "RESF Rocky Linux",
"product_id": "T032255",
"product_identification_helper": {
"cpe": "cpe:/o:resf:rocky_linux:-"
}
}
}
],
"category": "vendor",
"name": "RESF"
},
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux",
"product": {
"name": "Red Hat Enterprise Linux",
"product_id": "67646",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:-"
}
}
}
],
"category": "vendor",
"name": "Red Hat"
},
{
"branches": [
{
"category": "product_name",
"name": "SUSE Linux",
"product": {
"name": "SUSE Linux",
"product_id": "T002207",
"product_identification_helper": {
"cpe": "cpe:/o:suse:suse_linux:-"
}
}
}
],
"category": "vendor",
"name": "SUSE"
},
{
"branches": [
{
"category": "product_name",
"name": "Ubuntu Linux",
"product": {
"name": "Ubuntu Linux",
"product_id": "T000126",
"product_identification_helper": {
"cpe": "cpe:/o:canonical:ubuntu_linux:-"
}
}
}
],
"category": "vendor",
"name": "Ubuntu"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2025-40110",
"product_status": {
"known_affected": [
"T028462",
"2951",
"T002207",
"67646",
"T000126",
"398363",
"T004914",
"1607324",
"T032255"
]
},
"release_date": "2025-11-11T23:00:00.000+00:00",
"title": "CVE-2025-40110"
},
{
"cve": "CVE-2025-40111",
"product_status": {
"known_affected": [
"T028462",
"2951",
"T002207",
"67646",
"T000126",
"398363",
"T004914",
"1607324",
"T032255"
]
},
"release_date": "2025-11-11T23:00:00.000+00:00",
"title": "CVE-2025-40111"
},
{
"cve": "CVE-2025-40112",
"product_status": {
"known_affected": [
"T028462",
"2951",
"T002207",
"67646",
"T000126",
"398363",
"T004914",
"1607324",
"T032255"
]
},
"release_date": "2025-11-11T23:00:00.000+00:00",
"title": "CVE-2025-40112"
},
{
"cve": "CVE-2025-40113",
"product_status": {
"known_affected": [
"T028462",
"2951",
"T002207",
"67646",
"T000126",
"398363",
"T004914",
"1607324",
"T032255"
]
},
"release_date": "2025-11-11T23:00:00.000+00:00",
"title": "CVE-2025-40113"
},
{
"cve": "CVE-2025-40115",
"product_status": {
"known_affected": [
"T028462",
"2951",
"T002207",
"67646",
"T000126",
"398363",
"T004914",
"1607324",
"T032255"
]
},
"release_date": "2025-11-11T23:00:00.000+00:00",
"title": "CVE-2025-40115"
},
{
"cve": "CVE-2025-40116",
"product_status": {
"known_affected": [
"T028462",
"2951",
"T002207",
"67646",
"T000126",
"398363",
"T004914",
"1607324",
"T032255"
]
},
"release_date": "2025-11-11T23:00:00.000+00:00",
"title": "CVE-2025-40116"
},
{
"cve": "CVE-2025-40117",
"product_status": {
"known_affected": [
"T028462",
"2951",
"T002207",
"67646",
"T000126",
"398363",
"T004914",
"1607324",
"T032255"
]
},
"release_date": "2025-11-11T23:00:00.000+00:00",
"title": "CVE-2025-40117"
},
{
"cve": "CVE-2025-40118",
"product_status": {
"known_affected": [
"T028462",
"2951",
"T002207",
"67646",
"T000126",
"398363",
"T004914",
"1607324",
"T032255"
]
},
"release_date": "2025-11-11T23:00:00.000+00:00",
"title": "CVE-2025-40118"
},
{
"cve": "CVE-2025-40119",
"product_status": {
"known_affected": [
"T028462",
"2951",
"T002207",
"67646",
"T000126",
"398363",
"T004914",
"1607324",
"T032255"
]
},
"release_date": "2025-11-11T23:00:00.000+00:00",
"title": "CVE-2025-40119"
},
{
"cve": "CVE-2025-40120",
"product_status": {
"known_affected": [
"T028462",
"2951",
"T002207",
"67646",
"T000126",
"398363",
"T004914",
"1607324",
"T032255"
]
},
"release_date": "2025-11-11T23:00:00.000+00:00",
"title": "CVE-2025-40120"
},
{
"cve": "CVE-2025-40121",
"product_status": {
"known_affected": [
"T028462",
"2951",
"T002207",
"67646",
"T000126",
"398363",
"T004914",
"1607324",
"T032255"
]
},
"release_date": "2025-11-11T23:00:00.000+00:00",
"title": "CVE-2025-40121"
},
{
"cve": "CVE-2025-40122",
"product_status": {
"known_affected": [
"T028462",
"2951",
"T002207",
"67646",
"T000126",
"398363",
"T004914",
"1607324",
"T032255"
]
},
"release_date": "2025-11-11T23:00:00.000+00:00",
"title": "CVE-2025-40122"
},
{
"cve": "CVE-2025-40123",
"product_status": {
"known_affected": [
"T028462",
"2951",
"T002207",
"67646",
"T000126",
"398363",
"T004914",
"1607324",
"T032255"
]
},
"release_date": "2025-11-11T23:00:00.000+00:00",
"title": "CVE-2025-40123"
},
{
"cve": "CVE-2025-40124",
"product_status": {
"known_affected": [
"T028462",
"2951",
"T002207",
"67646",
"T000126",
"398363",
"T004914",
"1607324",
"T032255"
]
},
"release_date": "2025-11-11T23:00:00.000+00:00",
"title": "CVE-2025-40124"
},
{
"cve": "CVE-2025-40125",
"product_status": {
"known_affected": [
"T028462",
"2951",
"T002207",
"67646",
"T000126",
"398363",
"T004914",
"1607324",
"T032255"
]
},
"release_date": "2025-11-11T23:00:00.000+00:00",
"title": "CVE-2025-40125"
},
{
"cve": "CVE-2025-40126",
"product_status": {
"known_affected": [
"T028462",
"2951",
"T002207",
"67646",
"T000126",
"398363",
"T004914",
"1607324",
"T032255"
]
},
"release_date": "2025-11-11T23:00:00.000+00:00",
"title": "CVE-2025-40126"
},
{
"cve": "CVE-2025-40127",
"product_status": {
"known_affected": [
"T028462",
"2951",
"T002207",
"67646",
"T000126",
"398363",
"T004914",
"1607324",
"T032255"
]
},
"release_date": "2025-11-11T23:00:00.000+00:00",
"title": "CVE-2025-40127"
},
{
"cve": "CVE-2025-40128",
"product_status": {
"known_affected": [
"T028462",
"2951",
"T002207",
"67646",
"T000126",
"398363",
"T004914",
"1607324",
"T032255"
]
},
"release_date": "2025-11-11T23:00:00.000+00:00",
"title": "CVE-2025-40128"
},
{
"cve": "CVE-2025-40129",
"product_status": {
"known_affected": [
"T028462",
"2951",
"T002207",
"67646",
"T000126",
"398363",
"T004914",
"1607324",
"T032255"
]
},
"release_date": "2025-11-11T23:00:00.000+00:00",
"title": "CVE-2025-40129"
},
{
"cve": "CVE-2025-40130",
"product_status": {
"known_affected": [
"T028462",
"2951",
"T002207",
"67646",
"T000126",
"398363",
"T004914",
"1607324",
"T032255"
]
},
"release_date": "2025-11-11T23:00:00.000+00:00",
"title": "CVE-2025-40130"
},
{
"cve": "CVE-2025-40131",
"product_status": {
"known_affected": [
"T028462",
"2951",
"T002207",
"67646",
"T000126",
"398363",
"T004914",
"1607324",
"T032255"
]
},
"release_date": "2025-11-11T23:00:00.000+00:00",
"title": "CVE-2025-40131"
},
{
"cve": "CVE-2025-40132",
"product_status": {
"known_affected": [
"T028462",
"2951",
"T002207",
"67646",
"T000126",
"398363",
"T004914",
"1607324",
"T032255"
]
},
"release_date": "2025-11-11T23:00:00.000+00:00",
"title": "CVE-2025-40132"
},
{
"cve": "CVE-2025-40133",
"product_status": {
"known_affected": [
"T028462",
"2951",
"T002207",
"67646",
"T000126",
"398363",
"T004914",
"1607324",
"T032255"
]
},
"release_date": "2025-11-11T23:00:00.000+00:00",
"title": "CVE-2025-40133"
},
{
"cve": "CVE-2025-40134",
"product_status": {
"known_affected": [
"T028462",
"2951",
"T002207",
"67646",
"T000126",
"398363",
"T004914",
"1607324",
"T032255"
]
},
"release_date": "2025-11-11T23:00:00.000+00:00",
"title": "CVE-2025-40134"
},
{
"cve": "CVE-2025-40135",
"product_status": {
"known_affected": [
"T028462",
"2951",
"T002207",
"67646",
"T000126",
"398363",
"T004914",
"1607324",
"T032255"
]
},
"release_date": "2025-11-11T23:00:00.000+00:00",
"title": "CVE-2025-40135"
},
{
"cve": "CVE-2025-40136",
"product_status": {
"known_affected": [
"T028462",
"2951",
"T002207",
"67646",
"T000126",
"398363",
"T004914",
"1607324",
"T032255"
]
},
"release_date": "2025-11-11T23:00:00.000+00:00",
"title": "CVE-2025-40136"
},
{
"cve": "CVE-2025-40137",
"product_status": {
"known_affected": [
"T028462",
"2951",
"T002207",
"67646",
"T000126",
"398363",
"T004914",
"1607324",
"T032255"
]
},
"release_date": "2025-11-11T23:00:00.000+00:00",
"title": "CVE-2025-40137"
},
{
"cve": "CVE-2025-40138",
"product_status": {
"known_affected": [
"T028462",
"2951",
"T002207",
"67646",
"T000126",
"398363",
"T004914",
"1607324",
"T032255"
]
},
"release_date": "2025-11-11T23:00:00.000+00:00",
"title": "CVE-2025-40138"
},
{
"cve": "CVE-2025-40139",
"product_status": {
"known_affected": [
"T028462",
"2951",
"T002207",
"67646",
"T000126",
"398363",
"T004914",
"1607324",
"T032255"
]
},
"release_date": "2025-11-11T23:00:00.000+00:00",
"title": "CVE-2025-40139"
},
{
"cve": "CVE-2025-40140",
"product_status": {
"known_affected": [
"T028462",
"2951",
"T002207",
"67646",
"T000126",
"398363",
"T004914",
"1607324",
"T032255"
]
},
"release_date": "2025-11-11T23:00:00.000+00:00",
"title": "CVE-2025-40140"
},
{
"cve": "CVE-2025-40141",
"product_status": {
"known_affected": [
"T028462",
"2951",
"T002207",
"67646",
"T000126",
"398363",
"T004914",
"1607324",
"T032255"
]
},
"release_date": "2025-11-11T23:00:00.000+00:00",
"title": "CVE-2025-40141"
},
{
"cve": "CVE-2025-40142",
"product_status": {
"known_affected": [
"T028462",
"2951",
"T002207",
"67646",
"T000126",
"398363",
"T004914",
"1607324",
"T032255"
]
},
"release_date": "2025-11-11T23:00:00.000+00:00",
"title": "CVE-2025-40142"
},
{
"cve": "CVE-2025-40143",
"product_status": {
"known_affected": [
"T028462",
"2951",
"T002207",
"67646",
"T000126",
"398363",
"T004914",
"1607324",
"T032255"
]
},
"release_date": "2025-11-11T23:00:00.000+00:00",
"title": "CVE-2025-40143"
},
{
"cve": "CVE-2025-40144",
"product_status": {
"known_affected": [
"T028462",
"2951",
"T002207",
"67646",
"T000126",
"398363",
"T004914",
"1607324",
"T032255"
]
},
"release_date": "2025-11-11T23:00:00.000+00:00",
"title": "CVE-2025-40144"
},
{
"cve": "CVE-2025-40145",
"product_status": {
"known_affected": [
"T028462",
"2951",
"T002207",
"67646",
"T000126",
"398363",
"T004914",
"1607324",
"T032255"
]
},
"release_date": "2025-11-11T23:00:00.000+00:00",
"title": "CVE-2025-40145"
},
{
"cve": "CVE-2025-40146",
"product_status": {
"known_affected": [
"T028462",
"2951",
"T002207",
"67646",
"T000126",
"398363",
"T004914",
"1607324",
"T032255"
]
},
"release_date": "2025-11-11T23:00:00.000+00:00",
"title": "CVE-2025-40146"
},
{
"cve": "CVE-2025-40147",
"product_status": {
"known_affected": [
"T028462",
"2951",
"T002207",
"67646",
"T000126",
"398363",
"T004914",
"1607324",
"T032255"
]
},
"release_date": "2025-11-11T23:00:00.000+00:00",
"title": "CVE-2025-40147"
},
{
"cve": "CVE-2025-40148",
"product_status": {
"known_affected": [
"T028462",
"2951",
"T002207",
"67646",
"T000126",
"398363",
"T004914",
"1607324",
"T032255"
]
},
"release_date": "2025-11-11T23:00:00.000+00:00",
"title": "CVE-2025-40148"
},
{
"cve": "CVE-2025-40149",
"product_status": {
"known_affected": [
"T028462",
"2951",
"T002207",
"67646",
"T000126",
"398363",
"T004914",
"1607324",
"T032255"
]
},
"release_date": "2025-11-11T23:00:00.000+00:00",
"title": "CVE-2025-40149"
},
{
"cve": "CVE-2025-40150",
"product_status": {
"known_affected": [
"T028462",
"2951",
"T002207",
"67646",
"T000126",
"398363",
"T004914",
"1607324",
"T032255"
]
},
"release_date": "2025-11-11T23:00:00.000+00:00",
"title": "CVE-2025-40150"
},
{
"cve": "CVE-2025-40151",
"product_status": {
"known_affected": [
"T028462",
"2951",
"T002207",
"67646",
"T000126",
"398363",
"T004914",
"1607324",
"T032255"
]
},
"release_date": "2025-11-11T23:00:00.000+00:00",
"title": "CVE-2025-40151"
},
{
"cve": "CVE-2025-40152",
"product_status": {
"known_affected": [
"T028462",
"2951",
"T002207",
"67646",
"T000126",
"398363",
"T004914",
"1607324",
"T032255"
]
},
"release_date": "2025-11-11T23:00:00.000+00:00",
"title": "CVE-2025-40152"
},
{
"cve": "CVE-2025-40153",
"product_status": {
"known_affected": [
"T028462",
"2951",
"T002207",
"67646",
"T000126",
"398363",
"T004914",
"1607324",
"T032255"
]
},
"release_date": "2025-11-11T23:00:00.000+00:00",
"title": "CVE-2025-40153"
},
{
"cve": "CVE-2025-40154",
"product_status": {
"known_affected": [
"T028462",
"2951",
"T002207",
"67646",
"T000126",
"398363",
"T004914",
"1607324",
"T032255"
]
},
"release_date": "2025-11-11T23:00:00.000+00:00",
"title": "CVE-2025-40154"
},
{
"cve": "CVE-2025-40155",
"product_status": {
"known_affected": [
"T028462",
"2951",
"T002207",
"67646",
"T000126",
"398363",
"T004914",
"1607324",
"T032255"
]
},
"release_date": "2025-11-11T23:00:00.000+00:00",
"title": "CVE-2025-40155"
},
{
"cve": "CVE-2025-40156",
"product_status": {
"known_affected": [
"T028462",
"2951",
"T002207",
"67646",
"T000126",
"398363",
"T004914",
"1607324",
"T032255"
]
},
"release_date": "2025-11-11T23:00:00.000+00:00",
"title": "CVE-2025-40156"
},
{
"cve": "CVE-2025-40157",
"product_status": {
"known_affected": [
"T028462",
"2951",
"T002207",
"67646",
"T000126",
"398363",
"T004914",
"1607324",
"T032255"
]
},
"release_date": "2025-11-11T23:00:00.000+00:00",
"title": "CVE-2025-40157"
},
{
"cve": "CVE-2025-40158",
"product_status": {
"known_affected": [
"T028462",
"2951",
"T002207",
"67646",
"T000126",
"398363",
"T004914",
"1607324",
"T032255"
]
},
"release_date": "2025-11-11T23:00:00.000+00:00",
"title": "CVE-2025-40158"
},
{
"cve": "CVE-2025-40159",
"product_status": {
"known_affected": [
"T028462",
"2951",
"T002207",
"67646",
"T000126",
"398363",
"T004914",
"1607324",
"T032255"
]
},
"release_date": "2025-11-11T23:00:00.000+00:00",
"title": "CVE-2025-40159"
},
{
"cve": "CVE-2025-40160",
"product_status": {
"known_affected": [
"T028462",
"2951",
"T002207",
"67646",
"T000126",
"398363",
"T004914",
"1607324",
"T032255"
]
},
"release_date": "2025-11-11T23:00:00.000+00:00",
"title": "CVE-2025-40160"
},
{
"cve": "CVE-2025-40161",
"product_status": {
"known_affected": [
"T028462",
"2951",
"T002207",
"67646",
"T000126",
"398363",
"T004914",
"1607324",
"T032255"
]
},
"release_date": "2025-11-11T23:00:00.000+00:00",
"title": "CVE-2025-40161"
},
{
"cve": "CVE-2025-40162",
"product_status": {
"known_affected": [
"T028462",
"2951",
"T002207",
"67646",
"T000126",
"398363",
"T004914",
"1607324",
"T032255"
]
},
"release_date": "2025-11-11T23:00:00.000+00:00",
"title": "CVE-2025-40162"
},
{
"cve": "CVE-2025-40163",
"product_status": {
"known_affected": [
"T028462",
"2951",
"T002207",
"67646",
"T000126",
"398363",
"T004914",
"1607324",
"T032255"
]
},
"release_date": "2025-11-11T23:00:00.000+00:00",
"title": "CVE-2025-40163"
},
{
"cve": "CVE-2025-40164",
"product_status": {
"known_affected": [
"T028462",
"2951",
"T002207",
"67646",
"T000126",
"398363",
"T004914",
"1607324",
"T032255"
]
},
"release_date": "2025-11-11T23:00:00.000+00:00",
"title": "CVE-2025-40164"
},
{
"cve": "CVE-2025-40165",
"product_status": {
"known_affected": [
"T028462",
"2951",
"T002207",
"67646",
"T000126",
"398363",
"T004914",
"1607324",
"T032255"
]
},
"release_date": "2025-11-11T23:00:00.000+00:00",
"title": "CVE-2025-40165"
},
{
"cve": "CVE-2025-40166",
"product_status": {
"known_affected": [
"T028462",
"2951",
"T002207",
"67646",
"T000126",
"398363",
"T004914",
"1607324",
"T032255"
]
},
"release_date": "2025-11-11T23:00:00.000+00:00",
"title": "CVE-2025-40166"
},
{
"cve": "CVE-2025-40167",
"product_status": {
"known_affected": [
"T028462",
"2951",
"T002207",
"67646",
"T000126",
"398363",
"T004914",
"1607324",
"T032255"
]
},
"release_date": "2025-11-11T23:00:00.000+00:00",
"title": "CVE-2025-40167"
},
{
"cve": "CVE-2025-40168",
"product_status": {
"known_affected": [
"T028462",
"2951",
"T002207",
"67646",
"T000126",
"398363",
"T004914",
"1607324",
"T032255"
]
},
"release_date": "2025-11-11T23:00:00.000+00:00",
"title": "CVE-2025-40168"
},
{
"cve": "CVE-2025-40169",
"product_status": {
"known_affected": [
"T028462",
"2951",
"T002207",
"67646",
"T000126",
"398363",
"T004914",
"1607324",
"T032255"
]
},
"release_date": "2025-11-11T23:00:00.000+00:00",
"title": "CVE-2025-40169"
},
{
"cve": "CVE-2025-40170",
"product_status": {
"known_affected": [
"T028462",
"2951",
"T002207",
"67646",
"T000126",
"398363",
"T004914",
"1607324",
"T032255"
]
},
"release_date": "2025-11-11T23:00:00.000+00:00",
"title": "CVE-2025-40170"
},
{
"cve": "CVE-2025-40171",
"product_status": {
"known_affected": [
"T028462",
"2951",
"T002207",
"67646",
"T000126",
"398363",
"T004914",
"1607324",
"T032255"
]
},
"release_date": "2025-11-11T23:00:00.000+00:00",
"title": "CVE-2025-40171"
},
{
"cve": "CVE-2025-40172",
"product_status": {
"known_affected": [
"T028462",
"2951",
"T002207",
"67646",
"T000126",
"398363",
"T004914",
"1607324",
"T032255"
]
},
"release_date": "2025-11-11T23:00:00.000+00:00",
"title": "CVE-2025-40172"
},
{
"cve": "CVE-2025-40173",
"product_status": {
"known_affected": [
"T028462",
"2951",
"T002207",
"67646",
"T000126",
"398363",
"T004914",
"1607324",
"T032255"
]
},
"release_date": "2025-11-11T23:00:00.000+00:00",
"title": "CVE-2025-40173"
},
{
"cve": "CVE-2025-40174",
"product_status": {
"known_affected": [
"T028462",
"2951",
"T002207",
"67646",
"T000126",
"398363",
"T004914",
"1607324",
"T032255"
]
},
"release_date": "2025-11-11T23:00:00.000+00:00",
"title": "CVE-2025-40174"
},
{
"cve": "CVE-2025-40175",
"product_status": {
"known_affected": [
"T028462",
"2951",
"T002207",
"67646",
"T000126",
"398363",
"T004914",
"1607324",
"T032255"
]
},
"release_date": "2025-11-11T23:00:00.000+00:00",
"title": "CVE-2025-40175"
},
{
"cve": "CVE-2025-40176",
"product_status": {
"known_affected": [
"T028462",
"2951",
"T002207",
"67646",
"T000126",
"398363",
"T004914",
"1607324",
"T032255"
]
},
"release_date": "2025-11-11T23:00:00.000+00:00",
"title": "CVE-2025-40176"
},
{
"cve": "CVE-2025-40177",
"product_status": {
"known_affected": [
"T028462",
"2951",
"T002207",
"67646",
"T000126",
"398363",
"T004914",
"1607324",
"T032255"
]
},
"release_date": "2025-11-11T23:00:00.000+00:00",
"title": "CVE-2025-40177"
}
]
}
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.